12 things effective intrusion prevention systems should do Making the right choice in selecting an intrusion prevention system

#1: Provide signature-based protection for server and client side attacks
#2: Scan all traffic, regardless of port or protocol
#3: Scan all traffic, both inbound and outbound
#4: Normalize traffic to prevent evasion and obfuscation
#5: Monitor and block traffic based on geographic origin
#6: Provide contextual awareness based on user
#7: Allow custom signatures to be created and installed
#8: Scan SSL encrypted traffic
#9: Detect and block malware as it enters the network
#10: Detect and block communication from systems that are already compromised
#11: Protect the network from denial of service and flood attacks
#12: Provide traffic analytics and integrate with other analytics engines


Leave a Reply

Please log in using one of these methods to post your comment:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s