TECH DIGITAL RESOURCE LIBRARY

Latest Content From Sourcefire

Whitepaper: Your Organization Has Just Been Attacked by Malware - Now What?

by SourcefireDec 05, 2012

Jumping the gun? Maybe. But odds are it will happen.

Be ready with your Advanced Malware Survival Kit.

Download our Incident Response Brief: 4 keys to effective malware response From there, access:
� Videos: See the power of malware visibility and control from the network to end-devices
� Special Offer: 100 Free Seats of advanced malware protection

Download the Advanced Malware Survival Kit Now and be prepared before the next attack!


Whitepaper: 2012 NSS Labs Next-Generation Firewall Product Analysis Report

by SourcefireOct 19, 2012

Looking to separate hype from reality when it comes to Next-Generation Firewalls?

Look no further.

NSS Labs, the trusted authority in independent product testing, recently evaluated the Sourcefire FirePOWER 8250 in the industry's most rigorous NGFW testing available to date.

The Sourcefire FirePOWER™ 8250 NGFW set a new standard in security effectiveness, performance and value:
•  protection against all attacks
•  firewall enforcement
•  application control
•  identity/user awareness
•  Gbps real-world traffic throughput
•  TCO of $33 per Mbps protected

For more real-world test results read the 2012 NSS Labs Next-Generation Firewall Product Analysis Report for the FirePOWER 8250 NGFW .


Whitepaper: The 5 Key Benefits of Application Control and How to Achieve Them

by SourcefireSep 21, 2012

Employees feel more empowered than ever to use any application they believe will help them do their job. And attackers are taking advantage of the sheer volume of applications, the Bring-Your-Own-Device (BYOD) trend, social media and other opportunities to glean information and penetrate networks.

How do you encourage productivity and minimize risks?

Application control is key.

Read "The Five Key Benefits of Application Control and How to Achieve Them," by Sourcefire security experts, and learn:

� Why application control is so critical to your network security
� How to satisfy employee needs while limiting exposure
� Must haves when evaluating application control solutions


Whitepaper: Four Keys to Effective Next-Generation Security

by SourcefireJul 25, 2012

Today's targeted threats are often multi-vectored and exploit unknown vulnerabilities - their sophistication defying typical signature-only based inspection. Whether APTs or client-side threats, they use evasive techniques to penetrate our organizations, often purporting to be or riding on applications and exploiting trust relationships with which we've grown all too comfortable with.

To make matters worse, attackers have realized the inadequacies of traditional signature-based approaches and have accelerated the pace of change and obfuscated their code through polymorphic techniques. By doing so they can circumvent traditional static defenses.


Whitepaper: The 5 New Laws of Anti-Malware

by SourcefireJul 25, 2012

Malware has changed considerably since the early PC viruses first introduced more than 25 years ago. Today, it evolves so quickly that many customers find it nearly impossible to stay ahead of the latest threat.

If the explosion in malware variants wasn't enough, sophisticated Client Side Attacks and Advanced Persistent Threats (APT's) target victims in ways that completely evade traditional security measures.

Current research suggests as much as 75% of new viruses are seen on a single endpoint and only about 40% of new Malware even gets detected. It's not a question of if your network will be attacked with advanced malware. It's a question of when it will happen and how you will respond. Advanced malware is changing the way security is managed.


Whitepaper: The Case for the Next-Generation IPS

by SourcefireJul 25, 2012

A Next-Generation IPS (NGIPS) offers a logical and essential progression of capabilities needed to protect networks from emerging threats. Pioneered by Sourcefire®, and now endorsed by Gartner, the NGIPS builds on typical IPS solutions by providing contextual awareness - about network activity, systems and applications, people, and more - to promptly assess threats, ensure a consistent and appropriate response, and reduce an organization?s security expenditures.

The purpose of this paper is:
• To describe why NGIPS is critical in defending against today's threat landscape
• To list the essential ingredients of a NGIPS solution, as defined by Gartner
• To map Gartner's requirements against Sourcefire's NGIPS offering
• To contrast Sourcefire's NGIPS against a typical, first-generation IPS


Whitepaper: Target-Based TCP Timestamp Stream Reassembly

by SourcefireJan 01, 2008

The TCP timestamp option is used by many current operating systems. There are two timestamp values associated with the TCP timestamp options field ? the sender?s timestamp followed by the receiver?s echoed timestamp. Each timestamp value represents the respective computer?s ?up time?, the number of units that have passed since the last reboot. TCP timestamps are used to measure the round trip time (RTT) of a given TCP segment. As well, TCP timestamps provide an indication of when to discard delayed segments ? a process known as Protection Against Wrapped Sequence Numbers (PAWS).