New Appliance from Sourcefire Provides Continuous Analysis and Retrospective Security to Address Malware Across the Enterprise
Network security firm Sourcefire, on Monday introduced a dedicated appliance designed to help customers defend against advanced forms of malware that hit their networks, from the point of entry, through propagation, to post-infection remediation.
The new Advanced Malware Protection (AMP) Appliance from Columbia, Maryland-based Sourcefire is built on the company’s FirePOWER platform and provides increased deployment flexibility for organizations needing immediate protection against advanced malware, Sourcefire said.
The appliance is deployed inline, and provides malware detection and blocking, as well as continuous file analysis and “retrospective security”. By creating forensic fingerprints of files to identify known malware, the solution tracks file movement across the enterprise and helps identify attack targets for more efficient remediation, the company explained. As a result, users can be alerted of potentially malicious files that may have entered their environment, even if they were previously classified as a non-threat.
“Networks are constantly evolving and expanding and attackers are taking advantage of any gaps to permeate a network and accomplish their mission,” said Martin Roesch, Sourcefire founder and interim CEO. “Thwarting attacks isn’t just about blocking but also about using retrospective security to mitigate the impact once an attacker gets in. Sourcefire’s threat-centric approach to security gives organizations continuous visibility, analysis and control across their environment and along the full attack continuum — before, during and after an attack.”
“Given today’s threat landscape, advanced malware detection and protection discussions should extend beyond blocking/prevention and highlight security intelligence, analytics, incident detection/response and lessons learned,” said Jon Oltsik, Senior Principal Analyst, Enterprise Strategy Group. “Organizations need to shift from tools that are mere gateways to an enterprise network security approach for better protection against a broader range of threats and vulnerabilities over time.”
Monday’s announcement follows the company’s recently-announced Incident Response Professional Services, an offering designed to help customers address advanced malware incidents.

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.
More from Mike Lennon
- ‘No Evidence’ of Cyberattack Related to FAA Outage, White House Says
- SecurityWeek to Host 2022 ICS Cybersecurity Conference October 24-27 in Atlanta
- Google Completes $5.4 Billion Acquisition of Mandiant
- Cybersecurity Firm ZeroFox Begins Trading on Nasdaq via SPAC Deal
- HUMAN Security and PerimeterX Merge on Mission to Combat Bots
- Last Call: CFP for ICS Cybersecurity Conference Closes July 15th
- Johnson Controls Acquires Tempered Networks to Shield Buildings From Cyberattacks
- Snowflake Launches Cybersecurity Workload to Find Threats Across Massive Data Sets
Latest News
- Malicious NPM, PyPI Packages Stealing User Information
- VMware Confirms Exploit Code Released for Critical vRealize Logging Vulnerabilities
- 98% of Firms Have a Supply Chain Relationship That Has Been Breached: Analysis
- Dutch, European Hospitals ‘Hit by Pro-Russian Hackers’
- Gem Security Gets $11 Million Seed Investment for Cloud Incident Response Platform
- Ransomware Leads to Nantucket Public Schools Shutdown
- Stop, Collaborate and Listen: Disrupting Cybercrime Networks Requires Private-Public Cooperation and Information Sharing
- Boxx Insurance Raises $14.4 Million in Series B Funding
