FireEye Expands Cloud Server Protection and Investigation Capabilities
New versions of FireEye Network and Endpoint Security work together to enhance detection and investigation capabilities, protecting cloud, on-premise, and hybrid deployments against emerging attacks
August 2, 2019
PRESS RELEASE
MILPITAS, Calif., August 1, 2019 – FireEye, Inc. (NASDAQ: FEYE), the intelligence-led security company, today announced the availability of two new software releases – FireEye® Network Security 8.3 and FireEye Endpoint Security 4.8. These new versions allow for enhanced detection and investigation of advanced attacks against servers, whether hosted in the cloud, on-premise or in hybrid environments.
“Servers are highly targeted by adversaries using the most sophisticated techniques,” said Grady Summers, CTO at FireEye. “Our platform capabilities introduced today combine detection and visibility across the network and endpoint to quickly find threats targeting Windows or Linux based servers. FireEye customers can now more quickly investigate and triage lateral threats at the first sign of a breach, whether their servers are based on-premise, in the cloud, or a hybrid.”
Intelligent Defense for the Most Sensitive Data
Web shells, ransomware, cryptomining, botnets, and shell scripts all have one thing in common – they enable attackers to keep a low profile in the system until they are ready to execute their attack. Getting visibility into the early stages of the attack lifecycle is critical to protecting business infrastructure. The latest updates to the FireEye platform allow organizations to detect, investigate, and remediate these advanced attacks in days or hours instead of weeks or months.
Summers continued, “Web shells are one of the most common pathways into the network, and we’ve implemented new defenses to protect against these attacks. Through this integration across the network and endpoint, FireEye’s unique approach to detecting web shell activity enables rapid identification of malicious activity so security practitioners can detect these attacks in minutes and quickly respond by containing the server, webpage or app.”
For more information on how Network Security and Endpoint Security come together to deliver intelligent server defense, visit https://www.fireeye.com/solutions/endpoint-network-better-together.html
Case Example: Stopping Real World Attacks from Iran
FireEye recently detected and responded to Iranian-nexus actor APT34. The threat actor utilized a combination of social engineering, three new malware families and social networks to drop malware on the victim network. The visibility provided by FireEye Network Security combined with the immediate protection from FireEye Endpoint Security against the offending application enabled FireEye customers to prevent the malware families created and used by APT34 from progressing. These techniques are not exclusive to sophisticated actors and all organizations should employ a layered approach to cybersecurity based on front-line intelligence to guide investigations and response to minimize risk to the organization.
Interested in speaking with FireEye experts about the modern security environment, trends, and what’s new in stopping the latest, most dangerous threats? Come visit FireEye at Black Hat (booth #504).
About FireEye, Inc.
FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 8,200 customers across 103 countries, including more than 50 percent of the Forbes Global 2000.
© 2019 FireEye, Inc. All rights reserved. FireEye and Mandiant are registered trademarks or trademarks of FireEye, Inc. in the United States and other countries. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.
Media Inquiries:
[email protected]
Investor Inquiries:
[email protected]
—— |
You May Also Like
Transform Your Security Operations And Move Beyond Legacy SIEM
Nov 6, 2024Unleashing AI to Assess Cyber Security Risk
Nov 12, 2024Securing Tomorrow, Today: How to Navigate Zero Trust
Nov 13, 2024The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024