Press ESC to close or Enter to search

Home
About Us
Services
Pricing
Tools
Resources
Contact
Get Started
Live Security Feed
Your IPDetecting...
NCSCUK organisations urged to strengthen cyber defences ALERTPhishing attacks targeting Microsoft 365 users on the rise CISACritical vulnerabilities identified in popular software NEWSRansomware groups increasingly targeting SME businesses NCSCNew guidance released for securing remote workers ALERTBusiness email compromise attacks cost UK firms millions CISAZero-day exploits require immediate patching attention NEWSAI-powered threats becoming more sophisticated in 2025 NCSCUK organisations urged to strengthen cyber defences ALERTPhishing attacks targeting Microsoft 365 users on the rise CISACritical vulnerabilities identified in popular software NEWSRansomware groups increasingly targeting SME businesses NCSCNew guidance released for securing remote workers ALERTBusiness email compromise attacks cost UK firms millions CISAZero-day exploits require immediate patching attention NEWSAI-powered threats becoming more sophisticated in 2025
View Dashboard

Host-based Intrusion Prevention System

Cyber Security

Security software on individual devices that detects and automatically blocks malicious activity.

A Host-based Intrusion Prevention System (HIPS) extends HIDS by automatically blocking detected threats on individual systems. HIPS can prevent unauthorised applications from running, block suspicious network connections, stop processes attempting malicious actions, and prevent changes to critical system files. This provides a last line of defence when network security and antivirus have failed. Modern endpoint protection platforms (EPP) and EDR solutions include HIPS capabilities alongside other protections.

Why It Matters

The DSC Perspective:

HIPS stops attacks that get past your other defences. It's particularly valuable for protecting servers running critical applications. Modern EDR includes HIPS functionality—ensure your endpoint protection can both detect and block threats.