IPS is short for Intrusion Prevention System, used in computer security. IPS provides policies and rules for network traffic along with an intrusion detection system for alerting system or network administrators to suspicious traffic.
When it comes to protecting your network from attacks a good IPS is needed. Be aware that many intrusion detection systems will try to pass themselves off as an IPS, even when they do not offer all the services of the IPS. IDS i.e Intrusion Detection Systems were the predecessors to todayâ€™s IPSâ€™s. Often old intrusion detection systems are exploited by attackers because they rely on out of date network technology. IPS builds up on the older technology and makes networks more secure from outside attacks.
The latest IPSâ€™s work by deeply analyzing network data packets as they pass through the network. This allows the IPS to monitor traffic and recognize patterns and importance of data. If an outside attack is executed against the network, the IPS can identify it instantly and deny access to the attacker before any harm is done. The IPS can also help move the flow of traffic through the network and make sure that important applications do not fail. For example an IPS can give priority to financial transactions over regular web surfing.
There are two kinds of IPSâ€™s, one is called HIPS and the other it called NIPS. HIPS stands for Host Based Intrusion Prevention System while NIPS stands for Network Based Intrusion Prevention System. A host based IPS is usually software based and needs to be installed on every computer connected to the network. A network based IPS is hardware based and acts as both a monitor and protector of the network. It is placed between network user computers and the internet so that when an attack is carried out it can be stopped before reaching servers and computers where they can do major damage.