Cloud
11/4/2016
11:40 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

FireEye Introduces Cloud MVX and MVX Smart Grid

The most intelligent threat detection delivered via public, hybrid, or private cloud.

MILPITAS, Calif. – November 3, 2016 – FireEye, Inc. (NASDAQ: FEYE), the intelligence-led security company, today introduced its new network security offerings – MVX Smart Grid™ and Cloud MVX™, the most intelligent threat detection available via public, hybrid, or private cloud. MVX Smart Grid and Cloud MVX simplify and integrate security for large, distributed enterprises and mid-market organizations at lower cost; seamlessly expand protection with the industry-leading MVX™ engine for existing customers; and provide integration of FireEye TAP™ and HX™ with Cloud MVX enabling third-party alert validation and a richer endpoint security experience. Cloud MVX will be available globally later in 2016, and MVX Smart Grid is available globally now.

FireEye iSIGHT® Intelligence was also enhanced to simplify the way intelligence is delivered and consumed by customers. Introduced today is a new intelligence delivery model, which tailors intelligence to the function of the user or team, consuming it. These intelligence subscriptions are available globally now.

The unique machine learning and analytics of the MVX engine deliver automated threat detection and blocking that generic sandboxes, endpoint solutions, and other products miss or hide among high false positives. Combined with the enhancements to FireEye iSIGHT Intelligence, FireEye continues to innovate around simplifying the security operations experience for our customers.

“MVX Smart Grid and Cloud MVX simplify and expand the protection of the pioneering FireEye MVX engine at lower cost, an innovation that gives a broader set of organizations access to the most intelligent detection anywhere and for any device,” said Grady Summers, chief technology officer, FireEye. “The completely rearchitected MVX Smart Grid, new Cloud MVX and FireEye platform integrations with TAP and HX detect threats that generic sandboxes, endpoint solutions, and other products miss.  The new role-based intelligence provides the simplest way to act on and integrate cyber threat intelligence across security operations.”

The Most Intelligent Detection, Anywhere

MVX Smart Grid takes the world’s leading network security and makes it even better with entirely new, flexible and scalable deployment architecture via a hybrid or private cloud. MVX Smart Grid uses an innovative approach to more effectively secure campuses, branch offices, and remote users through the separation of FireEye’s pioneering MVX engine and the development of hardware and virtual Smart Nodes™. Smart Nodes analyze Internet traffic to detect and block threats using a variety of techniques such as static analysis, analytics, IPS, applied intelligence, and more, while the MVX engine performs core dynamic analysis, detecting threats that generic sandboxes, endpoint solutions, and other products miss.

Coming by the end of 2016, Cloud MVX provides a FireEye public cloud deployment of the MVX engine, allowing organizations to shift threat detection to the cloud, making the most intelligent security available anywhere, at any time, on a subscription basis. Working in conjunction with Smart Nodes, Cloud MVX is designed to ensure simple, real-time detection and blocking of known and unknown threats across the entire organization. Unlike generic cloud-based sandboxes, Cloud MVX does not simply analyze objects, but instead replays network traffic to identify attacks that span multiple network flows. This ensures that FireEye’s threat detection can now be deployed however customers want.

In addition, Cloud MVX integrations with FireEye Endpoint Security and FireEye Threat Analytics Platform™ give customers these capabilities not just within FireEye products, but also for alerts from third party products within their infrastructure.

For more information about Cloud MVX and MVX Smart Grid, please join the webinar or visit: FireEye Network Security.

Simpler, Actionable Intelligence

The new means of intelligence delivery from FireEye iSIGHT Intelligence reflects the integration of FireEye’s platform and forms the basis of the industry’s most intelligent detection and the FireEye intelligence-led approach. It is a new consumption model for customers that strengthens the applicability of intelligence throughout all levels of a security organization, while delivering visibility into a broad, comprehensive coverage of cyber threats beyond the typical attack lifecycle. 

FireEye iSIGHT Intelligence customers now can choose from five offerings along with three intelligence support options. These include:

·         Tactical: Designed to enhance and better prioritize customer alerts with indicators driven from FireEye iSIGHT Intelligence’s unique adversary, victim, and machine intelligence

·         Operational: For those looking to add actionable context around detections and alerts to enable better triage, prioritization, and informed response

·         Fusion: Provides security teams comprehensive situational awareness through insights into ongoing, past and predictive threat activity along with sets of contextual understanding that can be tailored based on their specific risks

·         Executive: Enables executives and security leaders to understand their organization’s true threat profile and improve executive level communications

·         Vulnerability:     For organizations looking to optimize their vulnerability and/or patch management workflows based on actual risk and exploitability of vulnerabilities.

For more information about this new offering, please visit the FireEye blog: Introducing Simpler, Actionable Intelligence from FireEye iSIGHT Intelligence. For more information about FireEye iSIGHT Intelligence, please join the webinar or visit: FireEye iSIGHT Intelligence.

Faster Endpoint Investigations

In addition, a new Audit Viewer™ capability in FireEye Endpoint Security (HX) provides in-depth access to endpoint and system details for complete forensic audits all within a single endpoint dashboard. When combined with the existing HX capabilities and  the integration into Cloud MVX, this allows analysts to optimize their time and minimizes errors by allowing for an integrated detection to investigation to response workflow without ever needing to flip between multiple systems. This simplifies the investigative process and delivers the quickest time to protection.

For more information about Audit Viewer, please visit the FireEye blog: Faster Endpoint Investigations with HX 3.2 Audit Viewer. For more information about FireEye Endpoint Security, please visit: FireEye Endpoint Security.

About FireEye, Inc.

FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting.  With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 5,300 customers across 67 countries, including more than 825 of the Forbes Global 2000.

Forward-Looking Statements
This press release contains forward-looking statements, including statements related to the expectations, beliefs, features and benefits of MVX Smart Grid, Cloud MVX and Smart Nodes and the general availability of Cloud MVX. These forward-looking statements involve risks and uncertainties, as well as assumptions which, if they do not fully materialize or prove incorrect, could cause the performance of these new platforms and FireEye's results to differ materially from those expressed or implied by such forward-looking statements. The risks and uncertainties that could cause our results to differ materially from those expressed or implied by such forward-looking statements include customer demand and adoption of FireEye's solutions; real or perceived defects, errors or vulnerabilities in FireEye's products or services; FireEye's ability to react to trends and challenges in its business and the markets in which it operates; FireEye's ability to anticipate market needs or develop and deliver new or enhanced products and services to meet those needs; FireEye's ability to hire and retain critical executives and key employees; and general market, political, economic, and business conditions; as well as those risks and uncertainties included under the captions "Risk Factors" and "Management's Discussion and Analysis of Financial Condition and Results of Operations," in FireEye's Form 10-Q filed with the Securities and Exchange Commission on August 5, 2016, which is available on the Investor Relations section of the company's website at investors.FireEye.com and on the SEC website at www.sec.gov. All forward-looking statements in this press release are based on information available to the company as of the date hereof, and FireEye does not assume any obligation to update the forward-looking statements provided to reflect events that occur or circumstances that exist after the date on which they were made. Any future product, service, feature, benefit or related specification that may be referenced in this release is for information purposes only and is not a commitment to deliver any technology or enhancement. FireEye reserves the right to modify future product and services plans at any time.

© 2016 FireEye, Inc. All rights reserved. FireEye, Mandiant, iSIGHT, MVX, MVX Smart Grid, Cloud MVX, Smart Nodes, Threat Analytics Platform, TAP, HX and Audit Viewer are registered trademarks or trademarks of FireEye, Inc. in the United States and other countries. All other brands, products or service names are or may be trademarks or service marks of their respective owners.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: " I think Google Doodle is getting a little out of control"
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] Assessing Cybersecurity Risk
[Strategic Security Report] Assessing Cybersecurity Risk
As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report delivers insight on how today's enterprises evaluate the risks they face. This report also offers a look at security professionals' concerns about a wide variety of threats, including cloud security, mobile security, and the Internet of Things.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.