IT Systems  >   Business Systems  >   Security Systems  >  

Intrusion Prevention Systems

RSS Feed   
ALSO CALLED: IPS
DEFINITION: An intrusion prevention system is any device which exercises access control to protect computers from exploitation. Intrusion prevention technology is considered by some to be an extension of intrusion detection (IDS) technology, but it is actually another form of access control, like an application layer firewall.
Intrusion Prevention Systems Reports
1 - 25 of 126 Matches Previous Page  |  Next Page
First Midwest Bank Uses Fidelis Deception to Detect and Respond to Security Anomalies
sponsored by Fidelis
CASE STUDY: Learn how a suburban bank used Fidelis Deception to detect and respond to incidents in their network, catching cybercriminals in the act of their crime.
Posted: 16 Aug 2018 | Published: 16 Aug 2018

Fidelis

Utilizing Deception for Effective Breach Detection
sponsored by Fidelis
WHITE PAPER: Learn how sophisticated deception software can cover all of the phases of the attack life cycle within your network, so you can catch cybercriminals in the scene of the crime.
Posted: 16 Aug 2018 | Published: 16 Aug 2018

Fidelis

100G+ IDS/IPS Solutions that Enable Monitoring
sponsored by ADLINK Technology
RESOURCE: In this resource you can learn about traditional detection technologies, challenges of protecting web-based networks, user-based behavioral analysis to detect abnormal behavior, and more.
Posted: 09 Aug 2018 | Published: 09 Aug 2018

ADLINK Technology

Top 5 Log Sources You Should Be Ingesting but Probably Aren't
sponsored by ReliaQuest
WHITE PAPER: To maximize the benefits of logging efforts, organizations must evaluate and adapt existing processes to fit current needs and threats. Find out which logging sources your enterprise should be investing in.
Posted: 18 Jul 2018 | Published: 18 Jul 2018


Breathe New Life Into Your IPS Strategy with Today's Evolved Options
sponsored by Fortinet, Inc.
WEBCAST: Intrusion Prevention Systems (IPS) play a critical role in network security by monitoring connections for malicious activities, but attacks are becoming more complex. Listen in on this webinar to learn what approach to IPS will help meet your unique network security needs.
Posted: 02 Jul 2018 | Premiered: Jul 2, 2018

Fortinet, Inc.

Improve IT Operational Response: Automate Your Communication, Collaboration, and Escalation Processes
sponsored by EverBridge Inc.
RESOURCE: In today's digital world, almost all companies experience IT incidents and events that threaten the availability of their mission-critical business applications or services. Access this resource to learn 5 keys to incident identification and 10 reasons why your IT incidents are not resolved faster.
Posted: 30 May 2018 | Published: 30 May 2018

EverBridge Inc.

Critical IT Events Demand a Faster Response Than Ever
sponsored by EverBridge Inc.
WHITE PAPER: An IDG survey finds that it takes most companies 25 to 39 minutes just to assemble an incident response team before it actually begins to respond. Access this white paper to uncover more key findings regarding incident response plans and how security automation can help.
Posted: 29 May 2018 | Published: 29 May 2018

EverBridge Inc.

Active defence through deceptive IPS
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway security series explains how intrusion prevention systems (IPS) can be used with a 'honeynet' to gather intelligence on cyber attacks
Posted: 05 Jun 2017 | Published: 05 Jun 2017

ComputerWeekly.com

Coordinate Network Security Tools for a Unified Defense
sponsored by Ixia - Keysight
WHITE PAPER: Find out how to extend the reach of security tools to access the entire network, coordinating intrusion prevention/detection systems (IPS/IDS), data loss prevention (DLP), and firewalls into a single, staunch line of defense.
Posted: 28 Jun 2018 | Published: 31 Dec 2017

Ixia - Keysight

Advanced Persistent Threats and Other Advanced Attacks: Threat Analysis and Defense Strategies for SMB, Mid-size, and Enterprise Organizations
sponsored by Websense, Inc.
WHITE PAPER: Understanding exactly what an Advanced Persistent Threat (APT) is can be difficult, as the hype surrounding this dangerous threat has clouded its definition. View this paper to discover the nature of APT risks and gain key recommendations on how to defend against them.
Posted: 28 Aug 2017 | Published: 15 Sep 2011

Websense, Inc.

Tolly Report: IBM Security Network Protection XGS 7100 Evaluation
sponsored by IBM
RESOURCE: This report shows you the test results found by Tolly of IBM Security Network Protection XGS 7100 appliance. Learn how this next-generation intrusion prevention appliance faired in attack detection, blocking of various threat corpora, multi-protocol throughput and other tests.
Posted: 24 Oct 2016 | Published: 01 Feb 2016

IBM

NSS Labs Data Center IPS Test Report: IBM XGS 7100
sponsored by IBM
PRODUCT OVERVIEW: This report represents the independent test results of IBM Security Network Protection XGS 7100 v5.3.2.1 conducted by NSS Labs. Learn how IBM's Data Center Intrusion Prevention System (DCIPS) faired against NSS Labs' tests and how it stacks up against other DCIPS products.
Posted: 24 Oct 2016 | Published: 30 Sep 2016

IBM

Next-Generation IPS in the Era of Targeted Attacks
sponsored by IBM
WHITE PAPER: This white paper talks about the future of IPS and gives you statistics from the current IPS market. Access now to learn about the features, capabilitie, costs and impacts of next-generation IPS and the future of cyberattacks in general.
Posted: 21 Apr 2016 | Published: 01 Jan 2016

IBM

The Expansion of the IPS Appliance Market and Intrusion Prevention Systems Assessment
sponsored by IBM
RESOURCE: In this report, you will evaluate several best-in-class intrusion prevention systems, and determine which stand-alone IPS appliances offer the functionality needed in your enterprise. Read on to learn which vendors offer IPS and IDS functionality to provide control over public cloud workloads.
Posted: 22 Jan 2016 | Published: 16 Nov 2015

IBM

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

Intrusion Detection and Prevention: Decision Time
sponsored by SearchSecurity.com
EBOOK: Learn how to evaluate your potential vendor's IDS/IPS product and its ability to meet your specific business requirements.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

SearchSecurity.com

Intrusion Detection and Prevention: RFP Technology Decisions
sponsored by SearchSecurity.com
EBOOK: To properly evaluate IDS/IPS products, you must understand vendor offerings and how well they fit with your organization.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

SearchSecurity.com

Intrusion Detection and Protection: From Business Problem to Technical Solution
sponsored by SearchSecurity.com
EBOOK: Learn how IDS/IPS help you thwart attacks and mitigate post-attack damage.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

SearchSecurity.com

Vendor Landscape: Intrusion Detection and Prevention Systems
sponsored by IBM
WHITE PAPER: This comprehensive resource compares 12 competitors in the Intrusion Detection and Prevention Systems (IDPS) market, providing a number of tools for comparing and evaluating each vendor's solution in order to determine the best fit for your enterprise's needs.
Posted: 28 Aug 2014 | Published: 31 Dec 2013

IBM

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 06 Jul 2014 | Published: 02 Jul 2014

Sophos

Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER: This white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

IBM

HP TippingPoint Provides Next-Generation Network Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This informative paper examines an intrusion prevention system that is simple, reliable, and effective, ensuring that your network is kept safe from unwanted access or attacks.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Hewlett Packard Enterprise

Enterprise Security and your Technology
sponsored by Hewlett Packard Enterprise
WEBCAST: This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett Packard Enterprise

The University of Leeds Stops Millions of Attacks and Countless Illegal Downloads with HP TippingPoint
sponsored by Hewlett Packard Enterprise
CASE STUDY: This case study focuses on the University of Leeds' experience with an intrusion prevention system (IPS) that helped IT secure networks without disturbing Web access.
Posted: 29 May 2014 | Published: 31 May 2012

Hewlett Packard Enterprise

Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems
sponsored by DellEMC and Intel®
WHITE PAPER: Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.
Posted: 12 May 2014 | Published: 12 May 2014

DellEMC and Intel®
1 - 25 of 126 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement