Sourcefire

Displaying 1-6 of 6 results

  • White Papers // Oct 2012

    2012 NSS Labs Next-Generation Firewall Product Analysis Report

    Looking to separate hype from reality when it comes to Next-Generation Firewalls? Look no further. NSS Labs, the trusted authority in independent product testing, recently evaluated the Sourcefire FirePOWER® 8250 in the industry's most rigorous NGFW testing available to date. The Sourcefire FirePOWER 8250 NGFW set a new...

    Provided By Sourcefire

  • White Papers // Sep 2012

    The Five Key Benefits of Application Control and How to Achieve Them Whitepaper

    Employees feel more empowered than ever to use any application they believe will help them do their job. And attackers are taking advantage of the sheer volume of applications, the Bring-Your-Own-Device (BYOD) trend, social media and other opportunities to glean information and penetrate networks. How do you encourage productivity...

    Provided By Sourcefire

  • White Papers // Jun 2012

    Achieving Information Superiority through the Power of Big Data featuring research by Gartner

    When a network is breached, attackers are leveraging Information Superiority - they are bringing superior intelligence to bear on network and security device problems and using that to gain access. In order to achieve the Information Superiority advantage organizations need a clear baseline of information about their IT environment made...

    Provided By Sourcefire

  • White Papers // May 2009

    Snort Threat Prevention Components

    Snort's threat detection and prevention components work together to reassemble traffic, prevent evasions, detect threats, and output information about these threats without creating false positives or missing legitimate threats. The threat prevention process in Snort consists of multiple components which work together to reassemble traffic as a target host would...

    Provided By Sourcefire

  • Webcasts // Jan 2009

    Enterprise Threat Management (ETM): Bringing Security Together Through Intelligence

    While IT security spending has been on the increase in recent years, unfortunately so have vulnerabilities and successful attacks. Enterprises are still being infected with undetected, targeted malware - evading traditional perimeter and host defenses. Professional hackers are in it for the profit now and are creating sophisticated ways to...

    Provided By Sourcefire

  • Webcasts // Dec 2008

    Building a Real-Time, Adaptive Security Infrastructure

    Witness the dawn of real-time, adaptive security, where companies not only react to threats but also anticipate them by defending the network before, during and after the attack. Check out this program and learn how to create an infrastructure that is truly adaptive and responsive.

    Provided By Sourcefire

  • White Papers // Sep 2012

    The Five Key Benefits of Application Control and How to Achieve Them Whitepaper

    Employees feel more empowered than ever to use any application they believe will help them do their job. And attackers are taking advantage of the sheer volume of applications, the Bring-Your-Own-Device (BYOD) trend, social media and other opportunities to glean information and penetrate networks. How do you encourage productivity...

    Provided By Sourcefire

  • White Papers // Oct 2012

    2012 NSS Labs Next-Generation Firewall Product Analysis Report

    Looking to separate hype from reality when it comes to Next-Generation Firewalls? Look no further. NSS Labs, the trusted authority in independent product testing, recently evaluated the Sourcefire FirePOWER® 8250 in the industry's most rigorous NGFW testing available to date. The Sourcefire FirePOWER 8250 NGFW set a new...

    Provided By Sourcefire

  • Webcasts // Dec 2008

    Building a Real-Time, Adaptive Security Infrastructure

    Witness the dawn of real-time, adaptive security, where companies not only react to threats but also anticipate them by defending the network before, during and after the attack. Check out this program and learn how to create an infrastructure that is truly adaptive and responsive.

    Provided By Sourcefire

  • White Papers // Jun 2012

    Achieving Information Superiority through the Power of Big Data featuring research by Gartner

    When a network is breached, attackers are leveraging Information Superiority - they are bringing superior intelligence to bear on network and security device problems and using that to gain access. In order to achieve the Information Superiority advantage organizations need a clear baseline of information about their IT environment made...

    Provided By Sourcefire

  • Webcasts // Jan 2009

    Enterprise Threat Management (ETM): Bringing Security Together Through Intelligence

    While IT security spending has been on the increase in recent years, unfortunately so have vulnerabilities and successful attacks. Enterprises are still being infected with undetected, targeted malware - evading traditional perimeter and host defenses. Professional hackers are in it for the profit now and are creating sophisticated ways to...

    Provided By Sourcefire

  • White Papers // May 2009

    Snort Threat Prevention Components

    Snort's threat detection and prevention components work together to reassemble traffic, prevent evasions, detect threats, and output information about these threats without creating false positives or missing legitimate threats. The threat prevention process in Snort consists of multiple components which work together to reassemble traffic as a target host would...

    Provided By Sourcefire