Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Advanced Threats

9/17/2014
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

FireEye and Mandiant Unite to Deliver Industry's First Global Security as a Service Solution

Introduces Next Generation Threat Intelligence Suite for Deeper Insights Into Cyber Attacks

Milpitas, CA – Sept. 17, 2014 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced two new solutions designed to equip organizations to scale their defense strategies. The new FireEye as a Service™ offering is an on-demand security management offering that allows organizations to apply FireEye’s technology, intelligence and expertise to find and stop cyber attacks. The second new offering announced today, FireEye® Advanced Threat Intelligence™, provides access to threat data and analytical tools that help identify attacks and provide context about the tactics and motives of specific threat actors. Together, these new offerings enable organizations to implement an Adaptive Defense™ security model, so that organizations can rapidly detect and respond to security incidents as they occur.

The ongoing acceleration of technology innovation continues to outpace today’s security capabilities, leading more and more organizations to align with a strategic defense partner that can protect them over the long haul,” said David DeWalt, chairman of the board and CEO, FireEye. “To meet this need, FireEye is taking a new approach with the introduction of FireEye as a Service and FireEye Advanced Threat Intelligence. FireEye is now able to serve as an extension of our customers’ security teams so they can more quickly implement an Adaptive Defense security model. By blending FireEye’s technology, intelligence and expertise into a single on-demand offering, FireEye as a Service simplifies and consolidates the disparate patchwork of products and services organizations must piece together to defend themselves.”

The Adaptive Defense security model is an approach for defending against advanced threat actors that scales up or down based on the unique needs of each security organization at any point in time. With this new approach, organizations can significantly reduce the risks of cyber attacks with on-demand access to FireEye’s expert team of analysts, forensics specialists and malware reverse engineers.

With FireEye as a Service, organizations can choose to manage their own security operations, offload security operations to FireEye, or co-manage operations with FireEye or a FireEye partner. When organizations choose FireEye as a Service, they tap into FireEye’s team of expert threat analysts located in security operations centers around the world to hunt for attackers in their organization by applying FireEye’s unique combination of technology, intelligence and expertise.

The new FireEye Advanced Threat Intelligence offering adds two new capabilities to complement FireEye’s existing Dynamic Threat Intelligence™ subscription. First, when the FireEye Threat Prevention Platform identifies an attack, users will now be able to view intelligence about the attackers and the malware. Security teams will be able to see who the associated threat actor is, what their likely motives are, and get information about the malware and other indicators they can use to search for the attackers. The second new capability is a threat intelligence research service where customers can subscribe to ongoing research including comprehensive dossiers, trends, news and analysis on advanced threat groups as well as profiles of targeted industries, including information about the types of data that threat groups target. Both new offerings are available as a subscription to customers that have purchased FireEye products.

"The tools attackers use to invade networks and steal digital assets are changing every day and security teams are tired of knitting together a complex patchwork of technology and services to defend themselves,” said Jon Oltsik, principal analyst with the Enterprise Strategy Group. “With FireEye as a Service, customers get on-demand access to the FireEye’s technology, intelligence and expertise so they can have a single point of contact to address their needs before, during or after a security incident.

Highlights of FireEye as a Service include:

FireEye analysts staff an around the clock global network of security operations centers to hunt for attackers in an environment using FireEye technology and advanced analytics that identifies outliers and correlates them with behaviors of known attackers. By finding high-risk threats at the earliest stages of an attack, FireEye minimizes the risk of a breach.

Even organizations with the most aggressive and mature security programs experience security incidents. With FireEye as a Service, organizations can quickly engage a Mandiant® incident response team when needed.

Support for Multiple Licensing Models Organizations can choose to pay a subscription fee and account for the service as an operational expense or pay up front and account for it as a capital expense.

Complementary to Existing Service Providers .If an organization desires, FireEye offers the service through qualified managed security service partners to complement their capabilities and deliver FireEye-as-a-Service through them.

Access to Personalized Intelligence Reports. FireEye as a Service customers get access to key intelligence findings and judgments specific to their organization from the FireEye intelligence team.  This includes identification of attackers specifically targeting their industry, typical attack methodologies used by relevant adversaries, and key business or financial data that motivates attackers to target your organization.

Access to Experts. Collectively, FireEye’s security analysts, threat assessment managers and forensics specialists have centuries’ worth of experience. Skilled security experts are expensive and hard to find. By providing reliable, on-demand access to these advanced skills, security teams can rest assured they are available in times of need without making unnecessary investments.

To learn more about how FireEye as a Service enables organizations to operationalize an Adaptive Defense security model, please visit FireEye COO Kevin Mandia’s blog post: http://www.fireeye.com/blog/corporate/2014/09/security-done-the-right-way-adaptive-defense.html. For more information on FireEye as a Service, FireEye Advanced Threat Intelligence or becoming an Adaptive Defense customer, please visit: http://www.fireeye.com

About FireEye, Inc.

FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 2,500 customers across 65 countries, including over 150 of the Fortune 500.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-5230
PUBLISHED: 2019-11-13
P20 Pro, P20, Mate RS smartphones with versions earlier than Charlotte-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than Emily-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than NEO-AL00D NEO-AL00 9.1.0.321(C786E320R1P1T8) have an improper validation vulnerability. The system does not perform...
CVE-2019-5231
PUBLISHED: 2019-11-13
P30 smartphones with versions earlier than ELLE-AL00B 9.1.0.186(C00E180R2P1) have an improper authorization vulnerability. The software incorrectly performs an authorization check when a user attempts to perform certain action. Successful exploit could allow the attacker to update a crafted package.
CVE-2019-5233
PUBLISHED: 2019-11-13
Huawei smartphones with versions earlier than Taurus-AL00B 10.0.0.41(SP2C00E41R3P2) have an improper authentication vulnerability. Successful exploitation may cause the attacker to access specific components.
CVE-2019-5246
PUBLISHED: 2019-11-13
Smartphones with software of ELLE-AL00B 9.1.0.109(C00E106R1P21), 9.1.0.113(C00E110R1P21), 9.1.0.125(C00E120R1P21), 9.1.0.135(C00E130R1P21), 9.1.0.153(C00E150R1P21), 9.1.0.155(C00E150R1P21), 9.1.0.162(C00E160R2P1) have an insufficient verification vulnerability. The system does not verify certain par...
CVE-2010-4177
PUBLISHED: 2019-11-12
mysql-gui-tools (mysql-query-browser and mysql-admin) before 5.0r14+openSUSE-2.3 exposes the password of a user connected to the MySQL server in clear text form via the list of running processes.