Latest Content From Sourcefire

Whitepaper: Your Organization Has Just Been Attacked by Malware - Now What?

by SourcefireDec 05, 2012

Jumping the gun? Maybe. But odds are it will happen.

Be ready with your Advanced Malware Survival Kit.

Download our Incident Response Brief: 4 keys to effective malware response From there, access:
? Videos: See the power of malware visibility and control from the network to end-devices
? Special Offer: 100 Free Seats of advanced malware protection

Download the Advanced Malware Survival Kit Now and be prepared before the next attack!

Whitepaper: 2012 NSS Labs Next-Generation Firewall Product Analysis Report

by SourcefireOct 19, 2012

Looking to separate hype from reality when it comes to Next-Generation Firewalls?

Look no further.

NSS Labs, the trusted authority in independent product testing, recently evaluated the Sourcefire FirePOWER 8250 in the industry's most rigorous NGFW testing available to date.

The Sourcefire FirePOWER™ 8250 NGFW set a new standard in security effectiveness, performance and value:
•  protection against all attacks

Whitepaper: The 5 Key Benefits of Application Control and How to Achieve Them

by SourcefireSep 21, 2012

Employees feel more empowered than ever to use any application they believe will help them do their job. And attackers are taking advantage of the sheer volume of applications, the Bring-Your-Own-Device (BYOD) trend, social media and other opportunities to glean information and penetrate networks.

How do you encourage productivity and minimize risks?

Application control is key.

Read "The Five Key Benefits of Application Control and How to Achieve Them," by

Whitepaper: Four Keys to Effective Next-Generation Security

by SourcefireJul 25, 2012

Today's targeted threats are often multi-vectored and exploit unknown vulnerabilities - their sophistication defying typical signature-only based inspection. Whether APTs or client-side threats, they use evasive techniques to penetrate our organizations, often purporting to be or riding on applications and exploiting trust relationships with which we've grown all too comfortable with.

To make matters worse, attackers have realized the inadequacies of traditional signature-based

Whitepaper: The 5 New Laws of Anti-Malware

by SourcefireJul 25, 2012

Malware has changed considerably since the early PC viruses first introduced more than 25 years ago. Today, it evolves so quickly that many customers find it nearly impossible to stay ahead of the latest threat.

If the explosion in malware variants wasn't enough, sophisticated Client Side Attacks and Advanced Persistent Threats (APT's) target victims in ways that completely evade traditional security measures.

Current research suggests as much as 75% of new viruses are seen on

Whitepaper: The Case for the Next-Generation IPS

by SourcefireJul 25, 2012

A Next-Generation IPS (NGIPS) offers a logical and essential progression of capabilities needed to protect networks from emerging threats. Pioneered by Sourcefire®, and now endorsed by Gartner, the NGIPS builds on typical IPS solutions by providing contextual awareness - about network activity, systems and applications, people, and more - to promptly assess threats, ensure a consistent and appropriate response, and reduce an organization?s security expenditures.

The purpose of

Whitepaper: Target-Based TCP Timestamp Stream Reassembly

by SourcefireJan 01, 2008

The TCP timestamp option is used by many current operating systems. There are two timestamp values associated with the TCP timestamp options field ? the sender?s timestamp followed by the receiver?s echoed timestamp. Each timestamp value represents the respective computer?s ?up time?, the number of units that have passed since the last reboot. TCP timestamps are used to measure the round trip time (RTT) of a given TCP segment. As well, TCP timestamps provide an indication of when to discard