Monitor all incoming and outgoing server traffic and utilize that data to detect and block known vulnerabilities. Not just for cloud, but for servers anywhere and everywhere.
An Intrusion Prevention Service — or IPS — is a critical security component in any defense-in-depth strategy for securing a cloud environment. It helps ensure business continuity by protecting against known and unknown vulnerabilities on over 100 applications and operating systems. This means you can focus on growing your business and what makes your product or service uniquely valuable to your customers without worrying about loss of revenue or downtime due to malicious activity.
The CenturyLink Cloud IPS leverages industry-leading technology from Trend Micro, which utilizes an Agent installed on your virtual machine (VM) or host server that will monitor that machine for suspicious activity. If a vulnerability is identified, the system will log it, may block or stop it, and will report it based on the IPS policy. A default policy is implemented on each host that is then automatically tuned based on the host operating system and installed applications.
Helps prevent business disruption and loss of income or productivity by providing protection from known and unknown vulnerabilities on over 100 applications and many standard operating systems.
An Intrusion Prevention Service (IPS) is a critical security component in any company's defense in-depth strategy for securing their servers, wherever they are.
An Intrusion Prevention Service (IPS) is a necessary element to meet security compliance such as PCI DSS.
Experience fast and easy deployment by provisioning IPS on a virtual machine or bare metal server within our cloud platform via Blueprints with just a few clicks. Or deploy it using a single command line for physical or cloud servers on or off the CenturyLink Cloud.
Real-time threat notifications with event data and activity logs allow you to see what was targeted, as well as how and what was prevented automatically.
Deploy IPS on your servers wherever they are, on any physical server or any cloud as long as the server’s OS is a supported version and the network traffic is allowed to our management infrastructure.
Our service leverages the IPS component of Trend Micro Deep Security Suite created and supported by Trend Micro, a recognized industry leader in IT security solutions.
The Intrusion Prevention Service Blueprint is for the installation and activation of the service on virtual machines deployed on our Cloud Platform. Other Blueprints and our API are available for modifications to the install.
Every server with our host-based Intrusion Prevention Service deployed – wherever it's located – is scanned daily and the security profile is adjusted based on the applications installed and the OS detected.
Spammers, Hackers, and Black Hats thrive on the Internet because so many servers are left vulnerable and easy to impact. It’s like leaving your car unlocked with the keys in the ignition. What thief could resist? IPS increases your protection against hackers by monitoring your machines for suspicious activity and blocking that traffic to prevent harm to your system.
Businesses face ever-increasing challenges regarding regulatory compliance, protecting their own and client privacy, while ensuring client and partner confidence in your organization. IPS offers a risk management solution designed to fit business needs.
Cost-effective compliance by allowing our team to manage your intrusion prevention and working with an industry leader — Trend Micro — to ensure the most up-to-date signatures for the IPS agent.
Allow security experts to oversee this security application while your workforce concentrates on your main business. Our team manages the scripts to install the agent, get it up running, your default policy installed and tuned for your server.
Your infrastructure can cross multiple locations in order to support your business. Now you can use our Intrusion Prevention Service to protect your servers wherever they are. Our installation methods will allow you to add a layer of security protection to servers in any environment, whether it’s in your own data center, our CenturyLink Cloud, or another cloud altogether.
Our cloud stack, isolated and dedicated to you. Deploy in over 55 CenturyLink locations around the world.
Experts at the ready to maintain and administer your cloud deployments. Rapid provisioning, hourly billing, and highly automated.
The computing power of a physical server, with the automation and pay-as-you-go flexibility of a virtual machine.
Connect networks within a particular data center through the use of configurable firewall policies, and create firewall policies that connect different data centers.
Maintenance and management of your Windows & Red Hat cloud servers, 24x7.