Skip to main content

Host IPS

Firewalls protect a host by monitoring network packets and attempting to identify good vs. bad traffic. A complement program to firewalls is Host Intrusion Prevention Systems (HIPS). HIPS works to protect a host by monitoring applications that execute.  HIPS tries to look at what the program does, either by intercepting system calls or watching packets or other system activity. These may be rule based or may assign scores for certain activity.

 

There is a lot of variety in the quality of these products, make sure you research them well and evaluate them extensively.

PrivacyWare Inc.

Web Application Firewall & Intrusion Prevention Software for Microsoft IISServer 2016/2019/IIS 10 Support ThreatSentry combines a state-of-the-art Web Application Firewall and port-level firewall with advanced behavioral filtering to block unwanted I ...

ThreatSentry

NetIQ Security Solutions for iSeries helps you eliminate security risks and maintain business continuity across your iSeries environment by providing simplified auditing, intrusion protection, vulnerability management and security administration for your ...

NetIQ Security Solutions for iSeries

Deep Security protects confidential data and critical applications to help prevent data breaches and ensure business continuity, while enabling compliance with important standards and regulations such as PCI, FISMA and HIPAA. Whether implemented as softwa ...

Trend Micro Deep Security
Palo Alto Networks

  The Palo Alto Networks VM-Series comprises three virtualized next-generation firewall models – VM-100, VM-200, and VM-300, supported on VMware ESXi 4.1 and ESXi 5.0 platforms. 2, 4 or 8 CPU cores on the virtualized server platforms can be assign ...

Trellix Endpoint Security provides your prioritized security needs—from preventing threats and hunting them to tailoring security controls. Machine learning to identify and prevent new malwareMachine-learning behavior classification detects zero-day thre ...

Trellix Endpoint Security

Intrusion Prevention System (IPS) for ssh (default port 22), this IPS responds to the suspicious activity by setting the linux firewall (iptables) to block network traffic from the suspected malicious source. Suspicious activity is determined via auth or ...