{"id":1527,"date":"2007-02-06T00:00:00","date_gmt":"2007-02-06T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/02\/06\/cas-new-host-based-intrusion-prevention-provides-centralized-protection-against-online-threats\/"},"modified":"2021-12-30T11:39:32","modified_gmt":"2021-12-30T11:39:32","slug":"cas-new-host-based-intrusion-prevention-provides-centralized-protection-against-online-threats","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/02\/06\/cas-new-host-based-intrusion-prevention-provides-centralized-protection-against-online-threats\/","title":{"rendered":"CA&#8217;s New Host-Based Intrusion Prevention Provides Centralized Protection Against Online Threats"},"content":{"rendered":"<p>At RSA Conference 2007 in San Francisco, CA announced CA Host-Based Intrusion Prevention System (CA HIPS), a new solution that combines advanced firewall, intrusion detection and intrusion prevention capabilities to defend enterprise computing assets against today&#8217;s blended threats.  By providing centrally managed proactive threat protection for PCs and servers, CA HIPS enables IT organizations to quickly and efficiently implement best-practices security policies for system endpoints across the enterprise.  CA HIPS provides proactive, host-based security to counter zero-day attacks by detecting anomalies in system behavior.  Administrators can define rules for automatically responding to these anomalies &#8212; such as blocking suspicious application activity with the rest of the network until a potential threat can be evaluated fully.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CA HIPS monitors both incoming and outgoing traffic and enables centralized management of access control policies.<\/p>\n<p>&#8220;Today&#8217;s sophisticated threats require a multi-faceted defense that incorporates proactive threat detection and whitelisting, working hand-in-hand with existing antivirus and anti-spyware technologies,&#8221; said Robin Bloor, partner, Hurwitz and Associates.<\/p>\n<p>CA HIPS uniquely facilitates the definition and implementation of security policies by allowing administrators to create policies based on user behavior and existing examples.  This &#8220;learn-by-example&#8221; approach eliminates much of the time and effort typically required for administrators to define policies for specific roles, applications and\/or resources.<\/p>\n<p>&#8220;IT organizations are already dealing with twice as many threats as they did even just a year ago &#8212; and those threats are getting more complex and sophisticated all the time,&#8221; said Sam Curry, vice president, CA security management.  <\/p>\n<p>&#8220;CA HIPS enables us to provide our customers with an additional layer of security that complements CA&#8217;s anti-spyware and antivirus solutions which have already proven to be so effective for them,&#8221; said Jimmy Barter, vice president of business development, Net-Tek Networking Solutions, a total solutions provider who resells CA&#8217;s threat management products.<\/p>\n<p>http:\/\/ccbn.compuserve.com\/releasetext.asp?ticker=ca&#038;coid=83100&#038;client=compuserve&#038;release=959159<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1527","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1527","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1527"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1527\/revisions"}],"predecessor-version":[{"id":4014,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1527\/revisions\/4014"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1527"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1527"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}