FireEye

Displaying 41 - 50 of 61 results

  • Hacking the Street - FIN4 Likely Playing The Market

    White Papers · Feb 2015 · Provided By FireEye

    FireEye is currently tracking a group that targets the email accounts of individuals privy to the most confidential information of more than 100 companies. The group, which we call FIN4, appears to have a deep familiarity with business deals and corporate communications, and their effects on financial markets. This report...

    Download Now
  • The SIEM Who Cried Wolf: Focusing Your Cybersecurity Efforts on the Alerts that Matter

    White Papers · Nov 2014 · Provided By FireEye

    Users cannot keep up. They cannot tell which alerts are important. Urgent warnings get lost in the noise. When valid warnings do appear, security teams don’t know what to do with them. For truly effective protection, security leaders must focus on the ability to detect true threats, quality of alerts...

    Download Now
  • Cybersecurity’s Maginot Line: A real world assessment of the defense-in-depth model

    White Papers · Nov 2014 · Provided By FireEye

    It doesn’t matter what types of firewall, intrusion prevention system (IPS), Web gateway, sandbox and endpoint systems make up organizations’ Maginot Line; attackers are circumventing them all. As this report explains, to protect themselves effectively, organizations need to evolve their security architecture so they do not rely on malware signatures...

    Download Now
  • Definitive Guide to Defeating Your Cyber Enemies With Unified Advanced Threat Protection Defenses

    White Papers · Nov 2014 · Provided By FireEye

    So, why are traditional security defenses so ineffective? And why does it seem like the bad guys always have the upper hand? Isn’t there anything else we can do to stop them? Thankfully, recent innovations in perimeter- and host-based advanced threat protection technology, combined with new network forensics capabilities, are...

    Download Now
  • FireEye Advanced Threat Report

    White Papers · Oct 2014 · Provided By FireEye

    The data contained in this report comes from the FireEye® Dynamic Threat Intelligence™ (DTI) cloud, which provides attack metrics shared by FireEye customers across the globe. It offers strong evidence that malware infections occur within enterprises at an alarming rate. It also shows that advanced attackers can penetrate legacy defences...

    Download Now
  • Mandiant 2014 Threat Report

    White Papers · Oct 2014 · Provided By FireEye

    Cyber threat actors are expanding the uses of computer network exploitation to fulfil an array of objectives, from the economic to the political. Private organizations have increasingly become collateral damage in political conflicts. With no diplomatic solution in sight, the ability to detect and respond to attacks has never been...

    Download Now
  • Cybersecurity's Maginot Line

    White Papers · Oct 2014 · Provided By FireEye

    This report explains, to protect themselves effectively, organizations need to evolve their security architecture so they do not rely on malware signatures alone. Security teams must be able to see the alerts that matter. And they must complement those with rapid endpoint response expertise to confirm and contain attacks as...

    Download Now
  • Securing Cloud-Based Email: A Guide for Government Agencies

    White Papers · Dec 2013 · Provided By FireEye

    Today, email-based threats represent significant and persistent risks for government agencies, and those dangers are only exacerbated by the move to cloud delivery models. This paper shows how government agencies can capitalize on the benefits of the cloud, while addressing their critical security gaps. The paper reveals how by inspecting...

    Download Now
  • Debunking the Myth of Sandbox Security

    White Papers · Dec 2013 · Provided By FireEye

    Aware that their backward-facing defenses fall short, several IT security vendors are touting their sandbox products. But rather than adopting a truly fresh approach, most are merely grafting a sandbox onto their legacy strategies, which routinely fail to catch these attacks. While sandboxing advances the signature-based approach of the past,...

    Download Now
  • Less Secure Than You Think

    White Papers · Nov 2013 · Provided By FireEye

    This white paper examines the changing threat landscape, how the nature of security threats has evolved, and the potential financial impact across vertical markets and organizations of all sizes. This paper will explain why advanced targeted attacks have been extremely effective at breaking through traditional network security and enabling the...

    Download Now