Sorting

Deployments found: 3

Lindsay Auto Group logo
Hidden supplier logo
In the highly volatile and dynamic world of cyber attacks, FireEye provides a complete security solution that constantly adapts to the threat landscape.
“I’m confident that in the event of someone clicking on a compromised file attachment or spear-phishing scam, FireEye Email Security will detect and contain the malware, and then FireEye Helix prevents the infected machine from contaminating the rest of the network,” enthused Paul Moline, chief information officer.
Though the FireEye solution required Lindsay Auto Group to increase spending on security, the investment was unreservedly endorsed by upper management.
“We did the math and the cost for protection paled in comparison to the losses we’d face if an attack took down our network and closed our stores for days again,” Moline noted.
... Learn more
Alpha Grainger Manufacturing logo
Hidden supplier logo
As with many small businesses, Alpha Grainger started out with firewalls and antivirus software. But Hennessy and other company executives became concerned about the growing number of cyber breaches across industries. They decided a deep analysis of cyber security solutions was needed to ensure the company had the most effective, up-to-date defense.
“Our primary goal in terms of security is protecting intellectual property,” says Hennessy. “The challenge is the unknown— the adversaries or cyber terrorists who may be out there, ready to cause trouble and disrupt any business including ours.”
In 2015, Hennessy looked at a variety of solutions.
“I assessed about 10 different technologies from companies including Bit9, BeyondTrust, Trusteer and Tenable Network Security.”
After careful evaluation, Alpha Grainger selected three FireEye products to boost its defense: FireEye Network Security (NX), for its network, FireEye Endpoint Security (HX), for managing its client computers, and FireEye Email Threat Prevention (ETP) Cloud.
... Learn more
Infosys logo
Hidden supplier logo
The magnitude and complexity of the Infosys attack surface is significant; encompassing hundreds of thousands of endpoints spanning the entire globe, a highly mobile workforce and huge datacenters. Tasked with protecting the entire infrastructure, Vishal Salvi, senior vice president and chief information security officer, and his team have created a highly detailed framework that is used to model their environment: It utilizes a one-to-five scoring system to reflect the risk and readiness of each element across a selection of individual securityrelated functions. Salvi elaborated,
“The framework provides us with a very comprehensive maturity model to enable us to define risks and specific control requirements for cyber security across the company.”
Salvi recalled,
“We considered point products for advanced threat protection from individual suppliers as well as multi-capability offerings and conducted a proofof-concept with a shortlist of contenders. After exhaustive evaluations the integrated suite of best-in-class solutions from FireEye was our ultimate winner.”
... Learn more

The ROI4CIO Deployment Catalog is a database of software, hardware, and IT service implementations. Find implementations by vendor, supplier, user, business tasks, problems, status, filter by the presence of ROI and reference.