Download now Free registration required
Some organizations have a love-hate relationship with Intrusion Prevention System technology, and its older cousin, the Intrusion Detection System. On the one hand, IPS is vital for protecting against a deluge of application layer exploits. According to a Verizon Business Report in 2008 hacking led to data breaches by a margin of almost two to one. 39% of the attacks targeting the Application Service Layer led to data compromise. These attacks often evade usual port/protocol defenses established by a firewall, so detection requires deep-packet inspection with IPS. But when an organization uses in-line blocking deployment of IPS, too often the processing requirements prevent simultaneous use of other security functions. The dilemma of connectivity or security is now moot.
- Format: PDF
- Size: 753.51 KB