Sourcefire Company SummaryWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Company Summary
Sourcefire

Overview: The Sourcefire 3D? System unifies IPS, NBA, NAC and Vulnerability Assessment technologies under the same management console, equipping customers with an efficient and effective layered security defense ? for protection before, during and after an ..

KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.

Solutions offered by Sourcefire.
Research offered by Sourcefire

A New Threat-Centric Security Model for Before, During, and After an Attack by Sourcefire. April 16, 2014 - This guide explores a threat-centric security model designed to prevent, detect and remediate any potential cyber-attacks.

  View A New Threat-Centric Security Model for Before, During, and After an Attack research abstract

Addressing the Malware Challenge: Strategies At Work by Sourcefire. December 31, 2013 - This guide explores the current threat landscape, and what businesses are doing to prevent advanced malware from breaching their system.

  View Addressing the Malware Challenge: Strategies At Work research abstract

Buyer's Criteria for Advanced Malware Protection by Sourcefire. April 07, 2014 - This guide explores the current state of malware in today's threat landscape and discusses some of the top strategies for stopping sophisticated malware.

  View Buyer's Criteria for Advanced Malware Protection research abstract

Buyer's Criteria for Next-Generation Network Security by Sourcefire. December 31, 2013 - This whitepaper outlines current factors driving organizations to look at next-generation networking solutions and offers analysis on the capabilities of these new technologies.

  View Buyer's Criteria for Next-Generation Network Security research abstract

Cisco 2014 Annual Security Report by Sourcefire. April 01, 2014 - This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.

  View Cisco 2014 Annual Security Report research abstract

Data Breach Case Study: Heartland Payment Systems by Sourcefire. January 01, 2009 - Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.

  View Data Breach Case Study: Heartland Payment Systems research abstract

Frost and Sullivan 2013 Global Intrusion Prevention Systems Product Leadership Award by Sourcefire. May 22, 2013 - In this white paper, learn about the recipient of the Global Intrusion Prevention Systems Product Leadership Award, and how one high-powered security platform stands out in terms of functionality, innovation, acceptance, value, and quality.

  View Frost and Sullivan 2013 Global Intrusion Prevention Systems Product Leadership Award research abstract

IDS vs. IPS by Sourcefire. April 29, 2011 - When it comes to intrusion detection systems (IDS) and intrusion prevention systems (IPS) it’s not always easy for organizations to determine what functions each can be used for. This expert tip compares the features and capabilities of IDS and IPS technologies and highlights popular use cases for each system.

  View IDS vs. IPS research abstract

Implementing a "Smart IPS": IANS Working Knowledge Series™ by Sourcefire. June 2008 - The LA Times faced challenges securing its internal network and complying with PCI to address both issues they decided to implement an IPS they develop selection criteria, investigated several solutions, and ultimately selected Sourcefire.

  View Implementing a "Smart IPS": IANS Working Knowledge Series™ research abstract

Magic Quadrant for Intrusion Prevention Systems by Sourcefire. December 31, 2013 - This guide explores one company's intrusion prevention system and how it can integrate smoothly with your next-generation firewalls to ensure top-notch security.

  View Magic Quadrant for Intrusion Prevention Systems research abstract

Monitoring network traffic: Appliance placement and choke points by Sourcefire. May 04, 2011 - It's important for all organizations to monitor network traffic in order to track network performance over time. This expert tip highlights the best points for monitoring traffic flow on a network and why.

  View Monitoring network traffic: Appliance placement and choke points research abstract

Next-Generation IPS for Dummies by Sourcefire. January 01, 2013 - Despite the hype, you don't need to replace your firewalls to gain application visibility and control. A Next-Generation IPS (NGIPS) can do this – and even detect and protect against advanced malware – without disrupting your security architecture. Learn what a NGIPS can really do. Download the "Next-Generation IPS for Dummies" eBook.

  View Next-Generation IPS for Dummies research abstract

NSS Labs: Breach Detection System Comparative Analysis by Sourcefire. April 17, 2014 - This informative analysis tests some top breach detection technologies and compares the standards of their security and performance.

  View NSS Labs: Breach Detection System Comparative Analysis research abstract

Protecting Control Networks: Key Considerations For Protection by Sourcefire. December 31, 2013 - This whitepaper takes a look at how to secure control networks, with strategies before, during and after an attack.

  View Protecting Control Networks: Key Considerations For Protection research abstract

SANS What Works in Intrusion Prevention and Detection by Sourcefire. - This white paper shows you how TransUnion was able to successfully implement an effective intrusion defense system (IDS) that helped them meet compliance requirements and secure their corporate environment.

  View SANS What Works in Intrusion Prevention and Detection research abstract

Strategies For Securing Virtualized Environments by Sourcefire. December 31, 2013 - This whitepaper explores an effective virtualization security technology and outlines how it can ensure system wide security.

  View Strategies For Securing Virtualized Environments research abstract

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts