Jacquelyn Bengfort is a freelance writer living in the American Midwest. Higher education remains a tempting target for hackers. “Universities have some fairly unique features that tend to increase ...
The network intrusion prevention system isn't like the firewall--it's not a must-have security tool at most big companies. But intrusion prevention system (IPS) vendors are adding features and ...
Large enterprises will continue to put an intrusion prevention system in-line behind a firewall, but budget conscious organizations with fewer IT staff members are looking at next-generation firewall ...
Talk about jumping on a bandwagon. When Gartner last summer declared “IDS is dead, long live IPS,” marketeers everywhere picked up the intrusion-prevention system buzzword and ran with it. Talk about ...
An academic network is one of the most difficult networks to secure and maintain. It must be open and accessible—much more so than networks in corporate, government, or private sectors. The academic ...
Phil Goldstein is a former web editor of the CDW family of tech magazines and a veteran technology journalist. He lives in Washington, D.C., with his wife and their animals: a dog named Brenna, and ...
First Citizens Bank, a regional bank based in Raleigh, N.C., got hit by the Code Red worm. That's not something you would have read in any news report. First Citizens didn't tell anyone about it, and ...
Do you ever wonder if your organization is running its intrusion detection and prevention system to its fullest potential? If so, you’re not alone. Many security professionals share the feeling that ...
Despite a rocky beginning, intrusion detection and prevention systems are an important part of any security arsenal. We road-test six hardware and software-based systems. Intrusion detection systems ...
Network Associates Inc. today announced new versions of its two intrusion-prevention system (IPS) products, IntruShield and Entercept, that it said will make it easier to protect corporate networks ...
The growing speed at which malicious hackers can exploit new vulnerabilities is creating a need for intrusion-prevention technologies capable of proactively detecting and blocking attacks even before ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results