FireEye

Displaying 1 - 10 of 60 results

  • M-Trends 2016 – Asia Pacific Edition

    White Papers // Nov 2016 // provided by FireEye

    We don’t hear much about cyber breaches in Asia Pacific (APAC), but that doesn’t mean they aren’t happening every day. In fact, evidence reveals that APAC organizations often have difficulty identifying and responding to breaches. This latest M-Trends report focuses exclusively on APAC organizations and details the following: 5 key ...

    Learn more
  • Breach Readiness Webinar: Next Generation of Incident Preparedness

    Webcasts // Nov 2016 // provided by FireEye

    Are you ready to handle a security breach? Russell Teague, Managing Director, Mandiant, will discuss what companies need to do to be breach-ready, and how being proactive in your incident preparedness is essential and could save you from devastating cost. Incident preparedness is more than having an incident ...

    Watch Now
  • On-Demand Webinar: Passive Detection Doesn't Work

    Webcasts // Aug 2016 // provided by FireEye

    In this webinar, we’ll look at the security ecosystem and some of the reasons why technologies that react to threat activity may not be adequate in this golden age of cyber threats. We’ll also discuss a few of the most important skill sets necessary to cultivate and why personnel and ...

    Register Now
  • The Business case for Protecting Against Advanced Attacks

    White Papers // Aug 2016 // provided by FireEye

    Given today’s sophisticated threat landscape - and how difficult it is to prevent, investigate, and remediate targeted attacks - advanced security solutions should be viewed as a strategic business investment, with a typical payback period between one and two years. Your executives need to know the challenges you face and ...

    Read more
  • Red Team Operations

    White Papers // May 2016 // provided by FireEye

    Learn in this data sheet how Mandiant’s Red Team Operations proactively identify and mitigate complex security vulnerabilities that can lead to critical data loss. Learn how to know whether your critical data is at risk and how easily it may be obtained by a malicious actor, and test your security ...

    Read more
  • The Rise of Red Team Operations

    Webcasts // May 2016 // provided by FireEye

    How strong is your cyber security? Join Chris Truncer, Senior Consultant at Mandiant, a FireEye company, as he provides an introduction to Mandiant Red Team Operations. Learn how Mandiant can achieve a realistic assessment of the effectiveness of your cyber security by emulating the attacker tools, tactics and practices used ...

    Watch Now
  • M-Trends 2016

    White Papers // Apr 2016 // provided by FireEye

    The M-Trends 2016 report provides trends, statistics and case studies to illustrate how advanced threat actors have evolved over the past year. The 2016 report includes details of: How cyber attackers are holding data for ransom, stealing personally identifiable information and destroying critical systems Why enterprise networking devices, such ...

    Download Now
  • Webinar: A View from the front lines with M-Trends 2016

    White Papers // Apr 2016 // provided by FireEye

    M-Trends is the annual cyber security report created by Mandiant Services, a FireEye company. You are invited to a webinar, where Marshall Heilman, VP and Executive Director of Incident Response and Red Team Operations will take you through the 2016 report and provide insights from advanced attack investigations including trends, ...

    Watch Now
  • The Uncomfortable Cyber Security Tradeoff

    White Papers // Mar 2016 // provided by FireEye

    Recent high-profile security breaches, underscore how destructive a breach can be to an organization's reputation and financial stability. Many of these headline-grabbing targeted attacks are based on monetary profit, political gain, or data theft, and are a result of an active, persistent pursuit with the ...

    Download Now
  • Protecting Your Data, Intellectual Property and Brand From Cyber Attacks

    White Papers // Mar 2016 // provided by FireEye

    Keeping up with the volume of network alerts and the new techniques that cyber attackers are constantly developing can be exhausting for security teams. Organizations spend a considerable amount of time and money on cyber security, but the attacks keep coming—and many of them breach networks. Although ...

    Download Now