Categories
Problems that solves
Malware infection via Internet, email, storage devices
Risk of attacks by hackers
Risk or Leaks of confidential information
Risk of data loss or damage
Non-compliant with IT security requirements
Risk of lost access to data and IT systems
Values
Ensure Security and Business Continuity
Manage Risks
Enhance Competitive Ability
About Product
Description
By leveraging FireEye’s unique technologies and threat intelligence, FireEye Network Security detects what other security solutions miss, providing holistic security from the perimeter to the network core.
Ideal for next-generation networks that need flexible and scalable deployment options, FireEye Network Security offerings provide strong security for a myriad of environments and customer needs.
FireEye Network Security is designed for high-performance, pervasive and consistent protection against threats across your organization with integrated security workflow and actionable contextual intelligence. It enables you to:
- Accurately detect and immediately stop attacks that evade other security devices, including file-based sandboxes
- Understand and prioritize critical alerts with reliable execution evidence and contextual insights
- Proactively defend and investigate threats with tactical intelligence from FireEye or a third party using the Structured Threat Information eXpression (STIX) format as well as contextual and strategic threat intelligence
- Deploy Network Security with integrated all-in-one hardware appliances or with a scalable and flexible on-premise or cloud-based distributed model
- Future-proof your investment with an extensible, modular architecture
- Provide your Microsoft Windows and Apple OS X users with the same level of threat protection
- Achieve quick protection with machine-, attacker- and victim-based intelligence applied as updates to your defenses every 60 minutes
- Shorten the solution payback period by eliminating the operational cost of triaging alerts manually
- Integrate and automate your security workflow to easily prioritize, investigate and respond to alerts across different threat vectors
Scheme of work
Competitive products
Deployments with this product
User features
Roles of Interested Employees
Chief IT Security Officer
IT Security and Risk Management
Chief Information Officer
Organizational Features
IT Security Department in company
Сonfidential data
GDPR Compliance
Complementary Categories
DLP - Appliance
NGFW - next-generation firewall - Appliance
PAM - privileged access management
SIEM - Security Information and Event Management
SOC - Situation Centre
Penetration Testing
UEBA - User and Entity Behavior Analytics
WAF-web application firewall
Web filtering