{"id":1614,"date":"2013-02-25T00:00:00","date_gmt":"2013-02-25T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/02\/25\/sourcefire-anti-malware-appliance-aims-to-stop-apts-in-their-tracks\/"},"modified":"2021-12-30T11:39:42","modified_gmt":"2021-12-30T11:39:42","slug":"sourcefire-anti-malware-appliance-aims-to-stop-apts-in-their-tracks","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/02\/25\/sourcefire-anti-malware-appliance-aims-to-stop-apts-in-their-tracks\/","title":{"rendered":"Sourcefire anti-malware appliance aims to stop APTs in their tracks"},"content":{"rendered":"<p>The AMP appliance is built on the firm&#8217;s FirePower platform, and is designed to add further continuous file analysis, retrospective security, malware detection and blocking features. Sourcefire claimed the tool does this by adding forensic fingerprints to files that can be used to track file movements and identify the targets of advanced attacks. This network collates and shares information about known malware between the company&#8217;s clients to offer a fast alert and cyber response service. Sourcefire claimed the network is connected to millions of end points, making it one of the most comprehensive security information services in the world.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The firm said the combination of services will offer companies unmatched visibility across their network, letting them dynamically see how malware enters, infects and moves thus letting them intelligently respond to the threat.<\/p>\n<p>&#8220;Sourcefire&#8217;s threat-centric approach to security gives organisations continuous visibility, analysis and control across their environment and along the full attack continuum &#8211; before, during and after an attack.&#8221;<\/p>\n<p>Sourcefire is one of many companies to warn businesses that they must implement more robust network monitoring tools if they want to defend themselves from hackers.<\/p>\n<p>BAE Systems recently told V3 that firms&#8217; current lack of knowledge regarding what&#8217;s going on in their systems is giving hackers an advantage, by letting them shift tactics whenever they are uncovered.<\/p>\n<p>Link: http:\/\/www.v3.co.uk\/v3-uk\/news\/2250158\/sourcefire-antimalware-appliance-aims-to-stop-apts-in-their-tracks<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1614","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1614","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1614"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1614\/revisions"}],"predecessor-version":[{"id":4101,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1614\/revisions\/4101"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1614"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1614"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}