Wifi Password Recovery - UTM - Vulnerability Scanning
Sun Sun Sun

Solutions -

What is Intrusion Prevention?

An intrusion prevention system is any device that exercises access control to protect computers from exploitation. "Intrusion prevention" technology is considered by some to be an extension of intrusion detection (IDS) technology, but it is actually another form of access control, like an application layer firewall.
Intrusion prevention systems (IPS) were invented to resolve ambiguities in passive network monitoring by placing detection systems in-line. A considerable improvement upon firewall technologies, IPS make access control decisions based on application content, rather than IP address or ports as traditional firewalls had done. As IPS were originally a literal extension of intrusion detection systems, they continue to be related.

IPS Intrusion Prevention System 

Intrusion prevention systems may also serve secondarily at the host level to deny potentially malicious activity. There are advantages and disadvantages to host-based IPS compared with network-based IPS. In many cases, the technologies are thought to be complementary. An Intrusion Prevention system must also be a very good Intrusion Detection system to enable a low rate of false positives. Some IPS systems can also prevent yet-to-be discovered attacks, such as those caused by a Buffer overflow.
Due to the fact that a high amount of new security vulnerabilities are discovered on a daily basis, it can be a hassle for the end user to keep all their servers up-to-date with the latest patches. In many cases, the patches used to rectify the security holes can be delayed days, weeks, or even months.
In some critical environments, the installation of patches can break functionality and this can result in a direct loss for the customer if their production systems are not performing optimally due to a dysfunctional patch.
Utm firewall Appliance 

How Does Intrusion Prevention Work?

Intrusion Prevention is an advanced intelligent way of scanning the different layers for vulnerabilities. It consists of many techniques to ensure the optimal and most advanced security level. This includes:
  • Database updated multiple times daily for the latest signature definitions.
  • Traffic abnormalities are being identified and if consisting of dangerous content will be blocked.
  • When a port scan is being performed, an attack will most likely follow in a matter of minutes afterwards.
  • Denial of Service (DOS) attacks protection, because a successful DOS attack can cause your system to crash or be permanently damaged.
  • Protection for known buffer overflow attacks and or other exploits being launched.
  • Zero Day Protection, which is a module that protects for known and unknown Zero Day Vulnerabilities
  • Wide protection for webmail, ftp, Windows, Linux, BSD, UNIX, Routers, Firewalls, Databases such as DB2, Oracle, MySQL, MS SQL, PostgreSQL, and more.
 Utm firewall Appliance 


Related pages
Anti-Spam Appliance
Free Scan Statement
How essential is vulnerability management?
Penetration Testing
Proxy Appliance
Solutions Part2
UTM Appliance
What is a Bayesian Filter?
What is a Content-Filter?
What is a Firewall?
What is a Proxy Server?
What is a Security Exploit?
What is a Vulnerability?
What is a Web Filter?
What is Appliance Scanning?
What is Intrusion Prevention?
What is Penetration Testing?
What is Phishing?
What is Spam?
What is Unified Threat Management?
What is Vulnerability Assessment?
What is Vulnerability Scanning?

Free Security Resources
Free Webinar Click Here

Free Vulnerability Scan

Wi-Fi Top 15 Security Tips

SecPoint Security Videos

Compatible With
Awards & Reviews

Encyclopedia | Link Policy | Privacy Statement | Resources | Sitemap | User Policy

SecPoint® © Copyright 1999-2015
US Toll Free: +1-855-489-3724 - EU Toll Free: +44-808-101-2272