- Fire eye :
- Mobile Security
- Endpoint Security
- Threat Analytics Platform
- Network Security (NX Series)
- File Content Security
- FireEye Threat Intelligence
- Email Security (EX Series)
- Forensic Analysis (AX Series)
- FireEye as a Service
Detect and prevent cyber attacks that spy on, profile, or use mobile devices
Falicious apps compromise mobile security to access private information, such as contact lists and calendar details. They also use mobile device features, such as cameras and microphones, to spy, profile users, or conduct cyber attacks. FireEye Mobile Security (Mobile Threat Prevention) detects and prevents these mobile threats and provides visibility into mobile security trends across the enterprise. FireEye Mobile Threat Prevention also integrates with industry leading mobile device management (MDM) providers.
Comprehensive endpoint visibility with threat intelligence for analysis and inspection Most deployed endpoint systems use traditional security that relies on signature-based defenses. Skilled attackers can readily bypass these defenses. Organizations need to address this security gap. FireEye now offers its industry-leading threat detection capabilities from the network core to the endpoint with FireEye Endpoint Security (HX Series). With this solution, you can enhance endpoint visibility and enable a flexible and adaptive defense against known and unknown threats.
Quickly detect and respond to threats discovered via event and data stream threat analytics Information technology systems and applications produce a continuous stream of event and log details that can reveal suspicious behavior. Threat analytics offers the ability to proactively filter through huge amounts of data and identify real threats. The Threat Analytics Platform (TAP) applies threat intelligence, expert rules, and advanced security data analytics to noisy event data streams. By revealing suspicious behavior patterns and generating alerts that matter, security teams can prioritize and optimize their response efforts.
Detect and block malicious content that threatens file content security File content security, which would cover online file shares, portable file storage, and services such as SharePoint, is a significant concern for your networks. Advanced cyber attackers can breach file content security, and then launch advanced attacks capable of compromising key systems in an organization. FireEye File Content Security (FX Series) products help prevent, detect, and respond to cyber attacks by scanning file content for signs of malicious threats. These threats might be brought into an organization from outside sources, such as online file sharing services and portable file storage devices.
Detect and block spear phishing and other threats to email security Cyber criminals often use spear phishing attacks, as well as malicious file attachments and URLs in emails, to launch an advanced cyber attack. These email attacks routinely bypass email security that uses conventional signature-based defenses such as antivirus and spam filters. FireEye Email Security products (EX and ETP) protect against these cyber attacks. These products detonate and analyze suspicious email attachments and embedded URLs and block malicious activity to enhance email security. With these capabilities, organizations can prevent, detect, and respond to email-based cyber attacks. For additional email security, FireEye also provides anti-virus and anti-spam protection through Email Threat Prevention (ETP) in the cloud.
Detect and block malicious files, communications, and exploits to improve web and network security Advanced cyber attacks use the web and network traffic as a primary threat vector to compromise key systems, perform reconnaissance on network security, establish long-term control and access, and steal data. FireEye Network Security (NX) products, now available in modular 2- and 4-Gbps appliances, enable organizations to prevent, detect, and respond to zero -day exploit attempts against network security. It also defends networks from web drive-by downloads, and advanced malware that routinely bypasses conventional signature-reliant defenses. The add-on SSL Intercept appliance gives Network Security products visibility into SSL traffic to detect and block encrypted attacks.
Respond to Advanced Threats Faster and Smarter with Industry-Leading Threat Intelligence Organizations continue to fight an asymmetric battle that they are ill-equipped to win. Attackers are sophisticated, well-funded, well-organized, and use highly targeted techniques. Most organizations stake their security efficacy on legacy, signature-based tactical intelligence feeds that can neither anticipate attacks nor provide any intelligence to guide response. Instead they increase alert volumes with false positives, making them impossible to manage and providing a false sense of safety. Unsurprisingly, organizations continuously find themselves fighting attacks that can take months to detect and respond to. And their costs continue to skyrocket. FireEye Threat Intelligence is the most extensive and immediately operational cyber intelligence. It enables security teams to detect and respond to threats effectively and efficiently.
Enterprise forensics and investigation analysis minimize impact of network attacks To reduce the impact of a security incident, organizations should focus on early detection and swift investigation. Enterprise forensics makes this possible. When attacked, an enterprise needs to be able to rapidly investigate and determine the scope and impact of the incident so they can effectively contain the threat and re-secure their network. The FireEye Network Forensics Platform (PX series) and the Investigation Analysis system (IA series) are a powerful combination, pairing the industry's fastest, lossless network data capture and retrieval solution with centralized analysis and visualization. Enterprise forensics combines high performance packet capture with analysis tools to aid investigation efforts. It complements several other FireEye threat prevention and detection capabilities.
echnology alone will not defeat a determined attacker. You also need expertise and intelligence. With every new layer of cyber security you put in place, the attackers respond by evolving their own tools and techniques. To combat this constantly changing threat you, too, need a new approach: FireEye as a Service. This is not your usual Managed Security Service and it's not your typical Managed Security Services Provider (MSSP) arrangement. With FireEye as a Service, our threat analysts are an extension of your cyber security team. The analysts provide: Insight and intelligence from the front lines of incident responses Proactive hunting for indicators of compromise (IOCs) in your environment Around the clock monitoring for indications that a cyber attack has bypassed your technology defenses Having swift detection, analysis, and response means attackers never gain a foothold and your business assets stay safe.