+91 7888995975
Mon to Sat - 09:00 AM to 06:00 PM


Drop Malicious Traf…

Drop Malicious Traffic  



How to Inspect Traffic? How to Drop Malicious Traffic on the basis of Security Policy?

1 Answer

The NIPS monitors the network for malicious activity or suspicious traffic by analyzing the protocol activity. Once the NIPS is installed in a network, it is used to create physical security zones. … An intrusion prevention system (IPS) sits in-line on the network and monitors the traffic.

Please Login or Register