2019-09-03T08:57:00Z

What is your primary use case for WatchGuard Intrusion Prevention Service?

Julia Miller - PeerSpot reviewer
  • 0
  • 4
PeerSpot user
5

5 Answers

Gianluca Vinci - PeerSpot reviewer
Reseller
Top 10
2023-01-26T13:46:02Z
Jan 26, 2023

Our primary use case for the solution is to protect published resources.

Search for a product comparison
MA
Real User
2021-11-23T22:29:38Z
Nov 23, 2021

I use WatchGuard Intrusion Prevention Service for all our properties for network security.

VS
Real User
2020-12-24T07:41:27Z
Dec 24, 2020

We basically use this solution to filter traffic so that the network can be secured and no one can hack the network. We are using WatchGuard as a gateway security product. It is installed on the gateway to filter the traffic for our network, stop access to malicious websites, and protect our interwork network from any kind of hack attempt from outside. We are also using the VPN feature. The traffic is encrypted via a VPN, and no one can hack it. We are using the latest version of this solution.

AM
Reseller
2020-12-08T16:33:58Z
Dec 8, 2020

We use WatchGuard Intrusion Prevention Service to secure our servers. It's usually deployed to protect the whole network and the service.

RA
Real User
Leaderboard
2019-09-03T08:57:00Z
Sep 3, 2019

Our primary use case of this solution is high tech intrusion prevention and detection in Building Automation and Control Networks (BACnet).

Find out what your peers are saying about WatchGuard, Cisco, Fortinet and others in Intrusion Detection and Prevention Software (IDPS). Updated: March 2024.
765,234 professionals have used our research since 2012.
Intrusion Detection and Prevention Software (IDPS)
What Is an Intrusion Detection System? Intrusion detection systems (IDSes) analyze network traffic for signatures of known attackers. The systems can be hardware devices or software solutions. An IDS can mitigate existing malware, such as backdoors, rootkits, and trojans.The goal of an intrusion detection system is to detect an attack as it occurs. The system starts by analyzing inbound and outbound network traffic for signs of known attackers. Some activities an IDS performs...
Download Intrusion Detection and Prevention Software (IDPS) ReportRead more