Network-Based Intrusion Prevention

26th December 2019 | Cybrary Network-Based Intrusion Prevention

IDS

Network-based Intrusion Prevention Services (aka NIPS) is a preemptive approach to network security used to identify potential threats and respond to them swiftly. Like network intrusion detection systems (NIDS), Network-based Intrusion Prevention System (NIPS) monitors network traffic and actively resets connections found to exhibit malicious behaviours before they cause their damage.

Related Terms: Network-based Intrusion Detection Services, Intrusion, Intrusion Detection

Source: CNSSI 4009, ISO/IEC 27039

What does this mean for an SMB?

Network Intrusion Prevention Services (“NIPS”) are an advanced and expensive proposition for it to work properly and effectively within a company’s environment.  It is often used in Data Centers with Cloud Hosting providers to provide a higher level of cybersecurity assurance on their critical networks.  However, in the SMB arena, it is often too expensive to be practical.  Additionally, it provides security services that would only be appropriate if all your Level 1, 2, and 3 cybersecurity maturity services, processes, and policies were in place.  Most SMB’s are not operating with this level of maturity.  Therefore, I seldom recommend NIPS or its less expensive relative NIDS (Network Intrusion Detection Services) in the SMB network space.    Exceptions to this general guidance do apply, especially within regulated industries in high finance, defense contractors seeking high level certifications for example.

To learn more about Intrusion Detection and Protection, watch this short video:

Secure your business with CyberHoot Today!!!

Sign Up Now

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

For years, organizations have relied on fake email phishing simulations to measure employee resilience to...

Read more
Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Welcome to our two-part blog series on Microsoft’s new email security enhancement now included in Office 365 P1...

Read more
Why Hackers Love MSPs and What We’re Gonna Do About It

Why Hackers Love MSPs and What We’re Gonna Do About It

"Being an MSP today is like wearing a neon sign that says, ‘Hack me! I’m the gateway to 100...

Read more