IT Systems  >   Business Systems  >   Security Systems  >  

Intrusion Prevention Systems

RSS Feed   
ALSO CALLED: IPS
DEFINITION: An intrusion prevention system is any device which exercises access control to protect computers from exploitation. Intrusion prevention technology is considered by some to be an extension of intrusion detection (IDS) technology, but it is actually another form of access control, like an application layer firewall.
Intrusion Prevention Systems Reports
1 - 25 of 135 Matches Previous Page  |  Next Page
The Impact of Security Automation on Enterprise IT
sponsored by Juniper Networks
EGUIDE: The use of security automation and orchestration systems is on the rise, due to their ability to provide automatic responses to threats. Learn how SAO and automated incident response can benefit security in the cloud and in your enterprise.
Posted: 21 Sep 2018 | Published: 19 Sep 2018

Juniper Networks

7 Experts on Security Automation and Analytics
sponsored by Juniper Networks
EBOOK: In this e-book, 7 cybersecurity experts share their insights, strategies, and best practices surrounding security automation and analytics. Learn how their takeaways can help you overcome some of the complexities associated with security automation and analytics, today.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

Juniper Networks

5 Top Recommendations for Effective Threat Detection
sponsored by Alert Logic
RESOURCE: If your organization is looking to improve the effectiveness of your threat detection program, uncover the top 5 recommendations for effective threat detection, today.
Posted: 30 Aug 2018 | Published: 30 Aug 2018

Alert Logic

How to Prevent Cloud Cryptojacking Attacks on your Enterprise
sponsored by Cisco Umbrella
EGUIDE: Cloud cryptojacking attacks are a newer threat targeting enterprises. Cybersecurity expert Rob Shapland – an ethical hacker who specializes in simulating advanced cyberattacks against corporate networks – explains what safeguards you should have in place to prevent these attacks.
Posted: 24 Aug 2018 | Published: 31 May 2018

Cisco Umbrella

The State of the SOC: An Enterprise Study on Threat Detection and Response
sponsored by Fidelis
RESEARCH CONTENT: Today, many Security Operations Centers (SOCs) are highly targeted by cybercriminals and their security analysts are being overwhelmed. Download this report to gain insights on the specific challenges faced in the SOC.
Posted: 21 Aug 2018 | Published: 31 Mar 2018

Fidelis

Capture the Flag with Deception Defenses
sponsored by Fidelis
WHITE PAPER: Deception — the use of decoys, traps, lures and other mechanisms — is quickly gaining the attention of organizations seeking an efficient post-breach detection technology. Learn how your organization can be a part of the cyberdeception trend to expose attacks as they happen.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

Fidelis

What's Hiding Within Your Metadata? How to Decode Your Network's Deepest and Darkest Secrets
sponsored by Fidelis
WHITE PAPER: Find out how metadata can transform the way you detect and investigate critical security threats in your network.
Posted: 20 Aug 2018 | Published: 20 Aug 2018

Fidelis

Ensure Data Protection with Fidelis Network
sponsored by Fidelis
VIDEO: To ensure an organization's digital assets are well protected, it is important to choose a full-featured network Data Loss Prevention (DLP) strategy that prevents a loss before it occurs. Download this webinar to find out how your organization can implement a strategy just like this.
Posted: 17 Aug 2018 | Premiered: 17 Aug 2018

Fidelis

Automate & Accelerate Your Security Operations
sponsored by Fidelis
EBOOK: Put your current threat detection and response strategy to the test and with a checklist of the 5 must have security automation capabilities to see if your enterprise is up to speed.
Posted: 17 Aug 2018 | Published: 17 Aug 2018

Fidelis

First Midwest Bank Uses Fidelis Deception to Detect and Respond to Security Anomalies
sponsored by Fidelis
CASE STUDY: Learn how a community bank used Fidelis Deception to detect and respond to incidents in their network, catching cybercriminals in the act.
Posted: 16 Aug 2018 | Published: 16 Aug 2018

Fidelis

Utilizing Deception for Effective Breach Detection
sponsored by Fidelis
WHITE PAPER: Learn how sophisticated deception software can cover all of the phases of the attack life cycle within your network, so you can catch cybercriminals in the act.
Posted: 16 Aug 2018 | Published: 16 Aug 2018

Fidelis

Breathe New Life Into Your IPS Strategy with Today's Evolved Options
sponsored by Fortinet, Inc.
WEBCAST: Intrusion Prevention Systems (IPS) play a critical role in network security by monitoring connections for malicious activities, but attacks are becoming more complex. Listen in on this webinar to learn what approach to IPS will help meet your unique network security needs.
Posted: 02 Jul 2018 | Premiered: Jul 2, 2018

Fortinet, Inc.

Active defence through deceptive IPS
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway security series explains how intrusion prevention systems (IPS) can be used with a 'honeynet' to gather intelligence on cyber attacks
Posted: 05 Jun 2017 | Published: 05 Jun 2017

ComputerWeekly.com

100G+ IDS/IPS Solutions that Enable Monitoring
sponsored by ADLINK Technology
RESOURCE: In this resource you can learn about traditional detection technologies, challenges of protecting web-based networks, user-based behavioral analysis to detect abnormal behavior, and more.
Posted: 09 Aug 2018 | Published: 09 Aug 2018

ADLINK Technology

Top 5 Log Sources You Should Be Ingesting but Probably Aren't
sponsored by ReliaQuest
WHITE PAPER: To maximize the benefits of logging efforts, organizations must evaluate and adapt existing processes to fit current needs and threats. Find out which logging sources your enterprise should be investing in.
Posted: 18 Jul 2018 | Published: 18 Jul 2018


Coordinate Network Security Tools for a Unified Defense
sponsored by Ixia - Keysight
WHITE PAPER: Find out how to extend the reach of security tools to access the entire network, coordinating intrusion prevention/detection systems (IPS/IDS), data loss prevention (DLP), and firewalls into a single, staunch line of defense.
Posted: 28 Jun 2018 | Published: 31 Dec 2017

Ixia - Keysight

Improve IT Operational Response: Automate Your Communication, Collaboration, and Escalation Processes
sponsored by EverBridge Inc.
RESOURCE: In today's digital world, almost all companies experience IT incidents and events that threaten the availability of their mission-critical business applications or services. Access this resource to learn 5 keys to incident identification and 10 reasons why your IT incidents are not resolved faster.
Posted: 30 May 2018 | Published: 30 May 2018

EverBridge Inc.

Critical IT Events Demand a Faster Response Than Ever
sponsored by EverBridge Inc.
WHITE PAPER: An IDG survey finds that it takes most companies 25 to 39 minutes just to assemble an incident response team before it actually begins to respond. Access this white paper to uncover more key findings regarding incident response plans and how security automation can help.
Posted: 29 May 2018 | Published: 29 May 2018

EverBridge Inc.

Advanced Persistent Threats and Other Advanced Attacks: Threat Analysis and Defense Strategies for SMB, Mid-size, and Enterprise Organizations
sponsored by Websense, Inc.
WHITE PAPER: Understanding exactly what an Advanced Persistent Threat (APT) is can be difficult, as the hype surrounding this dangerous threat has clouded its definition. View this paper to discover the nature of APT risks and gain key recommendations on how to defend against them.
Posted: 28 Aug 2017 | Published: 15 Sep 2011

Websense, Inc.

Tolly Report: IBM Security Network Protection XGS 7100 Evaluation
sponsored by IBM
RESOURCE: This report shows you the test results found by Tolly of IBM Security Network Protection XGS 7100 appliance. Learn how this next-generation intrusion prevention appliance faired in attack detection, blocking of various threat corpora, multi-protocol throughput and other tests.
Posted: 24 Oct 2016 | Published: 01 Feb 2016

IBM

NSS Labs Data Center IPS Test Report: IBM XGS 7100
sponsored by IBM
PRODUCT OVERVIEW: This report represents the independent test results of IBM Security Network Protection XGS 7100 v5.3.2.1 conducted by NSS Labs. Learn how IBM's Data Center Intrusion Prevention System (DCIPS) faired against NSS Labs' tests and how it stacks up against other DCIPS products.
Posted: 24 Oct 2016 | Published: 30 Sep 2016

IBM

Next-Generation IPS in the Era of Targeted Attacks
sponsored by IBM
WHITE PAPER: This white paper talks about the future of IPS and gives you statistics from the current IPS market. Access now to learn about the features, capabilitie, costs and impacts of next-generation IPS and the future of cyberattacks in general.
Posted: 21 Apr 2016 | Published: 01 Jan 2016

IBM

The Expansion of the IPS Appliance Market and Intrusion Prevention Systems Assessment
sponsored by IBM
RESOURCE: In this report, you will evaluate several best-in-class intrusion prevention systems, and determine which stand-alone IPS appliances offer the functionality needed in your enterprise. Read on to learn which vendors offer IPS and IDS functionality to provide control over public cloud workloads.
Posted: 22 Jan 2016 | Published: 16 Nov 2015

IBM

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

Intrusion Detection and Prevention: Decision Time
sponsored by SearchSecurity.com
EBOOK: Learn how to evaluate your potential vendor's IDS/IPS product and its ability to meet your specific business requirements.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

SearchSecurity.com
1 - 25 of 135 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement