Overview: The Sourcefire 3D? System unifies IPS, NBA, NAC and Vulnerability Assessment technologies under the same management console, equipping customers with an efficient and effective layered security defense ? for protection before, during and after an ..
KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.
Solutions offered by Sourcefire.
Research offered by Sourcefire
A New Threat-Centric Security Model for Before, During, and After an Attack by Sourcefire. April 16, 2014 - This guide explores a threat-centric security model designed to prevent, detect and remediate any potential cyber-attacks.
Addressing the Malware Challenge: Strategies At Work by Sourcefire. December 31, 2013 - This guide explores the current threat landscape, and what businesses are doing to prevent advanced malware from breaching their system.
Buyer's Criteria for Advanced Malware Protection by Sourcefire. April 07, 2014 - This guide explores the current state of malware in today's threat landscape and discusses some of the top strategies for stopping sophisticated malware.
Buyer's Criteria for Next-Generation Network Security by Sourcefire. December 31, 2013 - This whitepaper outlines current factors driving organizations to look at next-generation networking solutions and offers analysis on the capabilities of these new technologies.
Cisco 2014 Annual Security Report by Sourcefire. April 01, 2014 - This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
Data Breach Case Study: Heartland Payment Systems by Sourcefire. January 01, 2009 - Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.
Frost and Sullivan 2013 Global Intrusion Prevention Systems Product Leadership Award by Sourcefire. May 22, 2013 - In this white paper, learn about the recipient of the Global Intrusion Prevention Systems Product Leadership Award, and how one high-powered security platform stands out in terms of functionality, innovation, acceptance, value, and quality.
IDS vs. IPS by Sourcefire. April 29, 2011 - When it comes to intrusion detection systems (IDS) and intrusion prevention systems (IPS) it’s not always easy for organizations to determine what functions each can be used for. This expert tip compares the features and capabilities of IDS and IPS technologies and highlights popular use cases for each system.
Implementing a "Smart IPS": IANS Working Knowledge Series by Sourcefire. June 2008 - The LA Times faced challenges securing its internal network and complying with PCI to address both issues they decided to implement an IPS they develop selection criteria, investigated several solutions, and ultimately selected Sourcefire.
Magic Quadrant for Intrusion Prevention Systems by Sourcefire. December 31, 2013 - This guide explores one company's intrusion prevention system and how it can integrate smoothly with your next-generation firewalls to ensure top-notch security.
Monitoring network traffic: Appliance placement and choke points by Sourcefire. May 04, 2011 - It's important for all organizations to monitor network traffic in order to track network performance over time. This expert tip highlights the best points for monitoring traffic flow on a network and why.
Next-Generation IPS for Dummies by Sourcefire. January 01, 2013 - Despite the hype, you don't need to replace your firewalls to gain application visibility and control. A Next-Generation IPS (NGIPS) can do this – and even detect and protect against advanced malware – without disrupting your security architecture. Learn what a NGIPS can really do. Download the "Next-Generation IPS for Dummies" eBook.
NSS Labs: Breach Detection System Comparative Analysis by Sourcefire. April 17, 2014 - This informative analysis tests some top breach detection technologies and compares the standards of their security and performance.
Protecting Control Networks: Key Considerations For Protection by Sourcefire. December 31, 2013 - This whitepaper takes a look at how to secure control networks, with strategies before, during and after an attack.
SANS What Works in Intrusion Prevention and Detection by Sourcefire. - This white paper shows you how TransUnion was able to successfully implement an effective intrusion defense system (IDS) that helped them meet compliance requirements and secure their corporate environment.
Strategies For Securing Virtualized Environments by Sourcefire. December 31, 2013 - This whitepaper explores an effective virtualization security technology and outlines how it can ensure system wide security.