FireEye Network Security (NX)
1.40

Problems that solves

Malware infection via Internet, email, storage devices

Risk of attacks by hackers

Risk or Leaks of confidential information

Risk of data loss or damage

Non-compliant with IT security requirements

Risk of lost access to data and IT systems

Values

Ensure Security and Business Continuity

Manage Risks

Enhance Competitive Ability

FireEye Network Security (NX)

FireEye Network Security is an advanced threat protection and breach detection platform that provides industry leading threat visibility and protection against the world’s most sophisticated attacks

Description

By leveraging FireEye’s unique technologies and threat intelligence, FireEye Network Security detects what other security solutions miss, providing holistic security from the perimeter to the network core. Ideal for next-generation networks that need flexible and scalable deployment options, FireEye Network Security offerings provide strong security for a myriad of environments and customer needs. FireEye Network Security is designed for high-performance, pervasive and consistent protection against threats across your organization with integrated security workflow and actionable contextual intelligence. It enables you to:
  • Accurately detect and immediately stop attacks that evade other security devices, including file-based sandboxes
  • Understand and prioritize critical alerts with reliable execution evidence and contextual insights
  • Proactively defend and investigate threats with tactical intelligence from FireEye or a third party using the Structured Threat Information eXpression (STIX) format as well as contextual and strategic threat intelligence
  • Deploy Network Security with integrated all-in-one hardware appliances or with a scalable and flexible on-premise or cloud-based distributed model
  • Future-proof your investment with an extensible, modular architecture
  • Provide your Microsoft Windows and Apple OS X users with the same level of threat protection
  • Achieve quick protection with machine-, attacker- and victim-based intelligence applied as updates to your defenses every 60 minutes
  • Shorten the solution payback period by eliminating the operational cost of triaging alerts manually
  • Integrate and automate your security workflow to easily prioritize, investigate and respond to alerts across different threat vectors

Transaction Features

Partner average discount

Deal protection

Average deal size

Average deal closing time

Scheme of work

 Scheme of work

User features

Roles of Interested Employees

Chief IT Security Officer

IT Security and Risk Management

Chief Information Officer

Organizational Features

IT Security Department in company

Сonfidential data

GDPR Compliance

Complementary Categories

DLP - Appliance

NGFW - next-generation firewall - Appliance

PAM - privileged access management

SIEM - Security Information and Event Management

SOC - Situation Centre

Penetration Testing

UEBA - User and Entity Behavior Analytics

WAF-web application firewall

Web filtering