Software solutions - FireEye

FireEye network software solutionFireEye cyber security products combat today's advanced persistent threat (APTs). As an integral piece of an Adaptive Defense strategy, our state-of-the-art network security offerings protect against cyber attacks that bypass traditional signature-based tools such as antivirus software, next-generation FireEyewalls, and sandbox tools.

FireEye product offerings

Detect & Prevent 

  • Network Security

Defend your network, data, and users with the fastest, most reliable cyber-attack protection available.

  •  SSL Intercept Appliance

Expose cyber attacks hiding in encrypted traffic.

  • Endpoint Security

Detects threat and exploits against network-connected devices.

  • Email Security 

Defends against email-borne threat such as ransomware, phishing and malicious links and attachments.

  • Threat Analytics Platform

Provides actionable alerts on real threat based on log data and FireEye Intelligence.

  • Content Security

Detects and blocks malware in network file shares.

Analyze & Respond 

  • Forensics & Investigation

Neutralize threat with intelligent, cutting-edge investigative and analysis tools.

  • Enterprise Forensics

Develop attack context in near-real time and facilitate rapid investigations.

  • Malware Analysis

Provides a secure virtual environment to test, replay, characterize, and document advanced malware.

  • Endpoint Forensics

Rapidly prevent, detect and respond to threat with comprehensive, intelligence-driven endpoint visibility

  • Threat Analytics Platform

Provides actionable alerts on real threat based on log data and FireEye Intelligence.

  • Security Orchestrator

Integrates and automates technologies and processes across your IT infrastructure.

Detect & Prevent 

  • FireEye Helix

Simplify, integrate and automate security operations to stop threat faster.

  • FireEye as a Service

Amplify your security team with experts from FireEye who monitor your environment for threat around the clock.

  • Threat Intelligence

To anticipate and respond to their attacks you need to understand their motivations, intentions, characteristics, and methods.


 

Vendor's web page


Ask a question about this item

FireEye