Strengths and Weaknesses of Host-Based Intrusion Prevention Systems (HIPS)

Strengths and Weaknesses of Host-Based Intrusion Prevention Systems (HIPS)


Read about the strengths and weaknesses of each HIPS protection style and find out why a single style alone does not provide sufficient protection.

"What's the best HIPS protection style?" In short, there is no "silver bullet." No single protection style alone provides sufficient protection, and different organizations have different needs. By combining styles, you balance these for a more effective intrusion prevention system.

Through 2010, the best HIPS strategy for desktops and servers will use a combination of HIPS protection styles. And, what works for your servers will likely be different for your desktops and embedded devices. To find a style that works for you read more.

Please fill the form first

How would you rate it?

Current rating: 0 (0 ratings)
In order to provide complete functionality, this web site needs your explicit consent to store browser cookies. If you don't allow cookies, you may not be able to use certain features of the web site including but not limited to: log in, buy products, see personalized content, switch between site cultures. It is recommended that you allow all cookies.
  • Dark
  • Light