All resources sponsored by:

Sourcefire

12 Matches
Buyer's Criteria for Advanced Malware Protection
sponsored by Sourcefire
WHITE PAPER:This guide explores the current state of malware in today's threat landscape and discusses some of the top strategies for stopping sophisticated malware.
Posted: 07 Apr 2014 | Published: 07 Apr 2014
Get This Now


Magic Quadrant for Intrusion Prevention Systems
sponsored by Sourcefire
WHITE PAPER:This guide explores one company's intrusion prevention system and how it can integrate smoothly with your next-generation firewalls to ensure top-notch security.
Posted: 04 Apr 2014 | Published: 31 Dec 2013
Get This Now


Buyer's Criteria for Next-Generation Network Security
sponsored by Sourcefire
WHITE PAPER:This whitepaper outlines current factors driving organizations to look at next-generation networking solutions and offers analysis on the capabilities of these new technologies.
Posted: 04 Apr 2014 | Published: 31 Dec 2013
Get This Now


Strategies For Securing Virtualized Environments
sponsored by Sourcefire
WHITE PAPER:This whitepaper explores an effective virtualization security technology and outlines how it can ensure system wide security.
Posted: 03 Apr 2014 | Published: 31 Dec 2013
Get This Now


Cisco 2014 Annual Security Report
sponsored by Sourcefire
WHITE PAPER:This in-depth report provides valuable insight into the top security concerns of 2014 and what your organization can do to prevent cybercrime.
Posted: 01 Apr 2014 | Published: 01 Apr 2014
Get This Now


Frost and Sullivan 2013 Global Intrusion Prevention Systems Product Leadership Award
sponsored by Sourcefire
WHITE PAPER:In this white paper, learn about the recipient of the Global Intrusion Prevention Systems Product Leadership Award, and how one high-powered security platform stands out in terms of functionality, innovation, acceptance, value, and quality.
Posted: 22 May 2013 | Published: 22 May 2013
Get This Now


Next-Generation IPS for Dummies
sponsored by Sourcefire
EBOOK:Despite the hype, you don't need to replace your firewalls to gain application visibility and control. A Next-Generation IPS (NGIPS) can do this – and even detect and protect against advanced malware – without disrupting your security architecture. Learn what a NGIPS can really do. Download the "Next-Generation IPS for Dummies" eBook.
Posted: 30 Apr 2013 | Published: 01 Jan 2013
Get This Now


Monitoring network traffic: Appliance placement and choke points
sponsored by Sourcefire
EGUIDE:It's important for all organizations to monitor network traffic in order to track network performance over time. This expert tip highlights the best points for monitoring traffic flow on a network and why.
Posted: 04 May 2011 | Published: 04 May 2011
Get This Now


IDS vs. IPS
sponsored by Sourcefire
EGUIDE:When it comes to intrusion detection systems (IDS) and intrusion prevention systems (IPS) it’s not always easy for organizations to determine what functions each can be used for. This expert tip compares the features and capabilities of IDS and IPS technologies and highlights popular use cases for each system.
Posted: 29 Apr 2011 | Published: 29 Apr 2011
Get This Now


Data Breach Case Study: Heartland Payment Systems
sponsored by Sourcefire
CASE STUDY:Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.
Posted: 18 Mar 2009 | Published: 01 Jan 2009
Get This Now


Implementing a "Smart IPS": IANS Working Knowledge Series™
sponsored by Sourcefire
CASE STUDY:The LA Times faced challenges securing its internal network and complying with PCI to address both issues they decided to implement an IPS they develop selection criteria, investigated several solutions, and ultimately selected Sourcefire.
Posted: 09 Jun 2008 | Published: 01 Jun 2008
Get This Now


SANS What Works in Intrusion Prevention and Detection
sponsored by Sourcefire
PRODUCT LITERATURE: This white paper shows you how TransUnion was able to successfully implement an effective intrusion defense system (IDS) that helped them meet compliance requirements and secure their corporate environment.
Posted: 20 Nov 2007 | Published: 01 May 2007
Get This Now


12 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement