DATA CENTER INTRUSION PREVENTION SYSTEM (DCIPS)

ADVANCED ENDPOINT PROTECTION

Overview of Types of Reports for DCIPS

Data center intrusion prevention systems (DCIPS) are deployed at critical points in the network so their stability and reliability are imperative. The goal of a DCIPS is to identify and block sophisticated threats against web servers, application servers, and database servers without false positives or degradation of network performance.

Security Comparative Report

Implementation of data center intrusion prevention system (DCIPS) products can be complex, with multiple factors affecting overall security effectiveness. The following factors were considered when evaluating the security effectiveness of DCIPS products: deployment use cases, defensive capabilities (block rate), resistance to evasions, device stability and reliability, and breadth of vulnerability coverage.

Security Value Map Comparative Report

The Security Value Map (SVM) Comparative Report provides an aggregated view of the detailed findings from the NSS Labs group tests. Enterprise security decision makers can use the report to determine the relative value of security investments.

Total Cost of Ownership Comparative Report

This report uses the NSS Labs Total Cost of Ownership (TCO) model to calculate TCO for data center intrusion prevention system (DCIPS) products. Calculations incorporate capex over a three-year period, including initial acquisition and deployment costs and annual maintenance, support, and update costs (software and hardware updates).

Performance Comparative Report

Implementation of data center intrusion prevention system (DCIPS) products can be complex with multiple factors affecting overall performance. This report provides data on factors that should be considered when evaluating the performance of a DCIPS, including throughput, connection rates, latency, and traffic mix.

Test Reports

Test Reports provide detailed analysis on each product tested. They help enterprise security teams understand a product’s features as well as its limitations and can be used to shortlist products for further evaluation and proof-of concept testing. Data from these reports is used in the NSS Labs Comparative Reports.