+91 7888995975
Mon to Sat - 09:00 AM to 06:00 PM

Forum

Drop Malicious Traf…
 

Drop Malicious Traffic  

  

0

How to Inspect Traffic? How to Drop Malicious Traffic on the basis of Security Policy?

1 Answer
0

The NIPS monitors the network for malicious activity or suspicious traffic by analyzing the protocol activity. Once the NIPS is installed in a network, it is used to create physical security zones. … An intrusion prevention system (IPS) sits in-line on the network and monitors the traffic.

Please Login or Register