Intrusion Prevention Systems start by detecting threats.
There are many ways the IPS can detect suspicious activity including:
Once a threat is detected, the IPS can respond in several ways depending on the threat. As just a few examples, it can drop malicious packets, replace malicious packets, block attacking IP addresses, and update itself to protect against new threats. The IPS also sends reports to your IT administrators and/or IT management company like LeeShanok.
Intrusion prevention is included in leading next generation firewalls or can be purchased as standalone hardware or software. LeeShanok is available to consult on which IPS solution is the best fit for your network.