Given these parameters for defining an effective intrusion prevention solution, it is simple to see why simply adding blocking capabilities to existing security infrastructure, such as firewalls and IDS, is not an effective intrusion prevention solution.