Sourcefire, Inc was a technology company that developed
network security hardware and software. The company's Firepower network security
appliances were based on
Snort, an
open-source
Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use and view the source code, design documents, or content of the product. The open source model is a decentrali ...
intrusion detection system
An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically either reported to an administrator or collec ...
(IDS). Sourcefire was acquired by Cisco for $2.7 billion in July 2013.
Background
Sourcefire was founded in 2001 by
Martin Roesch, the creator of
Snort. The company created a commercial version of the Snort software, the Sourcefire 3D System, which evolved into the company's Firepower line of network security products. The company's headquarters was in
Columbia, Maryland
Columbia is a planned community in Howard County, Maryland, United States, consisting of 10 self-contained villages. With a population of 104,681 at the 2020 United States census, 2020 census, it is the second-most-populous community in Maryland ...
in the United States, with offices abroad.
Financial
The company's initial growth was funded through four separate rounds of financing raising a total of $56.5 million from venture investors such as
Sierra Ventures,
New Enterprise Associates
New Enterprise Associates (NEA) is an American-based venture capital firm. NEA focuses investment stages ranging from seed stage through growth stage across an array of industry sectors. With over $25 billion in committed capital, NEA is one of t ...
,
Sequoia Capital
Sequoia Capital Operations, LLC is an American venture capital firm headquartered in Menlo Park, California, specializing in seed stage, early stage, and growth stage investments in private companies across technology sectors. the firm had appro ...
, Core Capital Partners, Inflection Point Ventures, Meritech Capital Partners, and Cross Creek Capital, L.P.
In 2005,
Check Point Software attempted to acquire Sourcefire for $225 million, but later withdrew its offer after it became clear US authorities would attempt to block the acquisition. The company completed an
initial public offering
An initial public offering (IPO) or stock launch is a public offering in which shares of a company are sold to institutional investors and usually also to retail (individual) investors. An IPO is typically underwritten by one or more investm ...
in March 2007, raising $86.3 million. In August of the same year, Sourcefire acquired
Clam AntiVirus. Sourcefire rejected an offer of $187 million in May 2008 from security appliance vendor
Barracuda Networks, who had offered to pay US$7.50 per share, amounting to a 13% premium of their then-current stock price. Sourcefire announced its acquisition of the cloud-based antivirus firm
Immunet in January 2011.
Revenue for the fourth quarter of 2012 was $67.4 million compared to $53.2 million in the fourth quarter of 2011, an increase of 27%. Revenue for the year ending December 31, 2012 was $223.1 million compared to $165.6 million for 2011, an increase of 35%. International revenues were $74.4 million, up 77% over 2011. As of December 31, 2012, the company's cash, cash equivalents, and investments totaled $204.0 million.
Sourcefire received SC Magazine's 2009 "Reader Trust" award for best intrusion detection and
intrusion prevention system
An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically either reported to an administrator or collec ...
(IDS/IPS) for Snort and Network World's "2009 Best of Tests" award for the Sourcefire 3D System.
On July 23, 2013,
Cisco Systems
Cisco Systems, Inc. (using the trademark Cisco) is an American multinational corporation, multinational digital communications technology conglomerate (company), conglomerate corporation headquartered in San Jose, California. Cisco develops, m ...
announced a definitive agreement to acquire Sourcefire for $2.7 billion.
Products
Firepower
The Sourcefire Firepower line of appliances are designed to form part of a layered security defense. They can be deployed as:
* Next-Generation
Intrusion Prevention System
An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically either reported to an administrator or collec ...
(NGIPS), with network visibility into hosts, operating systems, applications, services, protocols, users, content, network behavior and network attacks and malware.
* Next-Generation
Firewall (NGFW) with NGIPS, incorporating access and application control, threat prevention and firewall capabilities
* Next-Generation Intrusion Prevention System with integrated:
:* Application control
:*
Malware
Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
protection
:*
URL
A uniform resource locator (URL), colloquially known as an address on the Web, is a reference to a resource that specifies its location on a computer network and a mechanism for retrieving it. A URL is a specific type of Uniform Resource Identi ...
filtering
* Advanced Malware Protection Appliance for dedicated inline network protection against advanced malware.
Advanced Malware Protection
Sourcefire Advanced Malware Protection (AMP) offers malware analysis and protection for networks and endpoints using
big data
Big data primarily refers to data sets that are too large or complex to be dealt with by traditional data processing, data-processing application software, software. Data with many entries (rows) offer greater statistical power, while data with ...
analytics to discover, understand and block advanced malware outbreaks, advanced persistent threats (APTs) and targeted attacks. AMP enables malware detection and blocking while provisioning continuous analysis and retrospective alerting, using Sourcefire's cloud security intelligence.
Advanced Malware Protection can be deployed inline via a
product key
A product key, also known as a software key, serial key or activation key, is a specific software-based key for a computer program. It certifies that the copy of the program is original.
Product keys consist of a series of numbers and/or letters ...
on NGIPS, dedicated AMP Firepower appliance or on endpoints, virtual and mobile devices with FireAMP.
Snort
Snort is an open source network
intrusion prevention and detection system utilizing a rule-driven language, which combines signature, protocol and anomaly based inspection methods. Developed in tandem with the Snort open source community, its developers claim it is the most widely deployed intrusion detection and prevention technology worldwide.
Immunet
Immunet uses the cloud
virus definition
Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.
Antivirus software was originally developed to detect and remove computer viruses, hence the name ...
s along with virus definitions from Clam AntiVirus which is an open source (
GPL) anti-virus toolkit primarily used on UNIX operating systems designed for e-mail scanning on
e-mail gateways. It provides a number of utilities including a
multi-threaded
In computer architecture, multithreading is the ability of a central processing unit (CPU) (or a single core in a multi-core processor) to provide multiple threads of execution.
Overview
The multithreading paradigm has become more popular a ...
daemon
A demon is a malevolent supernatural being, evil spirit or fiend in religion, occultism, literature, fiction, mythology and folklore.
Demon, daemon or dæmon may also refer to:
Entertainment Fictional entities
* Daemon (G.I. Joe), a character ...
, a
command-line interface
A command-line interface (CLI) is a means of interacting with software via command (computing), commands each formatted as a line of text. Command-line interfaces emerged in the mid-1960s, on computer terminals, as an interactive and more user ...
scanner and tool for automatic database updates. The core of the package is an anti-virus engine available in a form of a
shared library
In computing, a library is a collection of System resource, resources that can be leveraged during software development to implement a computer program. Commonly, a library consists of executable code such as compiled function (computer scienc ...
. Immunet was provided in two versions, Free and Plus.
As of June 10, 2014, Immunet Plus is no longer available, replaced with Immunet Free, supported by Cisco.
">/sup>
Sourcefire Vulnerability Research Team
The Sourcefire Vulnerability Research Team (VRT) was a group of network security engineers which discovered and assessed trends in hacking activities, intrusion attempts, and vulnerabilities. Members of the Sourcefire VRT include the ClamAV team as well as authors of several standard security reference books and articles. The Sourcefire VRT is also supported by the resources of the open source Snort and ClamAV communities.
The group focuses on developing vulnerability-based rules to protect against emerging exploits for Sourcefire customers and Snort users. The VRT has provided zero-day protection for outbreaks of malware
Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
, including Conficker, Netsky, Nachi, Blaster, Sasser, Zotob
"The Zotob worm and several variations of it, known as Rbot.cbq, SDBot.bzh and Zotob.d, infected computers at companies such as ABC, CNN, The Associated Press, ''The New York Times'', and Caterpillar Inc." — ''Business Week'', August 16, 20 ...
, Nachi among others. The VRT also delivers rules that provide same day protection for Microsoft Tuesday
Patch Tuesday (also known as Update Tuesday) is an unofficial term used to refer to when Microsoft, Adobe, Oracle and others regularly release software patches for their software products. It is widely referred to in this way by the industry. Micro ...
vulnerabilities, develops the official Snort rules used by the Sourcefire 3D System, develops and maintains the official rule set of Snort.org, and maintains shared object rules that are distributed for various platforms in binary format.
Following the Cisco acquisition of Sourcefire in 2013, the VRT combined with Cisco's TRAC and SecApps (Security Applications) group to form Cisco Talos. "Talos" was officially coined in usage in 2014, followed by its trademark, and was announced at Blackhat that year.
See also
* Antivirus software
Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.
Antivirus software was originally developed to detect and remove computer viruses, hence the name ...
* Intrusion detection system
An intrusion detection system (IDS) is a device or software application that monitors a network or systems for malicious activity or policy violations. Any intrusion activity or violation is typically either reported to an administrator or collec ...
(IDS)
* Real-time adaptive security
Notes
References
External links
*
Snort homepage
ClamAV homepage
{{Antivirus software
2001 establishments in Maryland
Computer security software companies
Software companies established in 2001
American companies established in 2001
2013 mergers and acquisitions
Free software companies
Software companies based in Maryland
Companies based in Columbia, Maryland
Companies formerly listed on the Nasdaq
Cisco acquisitions
Software companies of the United States