Five Ways to Protect Your Network TAGS: encryption | IDS | IPS | logging | vulnerability scanning Criminals lurk behind many of the darker corners of the Internet, scouting out victims and eager to pounce when they …Continue reading →
March 19, 2024
Five Ways to Protect Your Network TAGS: encryption | IDS | IPS | logging | vulnerability scanning Criminals lurk behind many of the darker corners of the Internet, scouting out victims and eager to pounce when they …Continue reading →
Network intrusion prevention systems: Should enterprises deploy now? TAGS: IPS | network security A little more than three years ago, I witnessed a pilot deployment of an intrusion prevention system (IPS) on a …Continue reading →
Bringing the network perimeter back from the dead TAGS: firewall | IPS | network security With apologies to Samuel Clemens, the rumors of the perimeter’s death have been greatly exaggerated. I recently attended a conference …Continue reading →
Don’t let trends dictate your network security strategy TAGS: IPS | network security I recently came across a discussion group thread bemoaning the demise of host-based intrusion prevention systems (HIPS). One contributor heard …Continue reading →
Maximizing IDS/IPS implementations TAGS: IDS | IPS | network security Anomaly detection is an important part of any layered security solution. Intrusion detection, intrusion prevention and log analysis systems can …Continue reading →
Enterasys’s Dynamic Intrusion Response TAGS: IDS | IPS | product review Enterasys Networks’ development of its Dynamic Intrusion Response (DIR) platform leverages its strength as a network infrastructure products company and …Continue reading →