#


Share
Browse
  • FireEye
  • FireEye Products
  • Case Studies
#

FireEye

FireEye Overview
Complete Protection Against Advanced Malware
The FireEye Malware Protection System is the only complete solution to stop advanced targeted attacks across the Web and email threat vectors and malware resident on file shares. FireEye’s solutions supplement traditional security defenses, such as traditional and next-generation firewalls, IPS, AV and gateways, which can’t stop advanced malware, thus leaving significant security holes in the majority of corporate networks.

The FireEye portfolio of products comprises the Web Malware Protection System, Email Malware Protection System, File Malware Protection System, and Malware Analysis System. The Central Management System, which unifies reporting, configuration, and threat data sharing, manages the overall MPS deployment.

 

 

FireEye Products

Malware Protection Systems

  • FireEye Web Malware Protection System

The Web Malware Protection System (MPS) stops Web-based attacks that traditional and next-generation firewalls, IPS, AV, and Web gateways miss. It protects against zero-day Web exploits and multi-protocol callbacks to keep sensitive data and systems safe. Advanced targeted attacks use the Web as a primary threat vector to compromise key systems, perform reconnaissance on existing defenses, establish long-term control and access to networked systems, and exfiltrate data.

  • FireEye Email Malware Protection System

The FireEye Email Malware Protection System (MPS) secures against spear phishing email attacks that bypass anti-spam and reputation-based technologies. Spear phishing attacks have soared in popularity with the availability of user-specific information on social networks and other Internet resources. With all the personal information available online, a criminal can socially engineer almost any user into clicking a URL or opening an attachment with a zero-day exploit, and the criminal quickly collects control of a privileged system and user accounts.

  • FireEye File Malware Protection System

The FireEye File Malware Protection System (MPS) analyses network file shares to detect and quarantine malware brought into the network through the Web, email, or other manual means, such as online file sharing. This halts the lateral spread of advanced malware that traditional and next-generation firewalls, IPS, AV, and gateways miss. Advanced targeted attacks use sophisticated malware and APT tactics, not only to penetrate defenses, but also to spread laterally and establish a long-term foothold in the network.

  • FireEye Malware Analysis System

The FireEye Malware Analysis System (MAS) gives threat analysts hands-on control over powerful auto-configured test environments where they can safely execute and inspect advanced malware, zero-day, and targeted APT attacks embedded in common file formats, email attachments, and Web objects. With advanced instrumentation, the FireEye Virtual Execution (VX) environments provide forensic details on the exploit, such as the vulnerability exploited to create a buffer overflow condition, attempts to escalate privileges within Windows, and the callback coordinates used to exfiltrate data

Management and Services

  • FireEye Central Management System

The Central Management System (CMS) consolidates the management, reporting, and data sharing of Web MPS, Email MPS, File MPS, and Malware Analysis System (MAS) in an easy-to-deploy, network-based appliance. The CMS enables real-time local distribution of malware security intelligence auto-generated within your FireEye deployment to stop advanced targeted attacks threatening the organisation. It also enables centralized configuration, management, and reporting of FireEye security appliances.

  • FireEye Malware Protection Cloud

The FireEye Malware Protection Cloud interconnects FireEye appliances deployed within customer networks, technology partner networks, and service providers around the world. This worldwide cloud efficiently shares auto-generated malware security intelligence, such as covert callback channels, as well as new threat findings from the FireEye Malware Intelligence Lab.

Find Out More

Get a Quote

Call Me Back

Enquiry Form