White Papers by Topic: Intrusion detection

Resources available: 4

Managing to Secure

Many security professionals responsibilities include managing firewalls, worrying about e-mail security, testing and deploying software patches, securing Web caches and gateways and much more. The last thing network security manager’s need is more devices to manage. Learn about the four key components of IPS manageability to consider for effective network-security management.

The 5 Building Blocks of Attack Coverage

When it comes to intrusion prevention – and to detecting and blocking unwanted or malicious network traffic – the focus should be on quality of a solution’s attack coverage, not quantity. Learn about the five building blocks of attack coverage to help determine why one Intrusion Prevention System (IPS) is better than another.

IPS vs IDS: Similar but Polar Opposite Underneath

A common notion is that an Intrusion Prevention System (IPS) is nothing more than an Intrusion Detection System (IDS) deployed in-line with blocking capabilities. Learn why this IPS notion is incorrect and the many critical differences in the nature and priority of IPS and IDS requirements organizations need to consider before making a commitment.

3 Waves, 1 Defense: How IPS Protects

Dating back to ancient Greece, a common military tactic was to launch a “human-wave” attack. Network security attackers today use a version of this ancient military tactic, but have become increasingly sophisticated. Learn how the security threat landscape has evolved and how to determine the best use of network security solutions to block ongoing and future waves of attacks.

©1994-2014 Infoworld, Inc.