At the time of discovery in early November, IBM products were already providing customers with preemptive protection for this threat through its Buffer Overflow Exploit Prevention (BOEP) solution and through its protocol analysis module (PAM), the core engine that powers IBM Internet Security Systems intrusion prevention and detection technologies.
What does BOEP stand for?
BOEP stands for Buffer Overflow Exploit Prevention
This definition appears somewhat frequently and is found in the following Acronym Finder categories:
- Information technology (IT) and computers
See other definitions of BOEP
We have 2 other meanings of BOEP in our Acronym Attic
- Book of Eldritch Might (Dungeons & Dragons, roleplaying/gaming)
- Brotherhood of Engine Mechanics (Yahoo group)
- Brotherhood of Evil Mutants (X-men)
- Bureau of Ocean Energy Management (US DOI)
- Bootstrapping Ontology Evolution with Multimedia Information Extraction (workshop)
- Book of Eldritch Might II (Dungeons & Dragons, roleplaying/gaming)
- Book of Eldritch Might III (Dungeons & Dragons, roleplaying/gaming)
- Bureau of Ocean Energy, Management, Regulation, and Enforcement (US DOI)
- Bulletin Officiel de l'Éducation Nationale (French: Official Bulletin of National Education)
- Board of Educational Programming (Indiana University Collins Living-Learning Center)
- Bureau of Engraving and Printing
- Barrels of Oil Equivalent Per Day
- Board of Equalization and Review (tax review board; Orange County, NC)
- Borderless Order Entry Systems (DE Technologies, USA)
- Belgian Old English Sheepdog Club (Belgium)
- Bangladesh Overseas Employment and Services Limited (human resources)
- Bureau of Education and Training (Vietnam)
- Board of Engineering of Trinidad and Tobago
- Battery Operated Electric Vehicle
- Battery-Only Electric Vehicle
Samples in periodicals archive:
Proventia Desktop currently offers the combined functionality of personal firewall, intrusion prevention, buffer overflow exploit prevention, application and communications protection and virus prevention technologies.
According to the company, before the vulnerability was announced, customers of ISS' host-based security products were shielded from it by the company's buffer overflow exploit prevention technology.