Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
MILPITAS, CA -- (Marketwired) -- 10/06/14 -- FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today's advanced cyber attacks, today announced the release of the FireEye® Investigation Analysis System (IA Series), a forensics analytics capability that enhances and expedites incident investigation by pairing in-depth analytics and visualization with the industry's fastest lossless, intelligent packet capture and retrieval. With the release, the FireEye Enterprise Forensics Portfolio further complements the company's existing threat prevention platforms by augmenting the FireEye Multi-vector Virtual Execution (MVX) technology with deep record and investigative analytics. FireEye's IA Series addresses the demands placed on responders who must quickly shift to an investigative process, once an attempted attack has been detected.
The Investigation Analysis System is designed to provide the additional context, correlation and visualization required to identify otherwise hidden threats and enable security teams to understand:
"Incident visibility is a major blind spot for enterprises today," said Jon Oltsik, senior principal analyst at the Enterprise Strategy Group. "With this release, FireEye has provided a useful resource to shine a light on the incidents that would otherwise be unseen, while providing analysts with a tool to accelerate the forensics investigative and analysis process."
"Today, a clear need exists for an integrated security and investigative solution that shortens the time between detection of advanced attacks and response," said Manish Gupta, senior vice president of products at FireEye. "FireEye's new Investigation Analysis System establishes the benchmark for real-time forensics by broadening incident awareness from detection through forensics and accelerating the investigative process required for both incident response and hunting."
The Investigation Analysis System is a standalone appliance that works hand-in-hand with the FireEye Network Forensics Platform, acquired through FireEye's purchase of nPulse Technologies. The Network Forensics Platform provides ultrafast packet capture and meta-data extraction, while the Investigation Analysis System extends that functionality through a centralized, easy-to-use analytical interface across an organization's network meta-data. Key features include:
For more information, please visit: http://www.fireeye.com/products-and-solutions/enterprise-forensics.html.
About FireEye, Inc.
FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 2,500 customers across 65 countries, including over 150 of the Fortune 500.
Forward-Looking Statements
This press release contains forward-looking statements, including statements related to the features and benefits of the FireEye Investigation Analysis System. These forward-looking statements involve risks and uncertainties, as well as assumptions which, if they do not fully materialize or prove incorrect, could cause the performance of this new offering and FireEye's results to differ materially from those expressed or implied by such forward-looking statements. The risks and uncertainties that could cause our results to differ materially from those expressed or implied by such forward-looking statements include customer demand and adoption of FireEye's solutions; real or perceived defects, errors or vulnerabilities in FireEye's products or services; rapidly evolving technological developments in a market that is characterized by rapid changes in technology, customer requirements, industry standards, and frequent new product introductions and improvements; and general market, political, economic, and business conditions; as well as those risks and uncertainties included under the captions "Risk Factors" and "Management's Discussion and Analysis of Financial Condition and Results of Operations," in FireEye's quarterly report on Form 10-Q filed with the Securities and Exchange Commission on August 13, 2014, which is available on the Investor Relations section of the company's website at investors.FireEye.com and on the SEC website at www.sec.gov. All forward-looking statements in this press release are based on information available to the company as of the date hereof, and FireEye does not assume any obligation to update the forward-looking statements provided to reflect events that occur or circumstances that exist after the date on which they were made. Any future product, service, feature, benefit or related specification that may be referenced in this release are for information purposes only and are not commitments to deliver any technology or enhancement. FireEye reserves the right to modify future product and services plans at any time.
© 2014 FireEye, Inc. All rights reserved. FireEye, Multi-vector Virtual Execution and MVX are registered trademarks or trademarks of FireEye, Inc. in the United States and other countries. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.
Media contact:
Vitor De Souza
FireEye, Inc.
415-699-9838
vitor.desouza@fireeye.com
Investor Contact:
Kate Patterson
FireEye, Inc.
408-321-4957
kate.patterson@fireeye.com
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs