March 10, 2014
New Cisco CTO Martin Roesch says the Cisco product roadmap for network security will include a robust NGFW using Sourcefire technology.
February 25, 2014
The networking giant unveils a new strategy highlighting Sourcefire technology, including new open source application firewall features for Snort.
November 08, 2013
Would you use one cloud to secure another? Some IT shops use Security as a Service to protect Infrastructure as a Service, with these results.
May 21, 2013
New features for detecting and analyzing malware in Sourcefire's FireAMP and FirePOWER products supplement flagging signature-based antimalware.
Snort Get Started
Bring yourself up to speed with our introductory content
This guide is a compilation of SearchSecurity.com's best resources on intrusion detection and prevention. It covers not only the basics of what they are and how they work, but also discusses several other important areas of IDS and IPS security, including IDS/IPS tools, such as Snort, implementation and deployment and wireless intrusion prevention systems (WIPS). Continue Reading
In this Snort Tutorial, you will receive advice from the experts on Snort rules, installation best practices and unified output. You will learn how to use Snort, how to test Snort and how to upgrade to different versions of the intrusion detection tool, like Snort 3.0. Continue Reading
Before deciding on a network intrusion detection or intrusion prevention system (IDS/IPS), check out this Partner Program Directory. Use these checklists to compare partner programs of network IDS/IPS vendors. Continue Reading
Evaluate Snort Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Learn about different tools, tips, programs and resources from every genre of Linux tools, and learn how to deploy and configure the tools that suite your needs. Continue Reading
There are various ways to test Snort's intrusion detection capabilities, including setting rules and running tools such as IDSWakeup. Continue Reading
While Bro and Snort and both open source intrusion detection systems, they use different methods to detect intrusions and can complement one another on the network. Continue Reading
Learn to apply best practices and optimize your operations.
When budgets are cut and open networks still need securing, it may be helpful to try open source security tools as a sufficient and affordable alternative to pricey commercial products. Continue Reading
Mike Chapple offers an alternative to creating an intrusion detection system as well as advice on maintaining a signature database. Continue Reading
Familiarize yourself with Snort rules best practices, including how to acquire, activate and load Snort rules, in this edition of Richard Bejtlich's Snort Report, which includes a discussion on Sourcefire and Bleeding Edge Threats (BET) rules. Continue Reading
Problem Solve Snort Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Snort is one of the industry's top network intrusion-detection tools, but there are plenty of free alternatives. Matthew Pascucci discusses. Continue Reading
Honeypots have long been used to track attackers' activity and defend against coming threats. In this tip, network security expert Anand Sastry describes the different types of honeypots and which is best for your enterprise. Continue Reading
When creating Snort rules, it's often difficult to test them before they go live. In this Scapy tutorial, Judy Novak explains how to use Scapy, a tool that simplifies packet crafting, to test new Snort rules. Continue Reading