FireEye Network Security (NX)
Offer a reference bonus
1.40

FireEye Network Security (NX)

FireEye

ROI -
USD

PitchFireEye Network Security is an advanced threat protection and breach detection platform that provides industry leading threat visibility and protection against the world’s most sophisticated attacks

Product features

Description

By leveraging FireEye’s unique technologies and threat intelligence, FireEye Network Security detects what other security solutions miss, providing holistic security from the perimeter to the network core.
Ideal for next-generation networks that need flexible and scalable deployment options, FireEye Network Security offerings provide strong security for a myriad of environments and customer needs.
FireEye Network Security is designed for high-performance, pervasive and consistent protection against threats across your organization with integrated security workflow and actionable contextual intelligence. It enables you to:
  • Accurately detect and immediately stop attacks that evade other security devices, including file-based sandboxes
  • Understand and prioritize critical alerts with reliable execution evidence and contextual insights
  • Proactively defend and investigate threats with tactical intelligence from FireEye or a third party using the Structured Threat Information eXpression (STIX) format as well as contextual and strategic threat intelligence
  • Deploy Network Security with integrated all-in-one hardware appliances or with a scalable and flexible on-premise or cloud-based distributed model
  • Future-proof your investment with an extensible, modular architecture
  • Provide your Microsoft Windows and Apple OS X users with the same level of threat protection
  • Achieve quick protection with machine-, attacker- and victim-based intelligence applied as updates to your defenses every 60 minutes
  • Shorten the solution payback period by eliminating the operational cost of triaging alerts manually
  • Integrate and automate your security workflow to easily prioritize, investigate and respond to alerts across different threat vectors

Problems that the product solves

Malware infection via Internet, email, storage devices

Risk of attacks by hackers

Risk or Leaks of confidential information

Risk of data loss or damage

Non-compliant with IT security requirements

Risk of lost access to data and IT systems

Values

Ensure Security and Business Continuity

Manage Risks

Enhance Competitive Ability

Матрица сравнения

Testing

It is required to get the FireEye partner status. The request for 30 days testing is carried out through the partner portal

Characteristics

Web traffic scan

Avaliable

Email scan

Yes

Endpoint protection

Avaliable

Mobile protection

Avaliable

Malware Detection in files

Avaliable

Encrypted traffic scan

Yes

Network shares scan

Avaliable

YARA files scanning

Avaliable

YARA implementation by customer

Avaliable

Malware blocking by protocols

Avaliable

CPU-level detection

Avaliable

OS kernel level detection

Avaliable

Malware Samples

Avaliable

Zero-day threats protection

Avaliable

Detecting C&C server

Avaliable

Hardware Applience

Avaliable

Working in in-band/out-of-band modes

Avaliable

Cloud

Avaliable

Threat Intelligence Feeds

Avaliable

SIEM Integration

Avaliable

Vulnerability manager

Avaliable

Uploading "Golden Image"

Avaliable

Using Multiple OSes

Avaliable

Multiple Versions of Sandbox App

Avaliable

Payload detonation

Avaliable

Auto-uploading files

Avaliable

URL analysis

Avaliable

Analyst console

Avaliable

Security Reports

Periodic reports, Contextual reports on threats

Alerts via Email

Avaliable

Central Policy Management for Data Protection

Avaliable

Forensic analysis of data history

Avaliable

Automated remediation capabilities

Avaliable

Auto Update of Signatures

Avaliable

Trial

Yes

Transaction Features

Partner average discount

Deal protection

Average deal size

Average deal closing time

Scheme of work

 Scheme of work

Competitive products

prev
next

User features

Roles of Interested Employees

Chief IT Security Officer

IT Security and Risk Management

Chief Information Officer

Organizational Features

IT Security Department in company

Сonfidential data

GDPR Compliance

Complementary Categories

DLP - Appliance

NGFW - next-generation firewall

PAM - privileged access management

SIEM - Security Information and Event Management

SOC - Situation Centre

Penetration Testing

UEBA - User and Entity Behavior Analytics

WAF-web application firewall

Web filtering