Intrusion Prevention Service

Proactive prevention against the latest network exploits.

Our Intrusion Prevention Services (IPS) offer proactive protection against the latest threats to your network. When deployed correctly, IPS prevents damage from malicious or unwanted packets, as well as brute force attacks.

Meeting your business objectives

IPS technology is becoming an increasingly global part of network security defences. Zero-day, advanced targeted attacks, ransomware, polymorphic malware and distributed denial-of-service attacks all require sophisticated detection engines not available in traditional standalone IPS or in most firewalls.

Protection target: Users

Users

Protection target: Data

Data

Protection target: Devices

Devices

Protection target: Network

Network

Protection target: Applications

Applications

Protection target: Cloud

Cloud

Service capabilities

01
An intrusion prevention system (IPS) is a form of network security that works to detect and prevent identified threats. Intrusion prevention systems continuously monitor the network, looking for possible malicious incidents and capturing information about them.
02
The IPS reports these events to system administrators and takes preventative action, such as closing access points and configuring firewalls to prevent future attacks.
03
Our Intrusion Prevention Service examines and inspects network traffic flows to identify potential threats and stop exploit attempts in real time.
04
We ensure customers are safe from known and unknown malware and exploit code threats. We control potential threats in a safe environment (sandboxing). To do this, we extract files from the data stream if the threat policy allows it, and we send them to a caged operating system image platform.
05
This function supports all the most extensively used operating systems – where we replicate how files would have been used on the endpoint. We monitor everything a potential threat does, for example whether it makes dependency calls to external files or Internet resources, or if it tries to retrieve other malware or exploit code.
06
When a threat has been identified, a new signature is generated and pushed back to the data path of the TPC™, where further mitigation is carried out. This all happens in real-time.
07
We use advanced static and dynamic analysis of potential threats.
08
Looking at the state of memory prior to, during and after a threat has been executed reveals potentially large spray-based attacks that seek to exploit possible vulnerabilities on the endpoint.
09
Intrusion Prevention offers seamless integration with other modules irrespective of deployment type.
10
IPS receives new policy rules and signatures every two hours, so the customer’s security is always up to date.

Why Exponential-e?

Managed IPS includes all support, maintenance, configuration and software patching and upgrades.

Seamless migration and fully supported journey from initial scoping to delivery and on-going support. Including nominated Solutions Engineers who are certified with the vendors, Provisioning Coordinators and a 24x7 Service Desk for support backed by our stringent SLA’s.

Image

Diary of a Data Spill

Download our report:
01
How vulnerable you are: You’ll learn how a CIO can open his business up to untold damage simply by logging into a conference centre’s free WiFi.
02
How unprepared you are: Read in detail as to the missteps a typical business makes in failing to stop malware in its tracks.
03
How much it could cost you: You’ll read about a nightmare scenario for any business. Reputational and financial damage on a staggering scale; damage that can be avoided.

Read our latest security blogs

Technology is omnipresent in young people's lives and is opening up new channels of learning across the education sector, with pupils, students and staff utilising Cloud and video calling platforms bo...
No matter how sure you are that your network is secure, you may still be at risk of cyberattacks. It's no exaggeration Cybercriminals are constantly working to stay one step ahead of organisations and...
It's well-established that security is an essential part of all infrastructure. With data protection more of a concern for customers and end users than ever - particularly in light of regulations like...

Our Customers

Talk to one of our specialists

Fill out the form and we'll get back to you as soon as possible.

If you are looking for technical support, please contact our Support team on: 0845 230 6001

 

Talk to one of our specialists

Fill out the form and we'll get back to you as soon as possible.

If you are looking for technical support please contact our Support team on: 0845 230 6001

100% Privacy Guaranteed. Click here for our privacy policy.

100% Privacy Guaranteed. Click here for our privacy policy.

*Calls to 0845 numbers will cost 7p p/m plus your phone company’s access charge.
All inbound and outbound calls may be recorded for training or quality purposes.

Click here to find out more about all of Exponential-e's accreditations.

© 2020 Exponential-e Ltd. Reg. No. 04499567, Reg. Address:100 Leman Street, London E1 8EU