(Go: >> BACK << -|- >> HOME <<)

An Intrusion Prevention System is any device which exercises access control to protect computers from exploitation. "Intrusion prevention" technology is considered by some to be an extension of intrusion detection (IDS) technology, but it is actually another form of access control, like an application layer firewall. The latest Next Generation Firewalls leverage their existing deep packet inspection engine by sharing this functionality with an Intrusion-prevention system.

Intrusion Prevention


Juniper Networks

Network Security Handbook for Service Providers

published by Juniper Networks on Dec 05, 2008

As network services migrate to IP, it is essential that they be vigilant about security. Network infrastructure must defend itself from attacks and operators must implement network security best practices.

ThreatMetrix.

Secure your site against fraud without intrusive measures that cause customer dropoff

published by ThreatMetrix. on Dec 19, 2008

In this new white paper, learn how it’s possible to block fraud without damaging the customer experience and causing dropoff.

ThreatMetrix.

Stop e-commerce fraud & its revenue loss without blocking legitimate online customers

published by ThreatMetrix. on Dec 19, 2008

In 2007 alone, $3.6 billion was lost to online fraud. This white paper shows how to block scam artists, reliably and affordably-while ensuring that real customers always have access.

Sophos

Assessing Endpoint Security Solutions: Why Detection Rates Aren't Enough

published by Sophos on Mar 04, 2008

Evaluating the performance of competing endpoint security products is a time-consuming and daunting task. Enterprise decision-makers have to rely on independent competitive comparisons, performance benchmarks, and detection certifications, all covering different solutions and criteria, providing conflicting results.

ThreatMetrix.

Block online fraudsters and identity thieves-by letting their own PCs snitch on them

published by ThreatMetrix. on Dec 26, 2008

This white paper highlights a surprising new approach to fraud prevention: remotely recognizing a fraudster’s PC (or other device). Even with identity (password/credit card) theft, the device stays the same!

IBM

Data Privacy - The Untold Story

published by IBM on Feb 23, 2009

This webcast features addresses the challenges of protecting corporate and confidential data. It focuses on the untold story of data privacy and many of the compliance challenges that companies now face. The webcast features Dennis Gaughan and Cynthia Babb and is 55 minutes and 33 seconds.

Tripwire

FISMA Prescriptive Guide

published by Tripwire on Mar 31, 2008

Discover how to achieve and maintain FISMA compliance to ensure security of systems and data.

LockLizard

Information Leakage - the enemy is within

published by LockLizard on Dec 05, 2008

This paper covers why DRM is required for data leakage prevention from within and outside of the enterprise for use as an effective document control system. It covers why encryption and access control are only effective inside the enterprise to secure information.

Ixia.

IP Security Analysis to Minimize Network Security Threats

published by Ixia. on Jan 22, 2009

Losses due to security breaches and application failures that result in theft of data, service downtime and brand damage now stretch into the tens of millions of dollars per year for large enterprises, according to Infonetics Research1. Attacks and failures are seen at every level – from online applications, to networks, to mobile and core infrastructures.

Kaspersky Lab

Kaspersky Open Space Security Network Protection

published by Kaspersky Lab on Jul 20, 2007

Kaspersky Open Space Security offers new flexibility to network security by extending beyond the traditional workplace to protect an increasingly mobile and distributed workforce.  We provide airtight protection against all forms of malware, including viruses, hacker attacks, spyware and spam.

Third Brigade

4 Key Qualities of Effective Host-Based Intrusion Prevention (HIP) Systems

published by Third Brigade on Jul 05, 2006

Organizations that need to protect business critical applications, and sensitive data and hosts recognize that traditional network defenses can be readily bypassed by attackers. This white paper defines four key qualities of an effective host-based IPS.

Microworld

Non Intrusive Learning Patterns (NILP): The Intelligent Spam Filtering Technology of the Future

published by Microworld on Jul 30, 2007

NILP from MicroWorld is an advanced, next generation technology that detects Spam and Phishing mails using unique algorithms. Before we see how NILP works, let’s first check out the magnitude of spam trouble and why traditional methods are failing to counter it.

SafeNet

4 Steps to Data Security Compliance: Technologies to Help Your Organization with U.S. Regulations

published by SafeNet on Nov 19, 2007

U.S. organizations that handle corporate and personal data must conform to certain government legislation to protect this private information from compromise, unauthorized access, interception, or corruption. However, organizations with little or no education of these mandates or suitable solutions will find their budgets and their manpower stretched too thin.

Cisco

Network Security Checklist

published by Cisco on Jan 27, 2009

Many small and medium-sized businesses do not have adequate network security. Here's how to make sure you do. Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have held off on protecting your network, for several reasons.

Qualys

On-Demand Vulnerability Management

published by Qualys on Aug 08, 2006

Learn how to start your own self-auditing process by setting goals and answering key questions about your infrastructure. This podcast examines what to look for in a self-audition solution, how to use vulnerability management to ease the pain and why your software solution really matters.

Global Knowledge

Protecting Your Network from ARP Spoofing-Based Attacks

published by Global Knowledge on Dec 20, 2005

Think that your encrypted HTTP connection to your remote server is secure? Guess again. ARP spoofing attacks are a highly effective method employed by hackers today to intercept information such as usernames, passwords and data. Understand this attack method and what you can do to protect your sensitive information.

NitroSecurity

Protecting the Inside Edge of the Network: NitroSecurity's Active Network Response

published by NitroSecurity on Nov 03, 2005

NitroSecurity's Active Network Response is a new security model that delivers network protection closer to the users at the network edge - stopping attacks before they can propagate throughout the network. 

Symantec

Protecting Client Systems from the Crimeware Invasion

published by Symantec on Aug 30, 2006

The IT threat landscape has changed from individual hackers disrupting network operations to organized crime stealing confidential information. Antivirus technology must be joined by a coordinated, multilayered defense that includes proactive vulnerability-based intrusion prevention, file-based intrusion prevention, and inbound and outbound traffic control.

LANDesk

Protecting Your Corporate Network: What Do You Know About the Endpoint Device?

published by LANDesk on Oct 21, 2005

This white paper discusses how the network access control capabilities of LANDesk® Trusted Access™ available within LANDesk Security Suite 8.6 help organizations protect and secure their enterprise networks at their endpoints to reduce malicious attacks and the resulting downtime, lost productivity, and lost revenues.

GFI

Protecting Your Network Against Email Threats

published by GFI on Jan 02, 2007

Examining the different kinds of email threats and email attack methods, this paper describes the need for a solid server-based content-checking gateway to safeguard your business against email viruses and attacks as well as information leaks.

Tripwire

PCI DSS Compliance with Tripwire

published by Tripwire on Jun 28, 2007

Find out step-by-step what it takes to become compliant with the Payment Card Industry (PCI) Data Security Standard (DSS), and how Tripwire can help your company achieve and maintain PCI compliance.

GFI

PDF Spam: A Step Ahead of Image Spam

published by GFI on Jul 24, 2007

This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. The latest tactic is to use the common PDF file format to send image spam. By using PDF attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.

Solidcore

PCI Compliance Cost Analysis: A Justified Expense

published by Solidcore on Dec 12, 2007

New report issued by Fortrex, Emagined Security and Solidcore reveals the cost of PCI compliance is justified. Fortrex, in conjunction with Solidcore and Emagined Security have compiled a PCI compliance report that reveals the cost of a breach can easily be 20 times the cost of PCI compliance, more than justifying the up-front investment.

WatchGuard Technologies

Protecting a Large Distributed School Network from Without and Within

published by WatchGuard Technologies on Nov 15, 2007

Schools have stringent demands placed on them when it comes to protecting their networks and the students in their care. Learn how this school district got exactly what it needed for complete protection.

WatchGuard Technologies

Producing Your Network Security Policy

published by WatchGuard Technologies on Aug 17, 2007

Get sound advice from the network security experts at WatchGuard on how to easily build and maintain a network security policy.



More Security Topics

Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, Phishing, PKI, Policy Based Management, Security Management, Security Policies, Single Sign On, SSL, Secure Instant Messaging, Web Service Security, PCI Compliance, Vulnerability Management

Search The Library

Related Topics

Access Control
165 Documents
Authentication
101 Documents
Encryption
106 Documents
Firewalls
67 Documents
Hacker Detection
88 Documents
IPSec
17 Documents
IT Management
487 Documents
Internet Security
195 Documents
Network Security
239 Documents
Security
532 Documents
VPN
69 Documents
Wireless Security
63 Documents

Special Report

Winning the War for Talent in the High-Tech Industry

High-tech companies face a range of complex business challenges due to global expansion, shifting demographics, and continuous competitive pressures. Read why the high-tech HR organization finds itself at the forefront of many of these challenges, and what they must do to rise above them.