IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Intrusion Prevention

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Network Intrusion Prevention, Host Intrusion Prevention, Intrusion Protection, Network Intrusion Management
DEFINITION: Intrusion prevention is a preemptive approach to network security used to identify potential threats and respond to them swiftly. Like an intrusion detection system (IDS), an intrusion prevention system (IPS) monitors network traffic. However, because an exploit may be carried out very quickly after the attacker gains access, intrusion prevention systems also have the ability to take immediate action,  … 
Definition continues below.
Intrusion PreventionReports
176 - 200 of 204 Matches Previous Page  | Next Page
The End of Antivirus as You Know It: A First Look at VIPRE Enterprise - Webcast
sponsored by Sunbelt Software
WEBCAST: In this webcast, take a examines at VIPRE Enterprise and learn how Sunbelt started with a blank slate to design a new, next-generation antivirus and antispyware technology to deal with today's malware in the most comprehensive, highly efficient manner.
Posted: 09 Sep 2008 | Premiered: Sep 9, 2008

Sunbelt Software

Converged Video Network Security
sponsored by Alcatel-Lucent
WHITE PAPER: Internet Protocol Television (IPTV) has created new opportunities for traditional voice and data carriers, the technology also comes with a high level of risk due to attacks by fraudsters and hackers. Read this paper and learn how to protect yourself.
Posted: 20 Aug 2008 | Published: 01 Apr 2007

Alcatel-Lucent

Cisco ASA 5500 Series Adaptive Security Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.
Posted: 07 Aug 2008 | Premiered: Aug 1, 2008

Cisco Systems, Inc.

Managed SSL VPN Remote Access
sponsored by Virtela Communications, Inc.
DATA SHEET: Virtela's SSL VPN Remote Access Services provide end-users the security of a completely encrypted network with the flexibility to access resources from any SSL enabled browser.
Posted: 03 Mar 2008 | Published: 01 Feb 2008

Virtela Communications, Inc.

Cisco PIX 501 Security Appliance
sponsored by Cisco Systems, Inc.
SOFTWARE LISTING: The Cisco® PIX® 501 Security Appliance delivers enterprise-class security for small office and teleworker environments, in a reliable, easy-to-deploy purpose-built appliance.
Posted: 28 Feb 2008 | Published: 01 Jan 2007

Cisco Systems, Inc.

The Cybercrime Arms Race
sponsored by Kaspersky Lab
WHITE PAPER: Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
Posted: 18 Feb 2008 | Published: 01 Feb 2008

Kaspersky Lab

Drive business value with innovation for security defense
sponsored by IBM
WHITE PAPER: This white paper details an integrated approach to security that can help your company address security threats while supporting compliance and protecting data, Internet-based systems, physical environments and applications.
Posted: 06 Dec 2007 | Published: 01 Apr 2007

IBM

Unified Threat Management (UTM) Solutions
sponsored by SonicWALL
WHITE PAPER: This series of technical briefs examines the key factors you need to consider regarding unified threat management (UTM) solutions as they impact security, performance, management, and consolidation.
Posted: 05 Dec 2007 | Published: 01 Dec 2007

SonicWALL

SANS What Works in Intrusion Prevention and Detection
sponsored by Sourcefire
PRODUCT LITERATURE: This white paper shows you how TransUnion was able to successfully implement an effective intrusion defense system (IDS) that helped them meet compliance requirements and secure their corporate environment.
Posted: 20 Nov 2007 | Published: 01 May 2007

Sourcefire

Selecting the Right Host Intrusion Prevention System: 12 Key Questions to Ask
sponsored by Third Brigade
WHITE PAPER: This white paper identifies 12 critical questions that organizations need to consider when selecting a HIPS product. These questions relate to protection, manageability, integration and speed.
Posted: 18 Jun 2007 | Published: 15 May 2007

Third Brigade

Best Practices for Securing Your Wireless LAN
sponsored by AirMagnet
WHITE PAPER: This paper details real-world best practices needed to deploy and maintain a secure wireless network. Download this paper and learn how to effectively secure your wireless LAN by monitoring for a broad set of wireless attacks and intrusion techniques.
Posted: 14 Jun 2007 | Published: 14 Jun 2007

AirMagnet

7 Key Factors to Software Protection
sponsored by Arxan
WHITE PAPER: This white paper explores the magnitude and types of software piracy threats and details the seven key application security factors that must be considered during the development process.
Posted: 08 Jun 2007 | Published: 01 Jun 2007

Arxan

Intrusion Detection and Prevention Learning Guide
sponsored by SearchSecurity.com
WHITE PAPER: This guide is a compilation of resources that explain what intrusion detection and prevention are, how they work, troubleshooting, configurations and more. Download the key to protecting your network.
Posted: 17 May 2007 | Published: 03 Oct 2005

SearchSecurity.com

Protecting against Complex Internet Threats
sponsored by Websense, Inc.
WHITE PAPER: Employees use the web to perform research and gather information. They use email and popular instant messaging tools to help them stay in touch with coworkers and customers. This, uploading, downloading and sharing documents have security risks.
Posted: 04 Apr 2007 | Published: 10 Jan 2007

Websense, Inc.

Potentially Unwanted Programs: Spyware and Adware
sponsored by McAfee, Inc.
WHITE PAPER: Potentially unwanted programs (PUPs) like adware and malware can compromise your computer network's privacy and security and the associated risks can weaken your entire network. Read this white paper to learn how to effectively protect against PUPs.
Posted: 27 Mar 2007 | Published: 01 Oct 2005

McAfee, Inc.

Multi-Layer Security Platforms: The New Definition of Best of Breed
sponsored by Fortinet, Inc.
WHITE PAPER: Significant changes in the threat, technology, and regulatory landscapes are forcing organizations to implement an array of security controls. This white paper explores the benefits of integrating multiple security layers into a single solution.
Posted: 01 Feb 2007 | Published: 01 Jun 2006

Fortinet, Inc.

Using F5's iRules to Prevent Your Web Site from Being Phished
sponsored by F5 Networks, Inc.
PRODUCT LITERATURE: This paper details a solution that will help you stop your web site from being phished.
Posted: 17 Nov 2006 | Published: 01 Sep 2006

F5 Networks, Inc.

On-Demand Security Audit and Vulnerability Management - A Proactive Approach to Network Security
sponsored by Qualys, Inc.
WHITE PAPER: This paper explores the various approaches to network security and focuses on the unique role of vulnerability management and automated security audits. Learn about the four pillars of security and different approaches to vulnerability management.
Posted: 07 Nov 2006 | Published: 01 Sep 2006

Qualys, Inc.

10 Easy Steps for Email and Web Best Practices
sponsored by Symantec Hosted Services
WHITE PAPER: Misuse and abuse of email and Web servers can create costly legal, regulatory, security and productivity risks for organizations. Read this paper to learn 10 best practices for maximizing compliance and minimizing email and Web risk in your org...
Posted: 02 Nov 2006 | Published: 01 Nov 2006

Symantec Hosted Services

Unified Threat Management Guide for Managers
sponsored by Information Security magazine, sponsored by Secure Computing
BOOK: This Ebook dissects five arguments in favor of unified threat management (UTM) and gives you a better idea of whether UTM is the best choice for your network. Discover how to implement the most effective UTM solution for your company.
Posted: 01 Nov 2006 | Published: 01 Nov 2006

Information Security magazine, sponsored by Secure Computing

Evaluation Criteria for SSL VPN Appliance
sponsored by Aventail
PRODUCT LITERATURE: Organizations should be aware that many secure remote access solutions offer only a few of the capabilities that today's mature SSL VPN technology enables.
Posted: 24 Oct 2006 | Published: 01 Oct 2006

Aventail

Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Unified Threat Management Guide for Managers
sponsored by Information Security Magazine
JOURNAL ARTICLE: It's a firewall, it's an IPS, it's antivirus, it's antispam... but is it right for you?
Posted: 24 Aug 2006 | Published: 01 Jun 2006

Information Security Magazine

GFI LANguard Security Event Log Monitor - Downloads
sponsored by GFI Software
TRIAL SOFTWARE: GFI LANguard S.E.L.M. ships with a security event analysis engine which takes into account the type of security event, security level of each computer, when event occurred, role of computer and its operation system.
Posted: 02 May 2006 | Premiered: 01 May 2006

GFI Software

Deploying GFI LANguard S.E.L.M.
sponsored by GFI Software
PRODUCT LITERATURE: This white paper gives an overview of how GFI LANguard S.E.L.M. works and discusses installation and deployment issues, enabling you to choose the best way to deploy the product on your network.
Posted: 02 May 2006 | Published: 01 May 2006

GFI Software
176 - 200 of 204 Matches Previous Page    6 7 8 9    Next Page
 
INTRUSION PREVENTION DEFINITION (continued): …  based on a set of rules established by the network administrator. For example, an IPS might drop a packet that it determines to be malicious and block all further traffic from that IP address or port. Legitimate traffic, meanwhile, should be forwarded to the recipient with no apparent disruption or delay of service. According to Michael Reed of Top Layer Networks, an effective intrusion prevention system should also perform more complex monitoring and analysis, such as watching and responding to traffic patterns as well as individual packets. "Detection mechanisms can include address matching, … 
Intrusion Prevention definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement