The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors, including Web, email, and files and across the different stages of an attack life cycle.
The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 1,100 customers across more than 40 countries, including over 100 of the Fortune 500.
Helix – Security Operations Platform
A security operations platform that surfaces unseen threats and empowers expert decisions.
Applies threat intelligence, automation, and case management to FireEye and third-party solutions in a unified security operations platform.
3rd Party Integrations
Detect and block whatever AV technology catches – and what it misses
Provides comprehensive endpoint defense, protecting users from common threats, detecting advanced attacks, and empowering response.
Intelligence-led endpoint security
Detection and response capabilities
FireEye Threat Analytics
Defeat the threats that matter with next-generation security information and event management
Defeat the threats that matter with next-generation security information and event management.
Against cyber threats, knowledge is power
Empowers security teams with forward-looking, high fidelity, adversary-focused intelligence and actionable advice.
iSIGHT Intelligence Subscriptions
Forward Deployed Analyst
Cyber Threat Intelligence Services
Defend your network, data, and users with the fastest, most reliable cyber-attack protection available
Provides network visibility and protection against the world’s most sophisticated and damaging cyber attacks.
Delta Testing Report
Frost & Sullivan Report
Proactively detect and stop all types of email-borne threats
Detects email-based cyber attacks and blocks the most dangerous threats including malicious attachments, phishing sites and impersonation attacks.
FireEye MVX Engine
Advanced Threat Intelligence (ATI)
Credential phishing and typosquatting protection
Dynamic zero-day attack analysis
Automatic email quarantine
Custom YARA rules support
Easy deployment and configuration
Reveal covert threats and accelerate response using our frontline intelligence and expertise
Applies frontline knowledge of the attacker and proven hunting methodologies to detect and respond to covert activity.
Hunting at scale
Threat assessment managers
Gives mid-market customers fully integrated, enterprise grade security that detects, protects and responds to network, email and endpoint threats.