FireEye - Computer 2000

FireEye

FireEye is the intelligence-led security company.

About

Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence and world-renowned Mandiant® consulting.

With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent and respond to cyberattacks. FireEye knows more about cyber security than anyone else.

WHY FIREEYE?

In a complex world, FireEye are inspired by helping to create peace of mind, a sense of security and a feeling of control over one’s environment.

BUILT TO INNOVATE

World-class solutions built with frontline expertise.

Frontline Human Expertise

FireEye have industry-recognized threat researchers, malware analysts, intelligence analysts, and investigators live on the front lines of cyber conflict every day.

Unique Learning System

This frontline knowledge guides the design of their innovative technology solutions to ensure they always address evolving threats and tactics.

Field-Proven Solutions

Some of FireEye’s most demanding customers are their own field experts, who deploy their solutions in real-world environments against active threats. That’s how they know they’ll protect you in yours.

FireEye Network Security and Forensics

HAVE A QUESTION?

VISIT PRODUCT PAGE

FireEye Network Security is an effective cyber threat protection solution that helps organizations minimize the risk of costly breaches by accurately detecting and immediately stopping advanced, targeted and other evasive attacks hiding in Internet traffic.

It facilitates efficient resolution of detected security incidents in minutes with concrete evidence, actionable intelligence and response workflow integration.

With FireEye Network Security, organizations are effectively protected against today’s threats whether they exploit Microsoft Windows, Apple OS X operating systems, or application vulnerabilities; are directed at the headquarters or branch offices; or are hidden in a large volume of inbound Internet traffic that has to be inspected in real time.

Effective protection whether you explout:

Microsoft Windows

Apple OS X operating systems

Application vulnerabilities

FireEye Email Security

HAVE A QUESTION?

VISIT PRODUCT PAGE

FireEye Email Security helps organizations minimize the risk of costly breaches caused by advanced email attacks.
Deployed on premises, FireEye Email Security – Server Edition leads the industry in identifying, isolating and immediately stopping URL and attachment-based attacks, before they enter an organization’s environment.

Email Security combines intelligence-led context and detection plug-ins to unearth malicious and benign phishing URLs on a big data, scalable platform. The signatureless Multi-Vector Virtual Execution™ (MVX) engine analyzes email attachments and URLs linked to downloadable content against a comprehensive cross-matrix of operating systems, applications and web browsers. Threats are identified with minimal noise, and false positives are nearly nonexistent.

Deployed in the cloud, FireEye Email Security is a fully featured secure email gateway that leads the industry in identifying, isolating, and immediately stopping URL, impersonation, and attachment-based attacks, before they enter an organization’s environment. With auto remediate for Office 365, emails that become retroactively malicious after delivery to an user’s inbox can be extracted. FireEye Email Security also scans outgoing email traffic for advanced threats, spam and viruses.

Fully featured secure email gateway

Deployed on premises

Combines intelligence-led context and detection plug-ins

FireEye Endpoint Security

HAVE A QUESTION?

VISIT PRODUCT PAGE

FireEye Endpoint Security defends against today’s cyber attacks by enhancing the best parts of legacy security products with FireEye technology, expertise and intelligence. Using a defense-in-depth model, the modular architecture of Endpoint Security unites default engines and downloadable modules to protect, detect and respond, and manage endpoint security.

To prevent common malware, Endpoint Security uses a signature-based endpoint protection platform (EPP) engine. To find threats for which a signature does not yet exist, MalwareGuard uses machine learning seeded with knowledge from the frontlines of cyber attacks. For attacks on exploits in common software and browsers,

ExploitGuard uses a behavioral analysis engine that determines if an exploit is being used and stops it from executing. In addition, FireEye continuously creates modules to detect against attack techniques and accelerate responses to emerging threats. For example, Process Guard was developed to stop credential exfiltration.

Endpoint Security includes endpoint detection and response (EDR) capabilities that rely on real-time indicators of compromise (IOCs) developed with help from frontline Mandiant responders.

Signature-based endpoint protection platform (EPP) engine

Includes endpoint detection and response (EDR) capabilities

And mroe

FireEye Malware Analysis

HAVE A QUESTION?

VISIT PRODUCT PAGE

FireEye Malware Analysis is a forensic analysis solution that gives security analysts hands-on control over powerful auto-configured test environments to safely execute and inspect advanced malware, zero-day and advanced persistent threat (APT) attacks embedded in web pages, email attachments and files.

Malware analysis is an important part of preventing and detecting future cyber attacks. Using malware analysis tools, cyber security experts can analyze the attack lifecycle and glean important forensic details to enhance their threat intelligence.

Malware Analysis (AX series) products provide a secure environment to test, replay, characterize, and document advanced malicious activities. Malware Analysis shows the cyber attack lifecycle, from the initial exploit and malware execution path to callback destinations and follow-on binary download attempts.

Malware Analysis provides users with two analysis modes— live and sandbox. Malware analysts use the live, on-network mode for full malware life cycle analysis, allowing external connectivity. This gives Malware Analysis the ability to track advanced attacks across multiple stages and different vectors. In sandbox mode, the execution path of particular malware samples is fully contained and visible in the virtual environment.

Forensic analysis solution

Two analysis modes— live and sandbox

And more

Mandiant Consulting

HAVE A QUESTION?

VISIT PRODUCT PAGE

Cyber security incidents require rapid action and protecting critical assets from attackers requires diligent preparation.

Mandiant Consultants help organizations get back to business after a security incident, and they apply their frontline expertise to help organizations transform their cyber defense capabilities to mitigate threats and reduce business risk – before, during and after an incident.

Incident Response

Strategic Readiness

Technical Assurance

How and Why

Unique Benefits

Inquire about this solution

3 + 10 =

Office

63 Shipchenski Prohod Blvd, Sofia 1574, Bulgaria

Hours

M-F: 9am – 6pm
S-S: Closed

Telephone

Main: +359 2 439 2000 Information Security: +359 2 439 2009