Sourcefire

Results: 57



#Item
31At-A-Glance  Cisco Cyber Threat Defense Solution[removed]Protection from Advanced Threats Starts Here Today’s cyber criminals are highly motivated and actively working to

At-A-Glance Cisco Cyber Threat Defense Solution[removed]Protection from Advanced Threats Starts Here Today’s cyber criminals are highly motivated and actively working to

Add to Reading List

Source URL: www.cisco.com

Language: English
32Secure Data Center for Enterprise— Threat Management with NextGen IPS Design Guide—Last Updated: August 26, 2014 About the Authors

Secure Data Center for Enterprise— Threat Management with NextGen IPS Design Guide—Last Updated: August 26, 2014 About the Authors

Add to Reading List

Source URL: www.cisco.com

Language: English
33Secure Data Center for Enterprise— Threat Management with Passive Mode NextGen IPS Implementation Guide—Last Updated: September 16, 2014  About the Authors

Secure Data Center for Enterprise— Threat Management with Passive Mode NextGen IPS Implementation Guide—Last Updated: September 16, 2014 About the Authors

Add to Reading List

Source URL: www.cisco.com

Language: English
34A New Approach  to Assessing Advanced Threat Solutions  December 4, 2014

A New Approach to Assessing Advanced Threat Solutions December 4, 2014

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-03-12 15:57:27
35Under Embargo until April 17, 2012 at 10:00 a.m. Eastern Media Contact Stephanie Look Check Point Software Technologies +[removed]removed]

Under Embargo until April 17, 2012 at 10:00 a.m. Eastern Media Contact Stephanie Look Check Point Software Technologies +[removed]removed]

Add to Reading List

Source URL: www.infosecurityproject.com

Language: English - Date: 2015-02-04 04:23:16
36Microsoft Word - Provisions - Service.doc

Microsoft Word - Provisions - Service.doc

Add to Reading List

Source URL: www.metwashairports.com

Language: English - Date: 2014-05-30 16:21:39
37Custom Intrusion Detection Techniques for Monitoring Web Applications Matthew Olney Sourcefire VRT

Custom Intrusion Detection Techniques for Monitoring Web Applications Matthew Olney Sourcefire VRT

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:51
38Washington, DC  | December 7-16, 2012

Washington, DC | December 7-16, 2012

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2012-08-21 04:14:04
39Managed Intrusion Detection Real Time Network Visibility

Managed Intrusion Detection Real Time Network Visibility

Add to Reading List

Source URL: www.signify.net

Language: English - Date: 2014-02-19 04:12:34
40sourcefire3800_pci_v12_090505

sourcefire3800_pci_v12_090505

Add to Reading List

Source URL: www.icsalabs.com

Language: English - Date: 2010-08-10 09:59:04