Intrusion Prevention technology can provide a key component to the overall protection of your network. Initially deploying an Intrusion Prevention System (IPS) on your network does require careful consideration to match the capabilities of your IPS with your unique network configuration. Furthermore, configuring your IPS and monitoring the alerts generated by your IPS devices requires dedicated personnel. This chapter provides a high-level view of the following operational tasks related to using IPS on your network:
Deploying IPS devices and applications
Configuring IPS devices and applications
Monitoring IPS activities
Securing IPS communications
Each IPS deployment is fairly unique ...