Jason Pappalexis, John Whetstone, Will Fisher, Mike Spanbauer
Intrusion prevention systems (IPS) are designed to identify and block network attacks against internal computing assets, as well as protect enterprise users against threats and exploits. An IPS must catch sophisticated attacks while producing minimal false positives and without introducing network latency. By detecting exploits, IPS provide enterprises temporary relief from the need to patch affected systems.
Enterprises can use this information to gain critical insights into the purpose and use of IPS technology. These insights include information on how this security control is being managed within organizations, where it is being deployed, who is responsible for purchasing decisions, and the extent to which API controls are being used for its management.
WHAT’S IN THIS REPORT:
- Product scope, alternatives, deployment, and purchase authority
- Metrics on product use within the enterprise
- Who manages IPS products? (breakdown by organization size)
- Who uses API controls? (breakdown by organization size)
- Enterprise challenges
ABOUT THIS STUDY:
Part of a series on security controls deployed by US enterprises, this brief includes current usage statistics for IPS within small and medium-sized enterprises (SMEs), large enterprises (LEs), and very large enterprises (VLEs).