FireEye Introduces New Cloud-Based Email Threat Prevention


New Service Leverages Cloud-Based Virtual Machine Technology to Protect Against Advanced Email Attacks

MILPITAS, Calif., November 20, 2013—FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced the introduction of FireEye® Email Threat Prevention™, a new cloud-based email security platform. With no hardware or software to install, FireEye now offers a flexible deployment option to protect enterprise infrastructure from email-based attacks. FireEye Email Threat Prevention will be generally available in early December 2013.

“The recent success of spear-phishing attacks underscores the need to improve protection for brands, intellectual property, and data,” said Manish Gupta, FireEye senior vice president of products. “With the introduction of cloud-based FireEye Email Threat Prevention, FireEye is now providing enterprises and small and medium businesses a flexible way to deploy and consume industry-leading email security. With a complete portfolio of options, customers can now locate their mailboxes and advanced email solution wherever they require – on-premise or in the cloud.”

According to the 2013 Verizon Data Breach Investigations Report, “More than 95% of all attacks tied to state-affiliated espionage employed phishing.” According to a January 2013 Gartner survey, the highest-consumed cloud-based security service is email security, with 74 percent of respondents rating this as the most-used service.[1]

“FireEye Email Threat Prevention is a critical component of our security strategy,” said Penni Lee, manager, information services at Hawaii Gas, the largest natural gas provider in the state. “As a provider of critical infrastructure, it’s essential we put in place the most effective security solution available on the market to block email attacks—and FireEye does just that.”

FireEye Email Threat Prevention is a part of the FireEye integrated set of solutions that protect organizations across Web and email attack vectors. Customers now have a cloud-security solution that provides industry-leading protection against the advanced threats used to conduct advanced persistent threat (APT) attacks. The new cloud-based service uses signature-less virtual-machine analysis to identify and block or quarantine emails that:

·   Contain attachments that exploit known and unknown vulnerabilities

·   Contain URLs that lead to malicious content

·   Are part of a sophisticated multi-stage APT attack

FireEye Email Threat Prevention is built upon the FireEye Multi-Vector Virtual Execution™ (MVX) engine architecture and preserves the multi-threat vector correlation within the enterprise’s FireEye deployment. This allows customers to utilize the FireEye Web security platform on-premise in concert with the FireEye Email Threat Prevention cloud-based platform for protection against blended attacks. Furthermore, FireEye Email Threat Prevention customers are seamlessly enrolled in the larger FireEye Dynamic Threat Intelligence™ (DTI) cloud, thereby benefiting from the entire ecosystem of FireEye customers.

About FireEye, Inc.
FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 1,300 customers across more than 40 countries, including over 100 of the Fortune 500.

Source: FireEye, Inc.

[1] http://www.gartner.com/newsroom/id/2426615


This entry was posted in ICT. Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *