what we do fireeye: one unified defense today’s · equips you to combat advanced cyber attacks...

2
SECURITY REIMAGINED FIREEYE: ONE UNIFIED DEFENSE With FireEye, you can quickly adapt as attackers find new ways to target your business. FireEye delivers an entirely new security model that offers a powerful blend of technology, intelligence and expertise—the only company providing all three in a nimble, unified framework. A network of millions of virtual machines analyze more than 50 billion files, web objects, and flows per day—and continuously share the results among more than 3,100 customers worldwide in real time. FireEye Labs has identified 19 of the last 28 publicly revealed zero-day attacks—more than our top 10 competitors combined. Our expertise comes from hundreds of critical incident-response engagements involving tens of thousands of hours on the front lines combating hundreds of distinct threat actors. 67% of victims learned of their breach from a third party 46% of compromised systems had no malware on them of victims had up-to-date anti-virus signatures 100% THREAT UNDETECTED REMEDIATION TODAY’S REALITY Technological advancements are outpacing our ability to secure them. Advanced attackers are bypassing conventional defenses at will. Organizations are facing threats never before conceived. They are being compromised far too often, for far too long before the threat is discovered, and with far too much at stake. There’s no single technical answer. There’s no legislative fix. Bad guys will always exist, and persistent attackers will always innovate. INITIAL BREACH Patented Multi-Vector Virtual Execution (MVX) architecture analyzes unknown threats across hundreds of combinations of operating systems, apps, software versions, and more. Real-time intel from incident response cases, millions of network and endpoint sensors, and a research team that knows attackers and how they operate. Experience earned on the front lines, responding to every breach that matters. We help you resolve incidents quickly and prepare for tomorrow’s attacks. TECHNOLOGY INTELLIGENCE EXPERTISE WHAT WE DO FireEye provides one united defense against cyber attackers to protect your assets from those who have them in their sights. HOW WE DO IT FireEye takes a fundamentally new approach to security, built from the ground up to combat today’s advanced threats. We bring together the industry’s best technology, intelligence and expertise. Only FireEye delivers all three in a nimble, unified framework. © 2015 FireEye, Inc. All rights reserved. FireEye is a registered trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners. CB.EN-US.042015 FireEye, Inc. 1440 McCarthy Blvd. Milpitas, CA 95035 408.321.6300 | 877.FIREEYE (347.3393) [email protected] | www.fireeye.com 205 DAYS MEDIAN # OF DAYS ATTACKERS ARE PRESENT ON A VICTIM NETWORK BEFORE DETECTION. ONE UNITED DEFENSE AGAINST CYBER ATTACKS Our Offices Federal DC [email protected] Latin America [email protected] Australia [email protected] Hong Kong [email protected] India [email protected] Japan [email protected] Korea [email protected] Malaysia [email protected] Singapore [email protected] Taiwan [email protected] Thailand [email protected] European HQ [email protected] Benelux [email protected] Nordics [email protected] UK & Ireland [email protected] France [email protected] Italy [email protected] DACH [email protected] Eastern Europe [email protected] Middle East [email protected] Turkey [email protected] Africa [email protected]

Upload: others

Post on 13-Oct-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: WHAT WE DO FIREEYE: ONE UNIFIED DEFENSE TODAY’S · equips you to combat advanced cyber attacks that bypass traditional signature-based defenses—such as anti-virus software and

SECURITY REIMAGINED

FIREEYE: ONE UNIFIED DEFENSEWith FireEye, you can quickly adapt as attackers find new ways to target your business. FireEye delivers an entirely new security model that offers a powerful blend of technology, intelligence and expertise—the only company providing all three in a nimble, unified framework.

■ A network of millions of virtual machines analyze more than 50 billion files, web objects, and flows per day—and continuously share the results among more than 3,100 customers worldwide in real time.

■ FireEye Labs has identified 19 of the last 28 publicly revealed zero-day attacks—more than our top 10 competitors combined.

■ Our expertise comes from hundreds of critical incident-response engagements involving tens of thousands of hours on the front lines combating hundreds of distinct threat actors.

67% of victims learned of their breach from a third party

46% of compromised systems had no malware on them

of victims had up-to-date anti-virus signatures

100%

THREAT UNDETECTED REMEDIATION

TODAY’S REALITYTechnological advancements are outpacing our ability to secure them. Advanced attackers are bypassing conventional defenses at will. Organizations are facing threats never before conceived. They are being compromised far too often, for far too long before the threat is discovered, and with far too much at stake.

There’s no single technical answer. There’s no legislative fix. Bad guys will always exist, and persistent attackers will always innovate.

INITIAL BREACH

Patented Multi-Vector Virtual Execution (MVX) architecture analyzes unknown threats across hundreds of combinations of operating systems, apps, software versions, and more.

Real-time intel from incident response cases, millions of network and endpoint sensors, and a research team that knows attackers and how they operate.

Experience earned on the front lines, responding to every breach that matters. We help you resolve incidents quickly and prepare for tomorrow’s attacks.

TECHNOLOGY

INTELLIGENCE

EXPERTISE

WHAT WE DOFireEye provides one united defense against cyber attackers to protect your assets from those who have them in their sights.

HOW WE DO ITFireEye takes a fundamentally new approach to security, built from the ground up to combat today’s advanced threats. We bring together the industry’s best technology, intelligence and expertise. Only FireEye delivers all three in a nimble, unified framework.

© 2015 FireEye, Inc. All rights reserved. FireEye is a registered trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners. CB.EN-US.042015

FireEye, Inc. 1440 McCarthy Blvd. Milpitas, CA 95035 408.321.6300 | 877.FIREEYE (347.3393)[email protected] | www.fireeye.com

205 DAYSMEDIAN # OF DAYS ATTACKERS ARE PRESENT ON A VICTIM NETWORK BEFORE DETECTION.

ONE UNITED DEFENSE AGAINST CYBER ATTACKS

Our OfficesFederal DC [email protected] America [email protected] [email protected] Kong [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] [email protected] HQ [email protected] [email protected] [email protected] & Ireland [email protected] [email protected] [email protected] [email protected] Europe [email protected] East [email protected] [email protected] [email protected]

Page 2: WHAT WE DO FIREEYE: ONE UNIFIED DEFENSE TODAY’S · equips you to combat advanced cyber attacks that bypass traditional signature-based defenses—such as anti-virus software and

FIREEYE AS A SERVICEMake our threat analysts an extension of your cyber security team. Backed by front-line insight and intelligence, FireEye as a Service moni-tors your environment 24x7. From our global network of security operations centers, our analysts proactively hunt for new threats in your enthronement.

SECURITY CONSULTING Mandiant Consulting helps organizations respond to critical incidents and assess their security posture. As trusted advisors, we have removed attackers from networks and endpoints across every major industry.

ABOUT OUR CONSULTANTS

Mandiant consultants hold top government security clearances, author research and literature on advanced security topics, and are regularly quoted by leading media organizations worldwide.

OUR PRODUCTSOur adaptive, unified technology portfolio equips you to combat advanced cyber attacks that bypass traditional signature-based defenses—such as anti-virus software and next-generation firewalls—and ordinary sandbox tools. Detect, prevent, analyze, and respond to attacks in minutes rather than months.

INCIDENT INVESTIGATION

Analyze and respond to incidents faster with intelligence and answers, not just alerts

ENTERPRISE NETWORK SECURITY

Protect against known and unknown threats across multiple threat vectors

SECURE ENDPOINT AND MOBILITY

Secure endpoint and mobile devices, on and off premise

SOLUTIONS

Products that work even more powerfully together to solve your biggest security issues

■ React immediately by quarantining affected hosts, even if endpoints are off the corporate network.

■ Quickly engage expert incident responders when needed to investigate, re-secure, and remediate.

■ Monitor networks and endpoints 24x7 using proprietary methods to actively hunt for signs of compromise.

■ Apply the latest intelligence, updated every hour from millions of globally deployed sensors.

■ Leverage system and network forensics on live systems to investigate, classify, and analyze risks.

■ Get detailed reports on confirmed threats, with guidance on how to respond.

WHAT YOU GET WITH FIREEYE AS A SERVICE

CONTINUOUS MONITORING BY EXPERTS

ANSWERS, NOT JUST ALERTS

REDUCED IMPACT FROM BREACHES

We investigate and resolve security events ranging from single-system compromises to enterprise-wide intrusions by advanced attack groups. Our consultants help you recover from incidents and minimize their impact.

OUR CONSULTANTS OFFER

INCIDENTRESPONSE

SECURITY ASSESSMENTS

CYBER DEFENSE CENTER DEVELOPMENT

ADAPTIVE DEFENSEA new approach to cyber security that gives you the level of protection you want, delivered the way you want it.

We help you determine whether you are compromised and how you can improve your security posture.

Assessments include:

■ Compromise Assessment

■ Security Program Assessment

■ Response Readiness Assessment

■ Vulnerability Assessment

■ ICS Security Gap Assessment

Whether you are building your first incident response program or expanding your security operations center, we can help you build and implement core technologies and processes into your program.

FIREEYE AS A SERVICE

FIREEYE

THREAT INTELLIGENCE

CONTENT

FORENSICS

ANALYTICS

ENDPOINTEMAIL

MOBILE NETWORK

POWERED BYMVX TECHNOLOGY