An Intrusion Prevention System is any device which exercises access control to protect computers from exploitation. "Intrusion prevention" technology is considered by some to be an extension of intrusion detection (IDS) technology, but it is actually another form of access control, like an application layer firewall. The latest Next Generation Firewalls leverage their existing deep packet inspection engine by sharing this functionality with an Intrusion-prevention system.
Intrusion Prevention
Network Security Handbook for Service Providers
published by Juniper Networks on Dec 05, 2008
As network services migrate to IP, it is essential that they be vigilant about security. Network infrastructure must defend itself from attacks and operators must implement network security best practices.
Secure your site against fraud without intrusive measures that cause customer dropoff
published by ThreatMetrix. on Dec 19, 2008
In this new white paper, learn how it’s possible to block fraud without damaging the customer experience and causing dropoff.
Stop e-commerce fraud & its revenue loss without blocking legitimate online customers
published by ThreatMetrix. on Dec 19, 2008
In 2007 alone, $3.6 billion was lost to online fraud. This white paper shows how to block scam artists, reliably and affordably-while ensuring that real customers always have access.
Assessing Endpoint Security Solutions: Why Detection Rates Aren't Enough
published by Sophos on Mar 04, 2008
Evaluating the performance of competing endpoint security products is a time-consuming and daunting task. Enterprise decision-makers have to rely on independent competitive comparisons, performance benchmarks, and detection certifications, all covering different solutions and criteria, providing conflicting results.
Block online fraudsters and identity thieves-by letting their own PCs snitch on them
published by ThreatMetrix. on Dec 26, 2008
This white paper highlights a surprising new approach to fraud prevention: remotely recognizing a fraudster’s PC (or other device). Even with identity (password/credit card) theft, the device stays the same!
Data Privacy - The Untold Story
published by IBM on Feb 23, 2009
This webcast features addresses the challenges of protecting corporate and confidential data. It focuses on the untold story of data privacy and many of the compliance challenges that companies now face. The webcast features Dennis Gaughan and Cynthia Babb and is 55 minutes and 33 seconds.
FISMA Prescriptive Guide
published by Tripwire on Mar 31, 2008
Discover how to achieve and maintain FISMA compliance to ensure security of systems and data.
Information Leakage - the enemy is within
published by LockLizard on Dec 05, 2008
This paper covers why DRM is required for data leakage prevention from within and outside of the enterprise for use as an effective document control system. It covers why encryption and access control are only effective inside the enterprise to secure information.
IP Security Analysis to Minimize Network Security Threats
published by Ixia. on Jan 22, 2009
Losses due to security breaches and application failures that result in theft of data, service downtime and brand damage now stretch into the tens of millions of dollars per year for large enterprises, according to Infonetics Research1. Attacks and failures are seen at every level – from online applications, to networks, to mobile and core infrastructures.
Kaspersky Open Space Security Network Protection
published by Kaspersky Lab on Jul 20, 2007
Kaspersky Open Space Security offers new flexibility to network security by extending beyond the traditional workplace to protect an increasingly mobile and distributed workforce. We provide airtight protection against all forms of malware, including viruses, hacker attacks, spyware and spam.
4 Key Qualities of Effective Host-Based Intrusion Prevention (HIP) Systems
published by Third Brigade on Jul 05, 2006
Organizations that need to protect business critical applications, and sensitive data and hosts recognize that traditional network defenses can be readily bypassed by attackers. This white paper defines four key qualities of an effective host-based IPS.
Non Intrusive Learning Patterns (NILP): The Intelligent Spam Filtering Technology of the Future
published by Microworld on Jul 30, 2007
NILP from MicroWorld is an advanced, next generation technology that detects Spam and Phishing mails using unique algorithms. Before we see how NILP works, let’s first check out the magnitude of spam trouble and why traditional methods are failing to counter it.
4 Steps to Data Security Compliance: Technologies to Help Your Organization with U.S. Regulations
published by SafeNet on Nov 19, 2007
U.S. organizations that handle corporate and personal data must conform to certain government legislation to protect this private information from compromise, unauthorized access, interception, or corruption. However, organizations with little or no education of these mandates or suitable solutions will find their budgets and their manpower stretched too thin.
Network Security Checklist
published by Cisco on Jan 27, 2009
Many small and medium-sized businesses do not have adequate network security. Here's how to make sure you do. Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have held off on protecting your network, for several reasons.
On-Demand Vulnerability Management
published by Qualys on Aug 08, 2006
Learn how to start your own self-auditing process by setting goals and answering key questions about your infrastructure. This podcast examines what to look for in a self-audition solution, how to use vulnerability management to ease the pain and why your software solution really matters.
Protecting Your Network from ARP Spoofing-Based Attacks
published by Global Knowledge on Dec 20, 2005
Think that your encrypted HTTP connection to your remote server is secure? Guess again. ARP spoofing attacks are a highly effective method employed by hackers today to intercept information such as usernames, passwords and data. Understand this attack method and what you can do to protect your sensitive information.
Protecting the Inside Edge of the Network: NitroSecurity's Active Network Response
published by NitroSecurity on Nov 03, 2005
NitroSecurity's Active Network Response is a new security model that delivers network protection closer to the users at the network edge - stopping attacks before they can propagate throughout the network.
Protecting Client Systems from the Crimeware Invasion
published by Symantec on Aug 30, 2006
The IT threat landscape has changed from individual hackers disrupting network operations to organized crime stealing confidential information. Antivirus technology must be joined by a coordinated, multilayered defense that includes proactive vulnerability-based intrusion prevention, file-based intrusion prevention, and inbound and outbound traffic control.
Protecting Your Corporate Network: What Do You Know About the Endpoint Device?
published by LANDesk on Oct 21, 2005
This white paper discusses how the network access control capabilities of LANDesk® Trusted Access™ available within LANDesk Security Suite 8.6 help organizations protect and secure their enterprise networks at their endpoints to reduce malicious attacks and the resulting downtime, lost productivity, and lost revenues.
Protecting Your Network Against Email Threats
published by GFI on Jan 02, 2007
Examining the different kinds of email threats and email attack methods, this paper describes the need for a solid server-based content-checking gateway to safeguard your business against email viruses and attacks as well as information leaks.
PCI DSS Compliance with Tripwire
published by Tripwire on Jun 28, 2007
Find out step-by-step what it takes to become compliant with the Payment Card Industry (PCI) Data Security Standard (DSS), and how Tripwire can help your company achieve and maintain PCI compliance.
PDF Spam: A Step Ahead of Image Spam
published by GFI on Jul 24, 2007
This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. The latest tactic is to use the common PDF file format to send image spam. By using PDF attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.
PCI Compliance Cost Analysis: A Justified Expense
published by Solidcore on Dec 12, 2007
New report issued by Fortrex, Emagined Security and Solidcore reveals the cost of PCI compliance is justified. Fortrex, in conjunction with Solidcore and Emagined Security have compiled a PCI compliance report that reveals the cost of a breach can easily be 20 times the cost of PCI compliance, more than justifying the up-front investment.
Protecting a Large Distributed School Network from Without and Within
published by WatchGuard Technologies on Nov 15, 2007
Schools have stringent demands placed on them when it comes to protecting their networks and the students in their care. Learn how this school district got exactly what it needed for complete protection.
Producing Your Network Security Policy
published by WatchGuard Technologies on Aug 17, 2007
Get sound advice from the network security experts at WatchGuard on how to easily build and maintain a network security policy.
More Security Topics
Search The Library
Related Topics
Special Report
Winning the War for Talent in the High-Tech Industry
High-tech companies face a range of complex business challenges due to global expansion, shifting demographics, and continuous competitive pressures. Read why the high-tech HR organization finds itself at the forefront of many of these challenges, and what they must do to rise above them.