Software solutions - FireEye
FireEye cyber security products combat today's advanced persistent threat (APTs). As an integral piece of an Adaptive Defense strategy, our state-of-the-art network security offerings protect against cyber attacks that bypass traditional signature-based tools such as antivirus software, next-generation FireEyewalls, and sandbox tools.
FireEye product offerings
Detect & Prevent
- Network Security
Defend your network, data, and users with the fastest, most reliable cyber-attack protection available.
- SSL Intercept Appliance
Expose cyber attacks hiding in encrypted traffic.
- Endpoint Security
Detects threat and exploits against network-connected devices.
- Email Security
Defends against email-borne threat such as ransomware, phishing and malicious links and attachments.
- Threat Analytics Platform
Provides actionable alerts on real threat based on log data and FireEye Intelligence.
- Content Security
Detects and blocks malware in network file shares.
Analyze & Respond
- Forensics & Investigation
Neutralize threat with intelligent, cutting-edge investigative and analysis tools.
- Enterprise Forensics
Develop attack context in near-real time and facilitate rapid investigations.
- Malware Analysis
Provides a secure virtual environment to test, replay, characterize, and document advanced malware.
- Endpoint Forensics
Rapidly prevent, detect and respond to threat with comprehensive, intelligence-driven endpoint visibility
- Threat Analytics Platform
Provides actionable alerts on real threat based on log data and FireEye Intelligence.
- Security Orchestrator
Integrates and automates technologies and processes across your IT infrastructure.
Detect & Prevent
- FireEye Helix
Simplify, integrate and automate security operations to stop threat faster.
- FireEye as a Service
Amplify your security team with experts from FireEye who monitor your environment for threat around the clock.
- Threat Intelligence
To anticipate and respond to their attacks you need to understand their motivations, intentions, characteristics, and methods.