Interoute Security Services logo

The scale and increase of cyber-attacks on enterprise networks can make it difficult to predict the time or type of attack to defend against.

Interoute’s Intrusion Detection (IDS) and Intrusion Prevention (IPS) Systems are great place to start.

They leverage our vast backbone platform and network expertise to provide protection against highly specialised attacks that can be missed by traditional DDoS mitigation platforms and firewalls.


Real-time attack blocking

Obstruct worms, viruses, spyware, Trojans, adware, phishing, DDoS, O/S & network device attacks and more. 

Self-learning defence

Devices defend out of the box, learn their environment and within less than a day have a workable policy that continues to improve with experience. 

Real time view of network

Full visibility of device, function and use, via graphical real-time interface. See what the Intrusion Prevention sensor is seeing & how the device is performing.

Fast reporting

See & request reports on any function instantly, whenever you want. Email out if required. Able to state if within compliance standards. 

Why Interoute?

IPS is better from Interoute because of our network strength.

We offer High Availability, because the size of our network provides huge capacity so that attacks can be diverted through alternative routing options.

Our high-performance network and low latency, means application traffic is not slowed down. Filter accuracy ensures legitimate traffic is not blocked.


Managed service. Protecting your business with packet inspection & malware blocking.

Visibility. Find out if your business is under attack & discover information about its nature.

Resiliance. Global coverage delivers near-zero latency & five 9’s availability.

Compliance & real-time analytics. A delegated management centre (Defense Centre) offers full reporting.

Stringent SLAs. Offering 99.95% availability for IPS. 

In Interoute we have found a partner who can match the high levels of performance and quality that UEFA and its competitions stand for.


Extra Information

Related Services

Next Generation Firewall

With the robust security levels needed in today's digital world, our next generation firewalls will keep you safe from threats, both known & unknown

Multi-Factor Authentication

Offering an additional security layer ensuring that your users are fully identified & verified before gaining access to your platforms

Email & Web Filtering

Offering an effective & accurate way to reduce your messaging & web-related risks across your business & remote workforce

Private & Hybrid Cloud

Offering public cloud flexibility with private cloud confidence and the ability to integrate globally with legacy infrastructure & other clouds

Technical Spec

  • CIR selectable from 100Mbps through to 1Gbps (up to 20Gbps available as a custom order)
  • Fully managed service with customer access to customer specific area of management platform
  • Custom rules, alerting and reporting available as a professional services engagement
  • Virtual IPS appliances for those customers with VMware ESXi Virtual machines hosted within an Interoute data centre with up to 100Mbps CIR.
  • Management of standard (vendor supplied) rules – disabling rules to manage false positives or enabling rules
  • DMZ inspection available provided hardware matches requirements to support the Interoute standard DMZ service (Medium and Large sized IPS only)


Committed Information Rate

Maximum supported Inspection points

Support DMZ service















Q. How do you charge for IPS?
A. The Interoute Network IPS service is billed as a combination of Non-Recurring Charges (NRC), and Monthly Recurring Charges (MRC). The main element on which the charges are based is the number of devices that are required to be covered by the service. This impacts both the type of hardware required (impacting mainly the NRC) and the cost of software licenses and updates (impacting mainly the MRC).

Q. What type of threats does Intreroute's IPS & IDS service protect against?
A. It protects against a multitude of threats which include the following:

  • Worms
  • Spyware
  • Peer to peer (P2P)
  • Denial of service (DoS) and distributed denial of service (DDoS)
  • Botnets
  • Targeted attacks against Web applications
  • Proprietary or sensitive data leaving the network
  • Cross-site scripting
  • SQL injection
  • Buffer overflow
  • Web directory traversal


Keep connected

  • Telephone
  • eForm