Sourcefire, Inc.

Displaying 1-10 of 10 results

  • White Papers // Jun 2014

    Magic Quadrant for Intrusion Prevention Systems

    According to Gartner, “Leaders produce products that embody NGIPS capabilities, provide high signature quality and low latency, innovate with or ahead of customer challenges (such as providing associated advanced targeted attack, ATA, technologies to make enriched IPS intelligence) and have a range of models. Leaders continually win selections and are...

    Provided By Sourcefire, Inc.

  • White Papers // Jun 2014

    Addressing the Full Attack Continuum

    Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major loss and disruption to organizations and national infrastructure.These advanced attacks are very difficult to detect, remain...

    Provided By Sourcefire, Inc.

  • White Papers // May 2014

    Advanced Malware Protection Everywhere (AMP)

    Today’s constantly evolving advanced malware and APTs can evade point-intime defenses to penetrate networks. Security professionals must evolve their strategy in lock-step to confront these advanced threats before, during and after attacks. NSS Labs recently cut through the noise surrounding advanced threats and the tools that fight them in the...

    Provided By Sourcefire, Inc.

  • White Papers // May 2014

    Advanced Malware Protection Buyer's Guide

    Today’s constantly evolving advanced malware and APTs can evade point-intime defenses to penetrate networks. Security professionals must evolve their strategy in lock-step to confront these advanced threats before, during and after attacks. NSS Labs recently cut through the noise surrounding advanced threats and the tools that fight them in the...

    Provided By Sourcefire, Inc.

  • White Papers // May 2014

    Risk, Loss and Security Spending in the Financial Sector: A SANS Survey

    Financial institutions are struggling with internal threats, the means to protect financial accounts from spearphishing and other endpoint attacks, and lack of resources. This white paper will help you understand the drivers for security-related spending in the financial services industry, identify the techniques organizations are adopting to mitigate threats.

    Provided By Sourcefire, Inc.

  • Case Studies // Mar 2014

    Cisco Annual Security Report 2014

    You have to know the threats to stop them. It's not a question of if – but when and how – Internet criminals will get into your network. The Cisco 2014 Annual Security Report highlights the most current security concerns, such as shifts in malware, trends in vulnerabilities, and the...

    Provided By Sourcefire, Inc.

  • Case Studies // Mar 2014

    Calculating Total Cost of Ownership on Intrusion Prevention Technology

    Intrusion prevention technology stops adverse events in real-time, sparing organisations from the disruption and loss that might otherwise have occurred. With advanced correlation and automation, there are many areas in which IPSs can save organisations time and money. This paper, while not scientific, attempts to calculate the value of...

    Provided By Sourcefire, Inc.

  • White Papers // Mar 2014

    Advanced Malware Protection Buyer's Criteria

    In this advanced Malware Protection Buyer's Criteria, we'll identify the key questions you should ask your advanced malware protection vendor, and we'll describe how Sourcefire combines big data analytics, collective security intelligence and enforcement across networks, endpoints, virtual systems and mobile devices, as well as unique Retrospective Security to combat...

    Provided By Sourcefire, Inc.

  • Case Studies // Mar 2014

    Addressing the Malware Challenge: Strategies at Work

    We all know malware is a problem, but what's really being done about it? - IANS answers this question with in-depth research on how 100 large global organisations are combating sophisticated security threats. In general, the report provides insights on how malware is changing, what the implications for defence are...

    Provided By Sourcefire, Inc.

  • Case Studies // Mar 2014

    Next-Generation Network Security: Buyer's Criteria

    This Next-Generation Network Security Buyer's Criteria will provide an in-depth explanation of the factors that drive organisations to look at next-generation solutions. It offers an analysis of the key capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need...

    Provided By Sourcefire, Inc.

  • Case Studies // Mar 2014

    Addressing the Malware Challenge: Strategies at Work

    We all know malware is a problem, but what's really being done about it? - IANS answers this question with in-depth research on how 100 large global organisations are combating sophisticated security threats. In general, the report provides insights on how malware is changing, what the implications for defence are...

    Provided By Sourcefire, Inc.

  • Case Studies // Mar 2014

    Next-Generation Network Security: Buyer's Criteria

    This Next-Generation Network Security Buyer's Criteria will provide an in-depth explanation of the factors that drive organisations to look at next-generation solutions. It offers an analysis of the key capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need...

    Provided By Sourcefire, Inc.

  • White Papers // May 2014

    Advanced Malware Protection Buyer's Guide

    Today’s constantly evolving advanced malware and APTs can evade point-intime defenses to penetrate networks. Security professionals must evolve their strategy in lock-step to confront these advanced threats before, during and after attacks. NSS Labs recently cut through the noise surrounding advanced threats and the tools that fight them in the...

    Provided By Sourcefire, Inc.

  • White Papers // May 2014

    Risk, Loss and Security Spending in the Financial Sector: A SANS Survey

    Financial institutions are struggling with internal threats, the means to protect financial accounts from spearphishing and other endpoint attacks, and lack of resources. This white paper will help you understand the drivers for security-related spending in the financial services industry, identify the techniques organizations are adopting to mitigate threats.

    Provided By Sourcefire, Inc.

  • White Papers // May 2014

    Advanced Malware Protection Everywhere (AMP)

    Today’s constantly evolving advanced malware and APTs can evade point-intime defenses to penetrate networks. Security professionals must evolve their strategy in lock-step to confront these advanced threats before, during and after attacks. NSS Labs recently cut through the noise surrounding advanced threats and the tools that fight them in the...

    Provided By Sourcefire, Inc.

  • White Papers // Jun 2014

    Magic Quadrant for Intrusion Prevention Systems

    According to Gartner, “Leaders produce products that embody NGIPS capabilities, provide high signature quality and low latency, innovate with or ahead of customer challenges (such as providing associated advanced targeted attack, ATA, technologies to make enriched IPS intelligence) and have a range of models. Leaders continually win selections and are...

    Provided By Sourcefire, Inc.

  • White Papers // Jun 2014

    Addressing the Full Attack Continuum

    Today’s threat landscape is nothing like that of just 10 years ago. Simple attacks that caused containable damage have given way to modern cybercrime operations that are sophisticated, well-funded, and capable of causing major loss and disruption to organizations and national infrastructure.These advanced attacks are very difficult to detect, remain...

    Provided By Sourcefire, Inc.

  • Case Studies // Mar 2014

    Cisco Annual Security Report 2014

    You have to know the threats to stop them. It's not a question of if – but when and how – Internet criminals will get into your network. The Cisco 2014 Annual Security Report highlights the most current security concerns, such as shifts in malware, trends in vulnerabilities, and the...

    Provided By Sourcefire, Inc.

  • Case Studies // Mar 2014

    Calculating Total Cost of Ownership on Intrusion Prevention Technology

    Intrusion prevention technology stops adverse events in real-time, sparing organisations from the disruption and loss that might otherwise have occurred. With advanced correlation and automation, there are many areas in which IPSs can save organisations time and money. This paper, while not scientific, attempts to calculate the value of...

    Provided By Sourcefire, Inc.

  • White Papers // Mar 2014

    Advanced Malware Protection Buyer's Criteria

    In this advanced Malware Protection Buyer's Criteria, we'll identify the key questions you should ask your advanced malware protection vendor, and we'll describe how Sourcefire combines big data analytics, collective security intelligence and enforcement across networks, endpoints, virtual systems and mobile devices, as well as unique Retrospective Security to combat...

    Provided By Sourcefire, Inc.