Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
MILPITAS, CA -- (Marketwired) -- 05/27/14 -- FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today's advanced cyber attacks, today announced that the FireEye Forensic Analysis (AX Series) Threat Prevention Platform has been certified by NATO for inclusion in the Information Assurance Product Catalogue (NIAPC). With this inclusion, the FireEye AX Series provides NATO nations and civil and military bodies with next-generation threat evaluation that meets the INFOSEC Directive.
"Advanced persistent threats are becoming a very tangible threat to the governmental and, ultimately, private organizations that contribute to NATO's mission of safeguarding freedom," said Paul Davis, vice president, Europe, FireEye. "Member countries are prime targets for advanced threat actors, whose sponsored goals are often to steal high-value data like NATO plans or communications. We are honored that the FireEye Forensic Analysis Platforms designed to detect these threats has been certified by NATO."
The NIAPC provides NATO Systems Operations Centers with various information assurance (IA) products, protection profiles, and packages that provide for the safe handling of classified and non-classified NATO information. Products undergo three levels of evaluation to determine the highest level of NATO information they can protect. FireEye Forensic Analysis Platformshas received a full NATO evaluation and has been certified to handle information classified as NATO SECRET.
"Protecting NATO information, members, and organizations from cybersecurity threats is of the utmost importance," said John Tatman, director, NATO Information Assurance. "We recognize the advanced threat landscape is a growing part of cybersecurity operations which is why we evaluate vendors like FireEye who focus on such attacks."
The FireEye AX Series is designed for security analysts to safely execute suspicious files or Web objects and inspect them for malicious activity. Utilizing the FireEye Multi-vector Virtual Execution engine, organizations are able to generate forensic details around the techniques advanced malware uses to breach a network. For more information on FireEye AX Series in the NIAPC, please visit: http://www.ia.nato.int/niapc/Product/AX-Series_513 or http://www.fireeye.com/products-and-solutions/forensic-analysis.html.
About FireEye, Inc.
FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 2,200 customers across more than 60 countries, including over 130 of the Fortune 500.
© 2014 FireEye, Inc. All rights reserved. FireEye and Multi-Vector Virtual Execution are registered trademarks or trademarks of FireEye, Inc. in the United States and other countries. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.
Media Contact
Vitor De Souza
FireEye, Inc.
vitor.desouza@fireeye.com
(415) 699-9838
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs