FireEye, Inc. is a publicly listed enterprise cybersecurity company that provides products and services to protect against advanced cyber threats, such as advanced persistent threats and spear phishing. Founded in 2004, the company is headquartered in Milpitas, California. Threat prevention platforms include Network, Email, Endpoint, Mobile, Content, Analytics, and Forensics. FireEye has more than 4,400 customers across 67 countries, including more than 650 of the Forbes Global 2000. FireEye is the first cyber security company awarded certification by the Department of Homeland Security. USAToday says FireEye "has been called in to investigate high-profile attacks against Target, JP Morgan Chase, Sony Pictures, Anthem and others". Yahoo Finance says FireEye is again the fastest-growing cyber security firm, according to Deloitte.

Wikipedia
FireEye, Inc.
FireEye, Inc.
YouTube Video

New YouTube videos detected.

  • FaaS: From Alert To Fix
    In this video, you’ll learn about how FireEye as a Service Security Analysts help keep FaaS customer’s networks safe. Find out more about what goes on when an alert is triggered to how it is investigated and remediated until recommendations are given for customers to implement to defend against an attack: https://www.fireeye.com/products/fireeye-as-a-service.html
FireEye, Inc.
FireEye, Inc.
YouTube Video

New YouTube videos detected.

  • Orchestrierung
    So können Sie durch die Straffung und Automatisierung von Sicherheitsprozessen Ihr Sicherheitsteam entlasten und Ihr Sicherheitsbudget effizienter nutzen.
FireEye, Inc.
FireEye, Inc.
YouTube Video
FireEye, Inc.
FireEye, Inc.
YouTube Video

New YouTube videos detected.

  • Community-Schutz
    Informieren Sie sich über Community-Schutz und seinen Beitrag zur Sicherheit Ihres Unternehmens.
FireEye, Inc.
FireEye, Inc.
YouTube Video
FireEye, Inc.
FireEye, Inc.
YouTube Video
FireEye, Inc.
FireEye, Inc.
YouTube Video

New YouTube videos detected.

  • Orchestration
    Découvrez comment la rationalisation et l’automatisation de votre sécurité opérationnelle peut améliorer la gestion de
FireEye, Inc.
FireEye, Inc.
Blog Post

New blog articles detected.

  • APT28 Targets Hospitality Sector, Presents Threat to Travelers
    FireEye has moderate confidence that a campaign targeting the hospitality sector is attributed to Russian actor <a href="https://www.fireeye.com/blog/threat-research/2014/10/apt28-a-window-into-russias-cyber-espionage-operations.html">APT28. We believe this activity, which dates back to at least July 2017, was intended to target travelers to hotels throughout Europe and the Middle East. Th...
FireEye, Inc.
FireEye, Inc.
YouTube Video

New YouTube videos detected.

FireEye, Inc.
FireEye, Inc.
YouTube Video

New YouTube videos detected.

FireEye, Inc.
FireEye, Inc.
YouTube Video
FireEye, Inc.
FireEye, Inc.
Blog Post

New blog articles detected.

  • Revoke-Obfuscation: PowerShell Obfuscation Detection Using Science
    Many attackers continue to leverage PowerShell as a part of their malware ecosystem, mostly delivered and executed by malicious binaries and documents. Of malware that uses PowerShell, the most prevalent use is the garden-variety stager: an executable or document macro that launches PowerShell to download another executable and run it. There has been significant development and innovatio...
FireEye, Inc.
FireEye, Inc.
Blog Post

New blog articles detected.

  • FLARE VM: The Windows Malware Analysis Distribution You’ve Always Needed!
    As a reverse engineer on the FLARE Team I rely on a customized Virtual Machine (VM) to perform malware analysis. The Virtual Machine is a Windows installation with numerous tweaks and tools to aid my analysis. Unfortunately trying to maintain a custom VM like this is very laborious: tools frequently get out of date and it is hard to change or add new things. There is also a constant fear...
FireEye, Inc.
FireEye, Inc.
Blog Post

New blog articles detected.

  • HawkEye Credential Theft Malware Distributed in Recent Phishing Campaign
    A wide variety of threat actors began distributing HawkEye malware through high-volume email campaigns after it became available for purchase via a public-facing website. The actors behind the phishing campaigns typically used email themes based on current events and media reports that would pique user interests, with the “Subject” line typically containing something about recent news. A...
FireEye, Inc.
FireEye, Inc.
SlideShare Presentation

New SlideShare presentations detected.

  • Asia Pacific & The Security Gap: Don't Stand Still
    During a breach, attackers will infect a machine and any connected systems with malicious software. Once in, persistence is established by forcing this software to run every time you boot-up your computer. This leads to the theft of sensitive data. Find out about the unique challenges faced in the Asia Pacific region, so you can take the necessary actions to step up your security.
FireEye, Inc.
FireEye, Inc.
SlideShare Presentation

New SlideShare presentations detected.

  • EMEA & The Security Gap: Don't Stand Still
    During a breach, attackers will infect a machine and any connected systems with malicious software. Once in, persistence is established by forcing this software to run every time you boot-up your computer. This leads to the theft of sensitive data. Find out about the unique challenges faced in the EMEA region, so you can take the necessary actions to step up your security.
FireEye, Inc.
FireEye, Inc.
SlideShare Presentation

New SlideShare presentations detected.

  • Is Your Law Firm Prepared for the Inevitable Cyber Attack?
    As far as back 2011, at least 80 of the top 100 law firms in the United States had been attacked by cyber criminals. Today, law firms continue to be a prime target for criminals looking for information they can sell and use for competitive advantage, including patent applications, business deals and the personally identifiable information (PII) of clients. In this solution brief, learn the state...
FireEye, Inc.
FireEye, Inc.
SlideShare Presentation

New SlideShare presentations detected.

  • Breaking the Silence on Cyber Security: How FireEye Keeps Your Law Firm Secure
    Most law firms don’t want to talk about it, but the legal community has become a prime target for cyber crime. If your law firm doesn’t have a sophisticated solution to detect, contain and eliminate an intrusion, your corporate and personal information could be stolen by cyber criminals. Read this solution brief and learn how to protect your firm and clients by catching the most advanced threats...
FireEye, Inc.
FireEye, Inc.
SlideShare Presentation

New SlideShare presentations detected.

  • M-Trends 2015 セキュリティ最前線からの視点
    の業種で発生したセキュリティ・インシデント数百件の分析結果、統計情報、事例研究を元に、APT攻撃(Advanced Persistent Threat: 高度で持続的な標的型攻撃)で使用されるツールや手口が過去1年間でどのように進化したかを示しています
FireEye, Inc.
FireEye, Inc.
SlideShare Presentation

New SlideShare presentations detected.

  • [Infographic] M-Trends 2016: EMEA Edition
    In 2015, FireEye responded to some of the most high profile breaches in Europe, Middle East and Africa (EMEA). During these investigations consultants from Mandiant, a FireEye company, collected data and details on leading cyber trends and threat actor tactics used to compromise businesses and steal data. View the infographic for a quick snapshot of the statistics, trends and lessons learned from...
FireEye, Inc.
FireEye, Inc.
SlideShare Presentation

New SlideShare presentations detected.

  • Infographic Mtrends EMEA 2016
    In 2015, FireEye responded to some of the most high profile breaches in Europe, Middle East and Africa (EMEA). During these investigations consultants from Mandiant, a FireEye company, collected data and details on leading cyber trends and threat actor tactics used to compromise businesses and steal data. View the infographic for a quick snapshot of the statistics, trends and lessons learned from...
FireEye, Inc.
FireEye, Inc.
SlideShare Presentation

New SlideShare presentations detected.

  • [Infographic] M-Trends 2016
    M-Trends 2016 provides trends, statistics and case studies to illustrate how advanced threat actors have evolved over the past year. The annual report was compiled by consultants at Mandiant and is based on hundreds of incident response investigations in more than 30 industry sectors. View the infographic to get the latest cover attacker trends and industry targets. For more information on Mandia...
FireEye, Inc.
FireEye, Inc.
SlideShare Presentation

New SlideShare presentations detected.

FireEye, Inc.
FireEye, Inc.
SlideShare Presentation

New SlideShare presentations detected.

  • Are Mobile Apps the Enemy?
    Over 5 billion app downloads are vulnerable to remote attacks. See how FireEye analyzes the numbers, and learn what you can do to identify and manage harmful mobile apps. Visit www.fireeye.com for more information.

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.