IPS: A Key Network Protection in an Age of Increasing Threats

  /     /     /  
Publicated : 22/11/2024   Category : security


IPS: A Key Network Protection in an Age of Increasing Threats


Intrusion prevent systems or IPS have had a checkered history in the enterprise, but increases in malicious activity across business networks have shown the technology can make a big security difference.



Intrusion prevention systems (IPS) have had something of an up-and-down history within enterprise security. Originally not as popular as their intrusion detection cousins, IPS eventually outpaced detection systems, and todays next-generation IPS market is flooded with different vendors, approaches and results.
But behind the shiny storefront, what do enterprises need to know about IPS, what does the technology actually do for security, and why is it sometimes not ideal?
IPS vs. IDS vs. reality
Years ago, many companies were skeptical about IPS, and worried that because the system typically sits inline on the network, false positives would slow all traffic and deny access to users. This was seen in the early 2000s as a greater risk than instead adopting detection systems that flag issues but leave treatment to analysts.
The theory was that humans are better at deciding a course of action, rather than IPS sets of rules which may be correctly or incorrectly applied.
(Source:
Pixabay
)
Of course, as the number of vulnerabilities and even more exploits came along, that approach wasnt viable any more as enterprises and their security teams succumbed to alert fatigue and the lack of resources to handle them all. Although still signature-based, IPS was seen as more proactive than mere detection, and the rest is history.
Retail impact
The retail industry is unfortunately full of examples where IPS could have helped, such as details stolen from
5 million credit cards of Saks customers
, or the loss of card data from
customers of SONIC Drive Thru
.
Gary Sprague, director of information security at
Rent-A-Center
, a national rent-to-purchase consumer goods retailer with over 3,000 stores in 50 states, knows that IPS is a 24x7x365 operation. Hes aware of the mistakes other retail organizations have made.
So, although Sprague acknowledges its a chore to keep IPS signature files up-to-date, along with manual tuning to ensure legitimate traffic is not stopped, he treats customer data very seriously.
We work to not store information that is most attractive (to hackers). One cannot rest when protecting important data, Sprague told Security Now.
IPS for the cloud
One thing that really gives at least one CEO the willies is the lack of physical access to the perimeter when data is stored or moves through the cloud. Thats not surprising because, as a cloud supplier to enterprises, hes responsible for his half of that.
We have to assume that the shared responsibility model is working. AWS and Azure handle the physical side. If we can count on them -- and I believe we can -- then we have to get our arms around virtual entry points, David Levin, CEO of
CloudspaceUSA
, a firm that provides cloud services to enterprises based in Houston, told SecurityNow.
There are many (of these) as we have many accounts, public addresses, gateway devices, VPNs, etc. That means we need as much verbose log information on external transitioning traffic as possible, Levin added. Plus, we need internal traffic details from agents monitoring network traffic, and then a system to boil it all down from our partner Alert Logic, for the SOC and analytics.
Now entering its fifth year, the
2020 Vision Executive Summit
is an exclusive meeting of global CSP executives focused on navigating the disruptive forces at work in telecom today. Join us in Lisbon on December 4-6 to meet with fellow experts as we define the future of next-gen communications and how to make it profitable.
Levin makes the point that, with so many existing variables in the cloud environment, one thing he loves is consistency -- meaning limiting the number of weak points in his architectures. He works with a single IPS supplier because to work with more would be an inherent security risk.
That would introduce varying standards, protocols and other variables… and our designs would have to be more complex which would inherently be less secure, he said.
The bugbear for Levin is that some IPS systems never feel integrated or automated enough for his comfort level, and so there are still some trade-offs. And, as an evident realist, hes clear that security is fundamentally about best effort and practice. Along with the pen tests and security audits youd expect from this type of company, Levin leans on automation to ensure systems he creates for his customers are designed, built and maintained securely.
So, given his preference to limit the number of moving parts in his security operation, how does he feel about the flood of new technology on the market?
If a new technology does a better job than an existing system, I want it. Unless I can’t tell whether it does a better job, Levin said.
Related posts:
Invisible Network Attacks: Good Encryption vs. Bad Encryption
Endpoint Security: 3 Big Obstacles to Overcome
Data Breach Increase Shows Endpoints Are Under Attack
— Simon Marshall, Technology Journalist, special to Security Now

Last News

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
IPS: A Key Network Protection in an Age of Increasing Threats