Host IPSRSS

Firewalls protect a host by monitoring network packets and attempting to identify good vs. bad traffic. A complement program to firewalls is Host Intrusion Prevention Systems (HIPS). HIPS works to protect a host by monitoring applications that execute.  HIPS tries to look at what the program does, either by intercepting system calls or watching packets or other system activity. These may be rule based or may assign scores for certain activity.

 

There is a lot of variety in the quality of these products, make sure you research them well and evaluate them extensively.

Visit the Product Site

DefenseWall HIPS (Host Intrusion Prevention System) is the simplest and easiest way to protect yourself from malicious software (spyware, adware, keyloggers, rootkits, etc.) when you surf the Internet! Using the next generation proactive protection techno ...

VendorSoftsphere Technologies
Pricing ModelFree download, Cost for registration
ModifiedNever

Visit the Product Site

Cisco Security Agent provides threat protection for server and desktop computing systems, also known as endpoints. It helps to reduce operational costs by identifying, preventing, and eliminating known and unknown security threats. The Cisco Security Agen ...

VendorCisco Systems, Inc.
Pricing ModelCommercial
ModifiedNever

Visit the Product Site

Host Intrusion Prevention takes your security defenses beyond perimeter security by protecting critical servers from internal attacks and from external attacks where hackers use encryption as an attack technique.SecureWorks? Host Intrusion Prevention Serv ...

VendorSecureWorks Inc.
Pricing ModelCommercial Service
ModifiedNever
Symantec Critical System Protection

Visit the Product Site

Symantec Critical System Protection protects against day zero attacks, hardens systems, and helps maintain compliance by enforcing behavior-based security policies on clients and servers. A centralized management console enables administrators to configur ...

VendorSymantec Corporation
Pricing ModelCommercial
Modified

Visit the Product Site

ThreatSentry ? Host Intrusion Prevention Software + Application FirewallThreatSentry is a Host Intrusion Prevention software application (HIPS), designed to protect Windows Web servers running Microsoft Internet Information Services (IIS). ThreatSentry is ...

VendorPrivacyWare Inc.
Pricing ModelCommercial
ModifiedNever

Visit the Product Site

IBM Proventia® Desktop Endpoint Security helps secure your desktops and laptops against both known and unknown attacks, providing multi-layered security in a single agent. Designed for easy integration with your existing infrastructure, this multi-layered ...

VendorIBM
Pricing ModelCommercial
Modified

Visit the Product Site

WehnTrust is a Host-based Intrusion Prevention System (HIPS) that provides secure buffer overflow exploitation countermeasures. While other Windows based intrusion prevention systems are only capable of working with a pre-defined group of applications, We ...

VendorWehnus
Pricing ModelFree for home use, Commercial
ModifiedNever

Visit the Product Site

System Safety Monitor (SSM) allows you to track down Microsoft Windows operating system activity in real-time and to prevent undesirable actions from various malware and spyware programs. SSM's main goal is to discover and block malicious actions of any a ...

VendorSystem Safety Limited
Pricing ModelCommercial
Modified

Visit the Product Site

70% have inadequate PC security and are infected - 70% of PC users have no PC Security at all or are using a PC security product which is either unlicensed or has not been updated for a very long time. Most, if not all of these users' PCs will be infected ...

VendorPrevx
Pricing ModelCommercial
Modified

Visit the Product Site

AppDefend is a kernel based application protection system, designed to be secure whilst using few resources. AppDefend intercepts various privileged actions and lets you decide whether they should occur or not.Without AppDefend you are highly vulnerable t ...

VendorGhost Security
Pricing ModelCommercial
ModifiedNever

Visit the Product Site

Enterasys Dragon® ensures the confidentiality, integrity, and availability of business critical resources with industry-leading Intrusion Prevention capabilities, including: * Threat containment that leverages existing network investments * In ...

VendorEnterasys Networks
Pricing ModelCommercial
Modified

Visit the Product Site

CA Host-Based Intrusion Prevention System (CA HIPS) combines the protective power of five critical technologies— endpoint Firewall, Intrusion Detection, Intrusion Prevention, Operating System Security and Application Control capabilities—into one centrall ...

VendorComputer Associates
Pricing ModelCommercial
Modified

Visit the Product Site

IBM Security Server Protection offers multilayered protection against known and unknown threats and supports a broad range of operating systems. It helps provides host protection against data breaches and offers tracking and reporting to ease meeting regu ...

VendorIBM
Pricing ModelCommercial
Modified
NetIQ Security Solutions for iSeries

Visit the Product Site

NetIQ Security Solutions for iSeries helps you eliminate security risks and maintain business continuity across your iSeries environment by providing simplified auditing, intrusion protection, vulnerability management and security administration for your ...

VendorNetIQ
Pricing ModelCommercial
ModifiedNever

Visit the Product Site

Deep Security protects confidential data and critical applications to help prevent data breaches and ensure business continuity, while enabling compliance with important standards and regulations such as PCI, FISMA and HIPAA. Whether implemented as softwa ...

VendorTrendMicro
Pricing ModelCommercial
Modified

Visit the Product Site

Helps meet regulatory compliance by limiting access to critical data, tracking user access and providing reporting for the virtual infrastructure. Provides defense-in-depth, dynamic security with VM rootkit detection and virtual infrastructure auditing an ...

VendorIBM
Pricing ModelCommercial
ModifiedNever

Visit the Product Site

  The Palo Alto Networks VM-Series comprises three virtualized next-generation firewall models – VM-100, VM-200, and VM-300, supported on VMware ESXi 4.1 and ESXi 5.0 platforms. 2, 4 or 8 CPU cores on the virtualized server platforms can be assign ...

VendorPalo Alto Networks
Pricing ModelCommercial
Modified
McAfee Host Intrusion Prevention for servers

Visit the Product Site

McAfee Host Intrusion Prevention for Server proactively secures against known and new zero-day attacks. It boosts security and lowers costs by reducing the frequency and urgency of patching. Host Intrusion Prevention integrates with the McAfee ePolicy Orc ...

VendorMcAfee
Pricing ModelCommercial
Modified
Complete Endpoint Protection — Business

Visit the Product Site

With McAfee Complete Endpoint Protection — This highly affordable, all-in-one solution provides endpoint security for all the devices in your enterprise: PCs, Macs, Linux systems, servers, virtual systems, smartphones, and tablets. Quickly and easily laye ...

VendorMcAfee
Pricing ModelCommercial
Modified
Complete Endpoint Protection — Enterprise

Visit the Product Site

A single solution with a single management platform unifies 17 technologies to proactively protect all of your devices — PCs, Macs, Linux systems, smartphones, virtual machines, tablets, and servers. Simplify management and reduce costs while defending yo ...

VendorMcAfee
Pricing ModelCommercial
Modified