Search Content
find
CATALOG
Skip Navigation Links.
Expand Data InfrastructureData Infrastructure
Expand Data ToolsData Tools
Expand Desktops, Laptops and OSDesktops, Laptops and OS
Expand Enterprise ApplicationsEnterprise Applications
Expand IT InfrastructureIT Infrastructure
Expand IT ManagementIT Management
Expand Networking and CommunicationsNetworking and Communications
Expand SecuritySecurity
Expand Servers and Server OSServers and Server OS
Expand Software and Web DevelopmentSoftware and Web Development
Expand StorageStorage
CONNECTIONSmore
Connect with other members or invite your contacts to the community.
GROUPSmore
Join an existing group to participate in the group discussions or create a new group of your own to create discussions around topics of interest to you and your work.
MY RESOURCESmore
Find info or add new info to your ITmodelbook. You can find white papers, technology reports, business analysis, webinars, presentations and more. You can also share your own authored content and resources you like by adding this info.
Resources you may like
  • Share within ITmb

Network Intrusion Prevention Systems (IPS) can be effective tools in the arsenal of the security practitioner—or they can be expensive failures. To help ensure the former, an enterprise IPS deployment should meet seven key requirements. Security managers looking to install IPS in their networks will be able to use evaluation criteria in this white paper as a way to help differentiate products and identify those most suited to an enterprise deployment.

The seven requirements for enterprise-class IPS are:
  1. Availability of a broad hardware range with offerings ranging from branch-office T1-class devices to enterprise multi-gigabit systems;
  2. A detection engine incorporating multiple technologies, including signature matching and protocol anomaly and behavior anomaly detection;
  3. An ability to provide a "big picture" context of information about the network and its devices to qualify security information as well as speed analysis;
  4. IDS-like features to detect less critical threats, perform behavioral analysis and facilitate security forensics toolkits;
  5. Centralized management and alerting capabilities across multiple devices;
  6. An analysis toolkit that efficiently drives policy refinement; and,
  7. Network security tools, especially firewalling, to simplify deployment.
Nokia is well positioned to help companies protect against viruses, abuse, hackers, and information theft so business keeps moving. Together, with partners like Check Point and Sourcefire, Nokia provides network and mobile security solutions so companies can provide an increasingly mobile workforce access to business information without compromise.

Prepared by Opus One; Sponsored by Nokia.

Keywords
Evaluating Enterprise IPS: Seven Key Requirements, Nokia, Nokia White Paper, Opus One, Network Intrusion Prevention Systems (IPS), Check Point and Sourcefire
Offered by
Evaluating Enterprise IPS: Seven Key Requirements
URL
Files
The resource is available from the link above.
Ask a question
search Paper Image Add papers image
Bookmark to
My ITmodelbook add
Group ITmodelbooks
 
'Sixt Car Rental'
'Apple iTunes'
 

Latest reports from top IT companies:

SAP HP Janrain HubSpot PrepLogic Motorola BNP Media Informatica Microsoft Jobvite