Network IPS Buyer's Guide: HP TippingPoint - Page 2

 By Lisa Phifer
Page 2 of 3   |  Back to Page 1
Print Article

The entry-level HP S10 IPS delivers in-line protection at throughputs up to 20 Mbps while adding less than 600 microseconds of latency. At the opposite end of the line, the HP S330 IPS can handle rates up to 300 Mbps. In between sits the HP S110 IPS rated for 100 Mbps.

The S10 IPS can be used by a branch office or SMB, adjacent to a router/firewall -- scenarios where 20 Mbps IPS easily beats WAN data rates. The S110 and S330 would be used in scenarios that require more horsepower and perhaps high availability. Both can operate in two modes: Intrinsic High Availability and Stateful Network Redundancy, using Zero Power High Availability (ZPHA) to avoid blocking during loss of power.

For larger installations with more advanced security needs, TippingPoint now offers the HP S Intrusion Prevention System (IPS) N Series. These modular platforms are designed to facilitate the integration of new services, including new IPS filter packages, converged security services (e.g., reputation services, Digital Vaccine Services), and partner solutions. N Series models range from the S1400N (1.5 Gbps) to the S5100N (5 Gbps).

Finally, HP sells as TippingPoint S1200N IPS Module -- a blade that fits into the HP A7500 Series switch. This network-integrated form factor offers cost savings for customers that have HP switches, while delivering the same TippingPoint protection. Each blade handles up to 1.3 Gbps of inspected traffic; a single chassis can hold as many as 10 blades.

All HP TippingPoint IPS products can be managed through a single console using HP's Security Management System appliance. This platform supports centralized IPS signature update, policy definition, appliance configuration/maintenance, event monitoring, automated response, and reporting.

Customizing your NIPS

HP TippingPoint IPS products are supported by DVLabs threat updates, delivered and installed automatically by the Digital Vaccine service. DVLabs researchers constantly discover, track, and analyze new vulnerabilities and develop IPS filters to mitigate them.

But those filters don't always fully-address the risks facing every customer. "We create filters day-in day-out, but some customers (like the military) have applications that are proprietary," said Callahan. "Those customers need a way to protect themselves without depending on us."

This article was originally published on Apr 16, 2011
Get the Latest Scoop with Networking Update Newsletter