Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

5/25/2010
03:11 PM
50%
50%

Sourcefire Expands Real-Time Application Awareness

Capability provides users with increased network visibility

COLUMBIA, Md., May 24, 2010 – Sourcefire, Inc. (Nasdaq:FIRE), the creators of Snort' and a leader in intelligent cybersecurity solutions, today announced enhancements that provide the Sourcefire IPSTM, the industry’s leading intrusion prevention system (IPS), with real-time visibility into the specific applications running on an organization’s network. Sourcefire' is expanding its existing library of more than 200 application detectors by adding support for popular applications and services such as Gmail, HTTP and RSS, making it easier than ever to tailor IPS protection, assess the impact of threats, and enforce IT policy compliance.

“Single-purpose technologies, like firewalls and traditional IPS devices, don’t provide a combined view into the context or depth of users, applications, devices and data on the network. For truly effective protection and policy management, organizations need real-time visibility of everything on the network,” said John Burris, Chief Executive Officer of Sourcefire. “By further extending our application visibility, Sourcefire is providing users with the comprehensive intelligence they need to defend their dynamically changing networks against today’s most sophisticated threats.”

Sourcefire’s real-time application awareness capability provides users with increased network visibility, so they can better protect against application-specific threats. It offers numerous advantages over a traditional IPS, including:

* Automating the process of IPS tuning, based on specific knowledge of the network for increased security and reduced management; * Providing automated and informed impact assessment of potential threats by correlating attacks against the device, operating system, applications and potential vulnerabilities, significantly reducing the number of actionable events; * Monitoring and enforcing IT Acceptable Use Policies (AUPs), enabling IT to identify and remove unapproved operating systems and applications, thereby reducing the exposure to an attack and staying compliant.

Sourcefire can already identify more than 200 operating systems and applications including Microsoft Windows, Oracle databases, leading email programs and web browsers, popular instant messenger services, peer-to-peer applications and even gaming systems such as Xbox and Wii. Beginning with the Sourcefire 3D' System 4.9.1 release, available now, the company has expanded its detection to an additional 12 common services and client applications, including SSH, Google Desktop, Gmail, MySpace, Picasa, RSS and popular HTTP services such as Audio, Video, QuickTime and Flash. An enhancement to the 3D System’s infrastructure included in the 4.9.1 release enables Sourcefire to expand its application detector library more frequently throughout the year.

About Sourcefire

Sourcefire, Inc. (Nasdaq:FIRE), is a world leader in intelligent cybersecurity solutions. Sourcefire is transforming the way Global 2000 organizations and government agencies manage and minimize network security risks. Sourcefire’s IPS and Real-time Adaptive Security solution equips customers with an efficient and effective layered security defense – protecting network assets before, during and after an attack. Through the years, Sourcefire has been consistently recognized for its innovation and industry leadership by customers, media and industry analysts alike – with more than 50 awards and accolades. Today, the names Sourcefire and founder Martin Roesch have grown synonymous with innovation and network security intelligence. For more information about Sourcefire, please visit http://www.sourcefire.com.

SOURCEFIRE', SNORT', the Sourcefire logo, the Snort and Pig logo, SECURITY FOR THE REAL WORLD™, SOURCEFIRE DEFENSE CENTER', SOURCEFIRE 3D', RNA', RUA™, DAEMONLOGGER™, CLAMAV', and certain other trademarks and logos are trademarks or registered trademarks of Sourcefire, Inc. in the United States and other countries. Other company, product and service names may be trademarks or service marks of others.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-21392
PUBLISHED: 2021-04-12
Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse). Matrix is an ecosystem for open federated Instant Messaging and VoIP. In Synapse before version 1.28.0 requests to user provided domains were not restricted to external IP addresses when transitional IPv6 addre...
CVE-2021-21393
PUBLISHED: 2021-04-12
Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse). Matrix is an ecosystem for open federated Instant Messaging and VoIP. In Synapse before version 1.28.0 Synapse is missing input validation of some parameters on the endpoints used to confirm third-party identif...
CVE-2021-29429
PUBLISHED: 2021-04-12
In Gradle before version 7.0, files created with open permissions in the system temporary directory can allow an attacker to access information downloaded by Gradle. Some builds could be vulnerable to a local information disclosure. Remote files accessed through TextResourceFactory are downloaded in...
CVE-2021-21394
PUBLISHED: 2021-04-12
Synapse is a Matrix reference homeserver written in python (pypi package matrix-synapse). Matrix is an ecosystem for open federated Instant Messaging and VoIP. In Synapse before version 1.28.0 Synapse is missing input validation of some parameters on the endpoints used to confirm third-party identif...
CVE-2021-22497
PUBLISHED: 2021-04-12
Advanced Authentication versions prior to 6.3 SP4 have a potential broken authentication due to improper session management issue.