All Research Sponsored By:Sourcefire

-
Buyer's Criteria for Advanced Malware Protection
This guide explores the current state of malware in today's threat landscape and discusses some of the top strategies for stopping sophisticated malware.
-
Magic Quadrant for Intrusion Prevention Systems
This guide explores one company's intrusion prevention system and how it can integrate smoothly with your next-generation firewalls to ensure top-notch security.
-
Buyer's Criteria for Next-Generation Network Security
This whitepaper outlines current factors driving organizations to look at next-generation networking solutions and offers analysis on the capabilities of these new technologies.
-
Strategies For Securing Virtualized Environments
This whitepaper explores an effective virtualization security technology and outlines how it can ensure system wide security.
-
Cisco 2014 Annual Security Report
This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
-
Frost and Sullivan 2013 Global Intrusion Prevention Systems Product Leadership Award
In this white paper, learn about the recipient of the Global Intrusion Prevention Systems Product Leadership Award, and how one high-powered security platform stands out in terms of functionality, innovation, acceptance, value, and quality.
-
Next-Generation IPS for Dummies
Despite the hype, you don't need to replace your firewalls to gain application visibility and control. A Next-Generation IPS (NGIPS) can do this – and even detect and protect against advanced malware – without disrupting your security architecture. Learn what a NGIPS can really do. Download the "Next-Generation IPS for Dummies" eBook.
-
Monitoring network traffic: Appliance placement and choke points
It's important for all organizations to monitor network traffic in order to track network performance over time. This expert tip highlights the best points for monitoring traffic flow on a network and why.
-
IDS vs. IPS
When it comes to intrusion detection systems (IDS) and intrusion prevention systems (IPS) it’s not always easy for organizations to determine what functions each can be used for. This expert tip compares the features and capabilities of IDS and IPS technologies and highlights popular use cases for each system.
-
Data Breach Case Study: Heartland Payment Systems
Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.
-
Implementing a "Smart IPS": IANS Working Knowledge Series
The LA Times faced challenges securing its internal network and complying with PCI to address both issues they decided to implement an IPS they develop selection criteria, investigated several solutions, and ultimately selected Sourcefire.