Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS

Network Intrusion Prevention Design Guide: Using IBM Security Network IPS

Publisher Description

Every organization today needs to manage the risk of exposing business-critical data, improve business continuity, and minimize the cost of managing IT security. Most all IT assets of an organization share a common network infrastructure. Therefore, the first line of defense is to establish proper network security. This security is a prerequisite for a logical set of technical countermeasures to protect from many different attack vectors that use the network to infiltrate the backbone of an organization.

The IBM® Security Network Intrusion Prevention System (IPS) stops network-based threats before they can impact the business operations of an organization. Preemptive protection, which is protection that works ahead of a threat, is available by means of a combination of line-speed performance, security intelligence, and a modular protection engine that enables security convergence. By consolidating network security demands for data security and protection for web applications, the IBM Security Network IPS serves as the security platform that can reduce the costs and complexity of deploying and managing point solutions.

This IBM Redbooks® publication provides IT architects and security specialists a better understanding of the challenging topic of blocking network threats. This book highlights security convergence of IBM Virtual Patch® technology, data security, and Web Application Protection. In addition, this book explores the technical foundation of the IBM Security Network IPS. It explains how to set up, configure, and maintain proper network perimeter protection within a real-world business scenario.

GENRE
Computing & Internet
RELEASED
2011
2 December
LANGUAGE
EN
English
LENGTH
278
Pages
PUBLISHER
IBM Redbooks
SIZE
3.8
MB

More Books by IBM Redbooks

TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012
IT Service Management Best Practices Using IBM SmartCloud Control Desk IT Service Management Best Practices Using IBM SmartCloud Control Desk
2013
Understanding LDAP - Design and Implementation Understanding LDAP - Design and Implementation
2004
SOA Policy, Service Gateway, and SLA Management SOA Policy, Service Gateway, and SLA Management
2013

Customers Also Bought

IPv6 is Easy IPv6 is Easy
2013
Beginner's Guide to Information Security Beginner's Guide to Information Security
2016
OSI 7 Layer Model OSI 7 Layer Model
2012
The State of Risk-Based Security Management The State of Risk-Based Security Management
2012
Computer Networking Computer Networking
2018
Transport Layer Transport Layer
2015