{"id":1597,"date":"2010-05-24T00:00:00","date_gmt":"2010-05-24T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/05\/24\/sourcefire-expands-real-time-application-awareness-extending-leadership-of-intelligent-cybersecurit\/"},"modified":"2021-12-30T11:39:40","modified_gmt":"2021-12-30T11:39:40","slug":"sourcefire-expands-real-time-application-awareness-extending-leadership-of-intelligent-cybersecurit","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/05\/24\/sourcefire-expands-real-time-application-awareness-extending-leadership-of-intelligent-cybersecurit\/","title":{"rendered":"Sourcefire Expands Real-Time Application Awareness, Extending Leadership of Intelligent Cybersecurit"},"content":{"rendered":"<p>Sourcefire, Inc. (Nasdaq:FIRE), the creators of Snort\u00ae and a leader in intelligent cybersecurity: solutions, today announced enhancements that provide the Sourcefire IPS, the industry&#8217;s leading intrusion prevention system (IPS), with real-time visibility into the specific applications running on an organization&#8217;s network.  Sourcefire is expanding its existing library of more than 200 application detectors by adding support for popular applications and services such as Gmail, HTTP and RSS, making it easier than ever to tailor IPS protection, assess the impact of threats, and enforce IT policy compliance.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Single-purpose technologies, like firewalls and traditional IPS devices, don&#8217;t provide a combined view into the context or depth of users, applications, devices and data on the network&#8230; For truly effective protection and policy management, organizations need real-time visibility of everything on the network,&#8221; said John Burris, Chief Executive Officer of Sourcefire.<\/p>\n<p>http:\/\/www.pr-inside.com\/sourcefire-expands-real-time-application-awareness-r1909416.htm<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1597","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1597"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1597\/revisions"}],"predecessor-version":[{"id":4084,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1597\/revisions\/4084"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1597"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}