Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
MILPITAS, CA -- (Marketwired) -- 12/08/14 -- FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today's advanced cyber attacks, today announced that it won CRN's 2014 Enterprise App Award in the security category for the FireEye Mobile Security application. The CRN "Appys" recognize outstanding achievement by developers of enterprise mobile apps.
Awards were given in 11 distinct categories this year: analytics, communication, contact management, enterprise collaboration, human capital management, information access/management, Internet of Things, productivity, security, systems administration/management and Editors' Choice. Winners selected by a CRN editorial panel, are based on a combination of critical factors including functionality; suitability to task; ease of use; innovation; and potential value to solution providers, their customers and the market in general.
The FireEye Mobile Security app is designed from the ground up to identify and stop mobile threats on Android devices. Part of the FireEye Mobile Threat Prevention solution, it can identify advanced malware, compromised adware, and software vulnerabilities in mobile applications using behavioral analysis.
"The winners of CRN's Appy Awards are those companies whose new applications have added significant business value to enterprises and the solution providers that serve them," said Robert Faletra, CEO of The Channel Company, publisher of CRN. "We congratulate the winners for their outstanding achievement in bringing innovative, easy to use mobile applications that boost enterprise productivity to market."
"This award demonstrates industry recognition of the importance of mobile threat prevention," said Manish Gupta, senior vice president of products at FireEye. "Rather than relying on a traditional signature-based approach, which are ineffective against modern threats, we're providing users a way to make informed decisions about mobile security by blocking malicious apps from being installed in the first place."
Honorees are featured in the December issue of CRN magazine as well as online at www.crn.com. Award winners were also spotlighted during the NexGen Cloud Conference & Expo, December 4-5, 2014, in San Diego.
About FireEye, Inc.
FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 2,700 customers across 67 countries, including over 157 of the Fortune 500.
© 2014 FireEye, Inc. All rights reserved. FireEye and Mobile Security are registered trademarks or trademarks of FireEye, Inc. in the United States and other countries. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.
Media contact:
Vitor De Souza
FireEye, Inc.
415-699-9838
vitor.desouza@fireeye.com
Investor Contact:
Kate Patterson
FireEye, Inc.
408-321-4957
kate.patterson@fireeye.com
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs