Firstly, the fact that business intelligence (BI) applications are growing in importance, and secondly, the growing and more sophisticated attacks launched by hackers, the concern of how to protect the knowledge capital or databases that come along with BI or in another words, BI security, has thus arisen. In this chapter, the BI environment with its security features is explored, followed by a discussion on intrusion detection (ID) and intrusion prevention (IP) techniques. It is understood through a Web-service case study that it is feasible to have ID and IP as countermeasures to the security threats; thus further enhancing the security of the BI environment or architecture.