Network-Based Intrusion Prevention

26th December 2019 | Cybrary Network-Based Intrusion Prevention

IDS

Network-based Intrusion Prevention Services (aka NIPS) is a preemptive approach to network security used to identify potential threats and respond to them swiftly. Like network intrusion detection systems (NIDS), Network-based Intrusion Prevention System (NIPS) monitors network traffic and actively resets connections found to exhibit malicious behaviours before they cause their damage.

Related Terms: Network-based Intrusion Detection Services, Intrusion, Intrusion Detection

Source: CNSSI 4009, ISO/IEC 27039

What does this mean for an SMB?

Network Intrusion Prevention Services (“NIPS”) are an advanced and expensive proposition for it to work properly and effectively within a company’s environment.  It is often used in Data Centers with Cloud Hosting providers to provide a higher level of cybersecurity assurance on their critical networks.  However, in the SMB arena, it is often too expensive to be practical.  Additionally, it provides security services that would only be appropriate if all your Level 1, 2, and 3 cybersecurity maturity services, processes, and policies were in place.  Most SMB’s are not operating with this level of maturity.  Therefore, I seldom recommend NIPS or its less expensive relative NIDS (Network Intrusion Detection Services) in the SMB network space.    Exceptions to this general guidance do apply, especially within regulated industries in high finance, defense contractors seeking high level certifications for example.

To learn more about Intrusion Detection and Protection, watch this short video:

Secure your business with CyberHoot Today!!!

Sign Up Now

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware groups are not breaking in organizations the same way they did five years ago. The entry methods have...

Read more
Malicious Chrome Extension Disguised as  a Business Tools

Malicious Chrome Extension Disguised as a Business Tools

If a Chrome extension promises to remove security pop-ups and generate MFA codes, that should make you...

Read more
Sneaky Browser Extensions Are Hijacking ChatGPT Sessions

Sneaky Browser Extensions Are Hijacking ChatGPT Sessions

Cyberattacks usually start with phishing emails or weak passwords. This one did not. Security researchers...

Read more