Overview: The Sourcefire 3D? System unifies IPS, NBA, NAC and Vulnerability Assessment technologies under the same management console, equipping customers with an efficient and effective layered security defense ? for protection before, during and after an ..
KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.
Solutions offered by Sourcefire.
Research offered by Sourcefire
25 Years of Vulnerabilities: 1988-2012 by Sourcefire. February 28, 2013 - What has been the most important type of vulnerability in the last 25 years? What percentage of total vulnerabilities did this represent? Which browser truly had the most critical vulnerabilities? Get the answers to these questions and more based on analysis of the last 25 Years of Vulnerabilities: 1988-2012.
Data Breach Case Study: Heartland Payment Systems by Sourcefire. January 01, 2009 - Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.
IDS vs. IPS by Sourcefire. April 29, 2011 - When it comes to intrusion detection systems (IDS) and intrusion prevention systems (IPS) it’s not always easy for organizations to determine what functions each can be used for. This expert tip compares the features and capabilities of IDS and IPS technologies and highlights popular use cases for each system.
Implementing a "Smart IPS": IANS Working Knowledge Series by Sourcefire. June 2008 - The LA Times faced challenges securing its internal network and complying with PCI to address both issues they decided to implement an IPS they develop selection criteria, investigated several solutions, and ultimately selected Sourcefire.
Martin Roesch in Australia for SourceFire by Sourcefire. January 24, 2013 - Today's threat landscape has been transformed by the "industrialization of hacking." In this video, you'll learn more about evolutions such as the advanced persistent threat, why and how many current security tools aren't enough, and what is being done to keep modern organizations safe from harm.
Monitoring network traffic: Appliance placement and choke points by Sourcefire. May 04, 2011 - It's important for all organizations to monitor network traffic in order to track network performance over time. This expert tip highlights the best points for monitoring traffic flow on a network and why.
Next Generation Firewall Product Analysis by Sourcefire. March 22, 2013 - NSS Labs recently tested the Sourcefire FirePOWER™ 8250 appliance against their benchmarks for Next-Generation Firewall (NGFW) technology. View this resource to see exactly how Sourcefire excelled in the industry's most rigorous NGFW testing available to date.
Next-Generation IPS for Dummies by Sourcefire. January 01, 2013 - Despite the hype, you don't need to replace your firewalls to gain application visibility and control. A Next-Generation IPS (NGIPS) can do this – and even detect and protect against advanced malware – without disrupting your security architecture. Learn what a NGIPS can really do. Download the "Next-Generation IPS for Dummies" eBook.
Next-Generation IPS Technology Disrupts the IPS Market by Sourcefire. March 26, 2013 - Read this report to learn more about the impact of NGFW on the network IPS market, and discover why and how next-generation IPS is disrupting both the IPS and NGFW market.
Protecting Control Networks - SCADA by Sourcefire. May 17, 2013 - This whitepaper will introduce you the the basic facts and information you need to know in order to properly secure your control networks Read on to learn about the "golden rules" for protecting control networks, it's critical vulnerability points, and more.
SANS What Works in Intrusion Prevention and Detection by Sourcefire. - This white paper shows you how TransUnion was able to successfully implement an effective intrusion defense system (IDS) that helped them meet compliance requirements and secure their corporate environment.