December 3, 2013

Building the Next Generation Intrusion Protection System

  • Intel in collaboration with McAfee

In the 1990s, most attackers were teenagers and college students looking to take down or deface corporate websites--or hackers creating malware to harvest credit card information.  But newcomers have different motivations and techniques, which create additional complexity. They're slipping quietly into a network to set up bots that stay under the radar for days, weeks, or months until their mission of destruction is accomplished. This development undermines the effectiveness of traditional strategies such as using a list of signatures to screen traffic for threats.

This paper explains how enterprises, governments, and other organizations can counter the new breed of attacks--citing collaboration between that McAfee and Intel who have worked together to build a next-generation Intrusion Protection System.

  • Download Paper
  • More resources from McAfee


  • Get E-News and Notices via Email


      

     



      

    I accept Webtorials' Terms and Conditions.

    Trending Discussions

    Featured Sponsor Microsites






















    Recent Tweets

    Archives

    Notices

    Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Please encourage colleagues to download their own copy after registering at https://www.webtorials.com/Sonus_logo.jpgreg/.  Continuing past this point indicates your acceptance of our terms of use as specified at Terms of Use.

    Webtorial® is a registered servicemark of Distributed Networking Associates. The Webtorial logo is a servicemark of Distributed Networking Associates. Copyright 1999-2015, Distributed Networking Associates, Inc.