FireEye Company SummaryWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Company Summary
FireEye

Overview: FireEye provides anti-malware security protecting critical intellectual property, computing resources, and network infrastructure against malware and botnet infections. FireEye detects advanced malware and botnets using virtual victim machine analysis.

KnowledgeStorm's detailed company reports contain important information including: stock symbols, company size, addresses, and more. You may access this additional information about this company by viewing one of the detailed solution reports or research abstracts listed below.

Solutions offered by FireEye.
Research offered by FireEye

A New Security Approach for Today's Advanced Attacks by FireEye. December 31, 2013 - This paper examines the limitations of existing security solutions, and several security architectures, including sandbox-based products that can truly protect against today's advanced attacks.

  View A New Security Approach for Today's Advanced Attacks research abstract

Advanced Attacks Require Federal Agencies to Reimagine IT Security by FireEye. March 10, 2014 - This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.

  View Advanced Attacks Require Federal Agencies to Reimagine IT Security research abstract

Advanced Attacks Require Federal Agencies to Reimagine IT Security by FireEye. February 27, 2014 - This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.

  View Advanced Attacks Require Federal Agencies to Reimagine IT Security research abstract

Advantage FireEye Debunking the Myth of Sandbox Security White Paper by FireEye. December 31, 2013 - This guide debunks the myth of effective sandbox security and outlines inefficiencies within this popular strategy.

  View Advantage FireEye Debunking the Myth of Sandbox Security White Paper research abstract

Battling Modern Botnets by FireEye. April 28, 2008 - The FBI ranks cybercrime among its top priorities in part because botnets are proliferating at an alarming rate, crossing corporate boundaries and spreading infections behind corporate firewalls. Learn how FireEye provides advance detection and a blended approach to today’s botnet problem that "traditional" solutions do not.

  View Battling Modern Botnets research abstract

Battling Modern Botnets in the Enterprise by FireEye. September 2008 - The prevalence of botnets is growing at an alarming rate. The FBI ranked cybercrime as one of it's top priorities and noted that it cost businesses $67.2 billion in 2005 alone. Learn how to keep botnets out of your business.

  View Battling Modern Botnets in the Enterprise research abstract

Big Threats for Small Businesses by FireEye. December 31, 2013 - Data breaches are bad for business, but it can mean the end for small firms. This guide takes a look at today's threat landscape and explores cybercrime trends towards small and midsize businesses.

  View Big Threats for Small Businesses research abstract

Case Study: A Large Multi–Program National Laboratory Stays Ahead of Next-Generation Malware By Deploying FireEye Web Malware Protection System by FireEye. May 10, 2011 - This case study will outline how one company trusted FireEye's Web Malware Protection System to guard their highly sensitive information and how well the system performed. You will also learn about the features the security solutions contains and how it could be perfect for your business.  

  View Case Study: A Large Multi–Program National Laboratory Stays Ahead of Next-Generation Malware By Deploying FireEye Web Malware Protection System research abstract

Case Study: Providence College Captures Previously Undetected Attacks with FireEye Web Malware Protection System by FireEye. May 10, 2011 - This case study will show how Providence College was able to keep there network secure from advanced malware attacks, and how this security solution could do the same for you.

  View Case Study: Providence College Captures Previously Undetected Attacks with FireEye Web Malware Protection System research abstract

CISO Guide to Next Generation Threats by FireEye. May 09, 2011 - This white paper will tell you about a new security solutions and the need to your business to update it's security solutions to a Next-Generation security system.

  View CISO Guide to Next Generation Threats research abstract

CISO Guide to Next Generation Threats by FireEye. May 16, 2011 - The only way to protect yourself against next generation threats is to have next generation protection. Traditional firewalls, IPS, anitivirus, and signature based systems are still useful against known threats, but they don't stand a chance against new ones

  View CISO Guide to Next Generation Threats research abstract

Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye by FireEye. December 31, 2013 - With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.

  View Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye research abstract

Definitive Guide to Next Generation Threat Protection eBook by FireEye. December 31, 2013 - In today's evolving threat landscape, businesses of various sectors and sizes have fallen victim to sophisticated cyber-attacks. This in-depth eBook explores the next generation of threat protection and delves deep into various topics, such as advanced persistent threats.

  View Definitive Guide to Next Generation Threat Protection eBook research abstract

Digital Bread Crumbs – Seven Clues To Identifying Who’s Behind Advanced Cyber Attacks by FireEye. December 31, 2013 - When establishing your security strategy, the ability to recognize who your attackers are and how they work is essential. This guide uncovers various facets of malware attacks and what they reveal about the culprit.

  View Digital Bread Crumbs – Seven Clues To Identifying Who’s Behind Advanced Cyber Attacks research abstract

FireEye 1H 2011 Advanced Threat Report by FireEye. November 14, 2011 - This FireEye Advanced Threat report offers a global view into the cyber attacks that routinely bypass traditional defenses, using the threat data shared by thousands of FireEye Malware Protection Systems (MPS) deployments. View now to explore key findings in this analysis that uncover the real security issues enterprises face today.

  View FireEye 1H 2011 Advanced Threat Report research abstract

FireEye Advanced Cyber Attack Landscape Report by FireEye. December 31, 2013 - This guide explores the current threat landscape across the globe and how your business may be affected depending on industry and location.

  View FireEye Advanced Cyber Attack Landscape Report research abstract

FireEye Advanced Threat Report - 2H 2011 by FireEye. May 01, 2012 - This FireEye Advanced Threat report provides key insight into the current threat landscape, the evolution of advanced persistent threat (APT) tactics and the level of infiltration seen in networks today. View now to gain an in-depth look into key findings to help you build and improve your security strategies to tackle today's security issues.

  View FireEye Advanced Threat Report - 2H 2011 research abstract

Five Reasons Your Small or Midsize Business is a Prime Target for Cybercriminals by FireEye. December 31, 2013 - This paper explains targeted attacks and examines reasons cyber attackers are aiming at small and midsize businesses.

  View Five Reasons Your Small or Midsize Business is a Prime Target for Cybercriminals research abstract

From Target to Aggressor: How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks by FireEye. December 31, 2013 - This guide explores the widening gap between sophisticated cyber-attacks and the weak traditional defensive deployments in most data centers.

  View From Target to Aggressor: How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks research abstract

Hot Knives Through Butter: Evading File-based Sandboxes by FireEye. March 04, 2014 - This guide explores new strategies for thwarting malware-based cyber-attacks and how traditional security measures just don't do the trick.

  View Hot Knives Through Butter: Evading File-based Sandboxes research abstract

How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks by FireEye. December 31, 2013 - This white paper explores the widening gap between the offensive capabilities of today's cyber attackers and the weak traditional defenses deployed in most data centers.

  View How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks research abstract

New Security Challenges for State and Local Governments by FireEye. December 31, 2013 - This white paper explores the current threat landscape and why traditional tools fail to detect advanced attacks.

  View New Security Challenges for State and Local Governments research abstract

Once More Into the Breach: The Top 10 Mistakes Incident Responders Make Combatting Advanced Threats by FireEye. December 31, 2013 - This guide explores 10 common mistakes businesses make when planning their security strategy.

  View Once More Into the Breach: The Top 10 Mistakes Incident Responders Make Combatting Advanced Threats research abstract

Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs by FireEye. December 31, 2013 - This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks.

  View Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs research abstract

Poison Ivy: Assessing Damage and Extracting Intelligence by FireEye. December 31, 2013 - This guide explores the current threat landscape and more specifically Poison Ivy, a remote access tool that has been used in several high-profile malware campaigns. Read on to learn which tools you need to defend yourself from this form of cybercrime.

  View Poison Ivy: Assessing Damage and Extracting Intelligence research abstract

Protecting Data from the Cyber Theft Pandemic by FireEye. April 20, 2009 - Malware-related data breaches have reached pandemic proportions as criminals discover Internet crime is easy to commit, highly lucrative, and largely under-policed. Learn about advances in security technologies that use multi-phase heuristic and virtual machine analysis to detect and mitigate damages that result from malware-related data thefts.

  View Protecting Data from the Cyber Theft Pandemic research abstract

SANS 2013 Report on Digital Forensics and Incident Response Survey by FireEye. December 31, 2013 - This guide will help forensic professionals and their clients better prepare for future investigations and how to better allocate resources.

  View SANS 2013 Report on Digital Forensics and Incident Response Survey research abstract

SANS WhatWorks in Detecting and Blocking Advanced Threats: A Real Case Study at a Large Research Organization by FireEye. March 06, 2014 - Cybercriminals are always looking for new ways to infiltrate your system, making it essential to have an effective intrusion prevention system (IPS). This white paper explores one company's IPS platform and how it can greatly enhance your system security.

  View SANS WhatWorks in Detecting and Blocking Advanced Threats: A Real Case Study at a Large Research Organization research abstract

Stopping Crimeware In Its Tracks by FireEye. September 2008 - This paper describes the damaging cybercrime threat posed by botnets, explains why traditional security solutions cannot stop them, and proposes a new approach that can eradicate cybercrime from corporate networks.

  View Stopping Crimeware In Its Tracks research abstract

Supply Chain Analysis: From Quartermaster to Sunshop by FireEye. February 27, 2014 - This in-depth guide explores the current threat landscape and the role of APTs. Read now for more information on how APTs are being used for wide-scale cybercrime campaigns.

  View Supply Chain Analysis: From Quartermaster to Sunshop research abstract

Taking a Lean-Forward Approach to Combat Today's Cyber Attacks by FireEye. December 31, 2013 - This white paper highlights why organizations need much more than fundamental security tools and strategies for dealing with advanced targeted attacks.

  View Taking a Lean-Forward Approach to Combat Today's Cyber Attacks research abstract

Taking the Botnet Threat Seriously by FireEye. September 2008 - In this paper, Enterprise Management Associates (EMA) takes a look at how the botnet threat became so serious, how botnet defense must answer the challenge, and how FireEye introduces a new approach to anti-botnet protection.

  View Taking the Botnet Threat Seriously research abstract

The FireEye Advantage: A New Security Approach for Today’s Advanced Attacks by FireEye. December 31, 2013 - The rapidly evolving threat landscape has rendered many traditional security tools obsolete and IT departments are left with questions on what to do next. This guide explores several security architectures and helps you decide which one is best for your organization.

  View The FireEye Advantage: A New Security Approach for Today’s Advanced Attacks research abstract

The Need for Speed: 2013 Incident Response Survey by FireEye. March 06, 2014 - In this white paper this report, you'll receive a comprehensive overview of survey results and expert analysis on the top security threats for global organizations in 2013.

  View The Need for Speed: 2013 Incident Response Survey research abstract

The New Status Quo: Zero-Day and Targeted APT Attacks by FireEye. July 08, 2011 - During the webcast, Dr. Wang of Forrester Research and Ashar Aziz of FireEye will provide insight on data breach incidents and how to protect your company from cybercrime.

  View The New Status Quo: Zero-Day and Targeted APT Attacks research abstract

The Top 10 Mistakes Incident Responders Make Combatting Advanced Threats by FireEye. December 31, 2013 - This white paper describes the 10 most common mistakes, strategic and technical, that incident response teams make – and their impact. Read on to learn how to avoid them with a well-defined incident response plan.

  View The Top 10 Mistakes Incident Responders Make Combatting Advanced Threats research abstract

Thinking Locally, Targeted Globally: New Security Challenges for State and Local Governments by FireEye. December 31, 2013 - In a world where cybercrime is growing in complexity and frequency, you don't have room for system vulnerabilities. This guide explores the current role of APTs in and how you can combat these advanced attacks.

  View Thinking Locally, Targeted Globally: New Security Challenges for State and Local Governments research abstract

Today's New Breed of Email-based Cyber Attacks - and What it Takes to Defend Against Them by FireEye. December 31, 2013 - This guide explores how email-based cyber-attacks aim to subvert your security tools and steal your valuable business data.

  View Today's New Breed of Email-based Cyber Attacks - and What it Takes to Defend Against Them research abstract

Unraveling Web Malware by FireEye. September 2008 - There's no denying the rapid rise in the use of Web-based blended threats to compromise client browsers and operating systems. Increasing use of Web 2.0 technologies, syndicated, iframes, third-party widgets - all of these proliferate malicious software.

  View Unraveling Web Malware research abstract

Unraveling Web Malware by FireEye. September 29, 2008 - There has been a rapid rise in the use of web blended threats. Defending corporate networks from these threats requires modern protection that functions on many levels. Find out how cyber criminals infiltrate your network and how FireEye's blended defense against Web malware prevents data loss and intellectual property theft.

  View Unraveling Web Malware research abstract

World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks by FireEye. December 31, 2013 - This guide explores the unique characteristics of cyber-attack campaigns waged by governments worldwide.

  View World War C: Understanding Nation-State Motives Behind Today’s Advanced Cyber Attacks research abstract

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts