Network Intrusion Prevention Design Guide: Using IBM Security Network IPS Network Intrusion Prevention Design Guide: Using IBM Security Network IPS

Network Intrusion Prevention Design Guide: Using IBM Security Network IPS

    • 5.0 • 2개의 평가

출판사 설명

Every organization today needs to manage the risk of exposing business-critical data, improve business continuity, and minimize the cost of managing IT security. Most all IT assets of an organization share a common network infrastructure. Therefore, the first line of defense is to establish proper network security. This security is a prerequisite for a logical set of technical countermeasures to protect from many different attack vectors that use the network to infiltrate the backbone of an organization.

The IBM® Security Network Intrusion Prevention System (IPS) stops network-based threats before they can impact the business operations of an organization. Preemptive protection, which is protection that works ahead of a threat, is available by means of a combination of line-speed performance, security intelligence, and a modular protection engine that enables security convergence. By consolidating network security demands for data security and protection for web applications, the IBM Security Network IPS serves as the security platform that can reduce the costs and complexity of deploying and managing point solutions.

This IBM Redbooks® publication provides IT architects and security specialists a better understanding of the challenging topic of blocking network threats. This book highlights security convergence of IBM Virtual Patch® technology, data security, and Web Application Protection. In addition, this book explores the technical foundation of the IBM Security Network IPS. It explains how to set up, configure, and maintain proper network perimeter protection within a real-world business scenario.

장르
컴퓨터 및 인터넷
출시일
2011년
12월 2일
언어
EN
영어
길이
278
페이지
출판사
IBM Redbooks
판매자
International Business Machines Corp
크기
3.8
MB
IBM Security Solutions Architecture for Network, Server and Endpoint IBM Security Solutions Architecture for Network, Server and Endpoint
2011년
Cybersecurity Essentials Cybersecurity Essentials
2018년
CompTIA Security+ SY0-601 Exam Cram CompTIA Security+ SY0-601 Exam Cram
2020년
Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601)
2021년
The InfoSec Handbook The InfoSec Handbook
2014년
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide ISC2 CISSP Certified Information Systems Security Professional Official Study Guide
2024년
TCP/IP Tutorial and Technical Overview TCP/IP Tutorial and Technical Overview
2006년
Advanced Networking Concepts Applied Using Linux on IBM System z Advanced Networking Concepts Applied Using Linux on IBM System z
2012년
IPv6 Introduction and Configuration IPv6 Introduction and Configuration
2012년
IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager IT Security Compliance Management Design Guide with IBM Tivoli Security Information and Event Manager
2010년
IBM/Cisco Multiprotocol Routing: An Introduction and Implementation IBM/Cisco Multiprotocol Routing: An Introduction and Implementation
2009년
Big Data Networked Storage Solution for Hadoop Big Data Networked Storage Solution for Hadoop
2013년
The InfoSec Handbook The InfoSec Handbook
2014년
Cloud Security Starter Kit – Overview Cloud Security Starter Kit – Overview
2011년
Security of Networks and Services in an All-Connected World Security of Networks and Services in an All-Connected World
2017년
IPv6 is Easy IPv6 is Easy
2013년
Security in Computer and Information Sciences Security in Computer and Information Sciences
2018년
Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force Creating a Trusted Network for Homeland Security: Second Report of the Markle Foundation Task Force
2012년