Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

FireEye Launches New ‘Continuous Protection’ Platform

FireEye, the soon-to-go-public provider of threat protection solutions, today announced a new, real-time, continuous protection platform that leverages a combination of people, technology and intelligence to protect customers against advanced cyber attacks.

FireEye, the soon-to-go-public provider of threat protection solutions, today announced a new, real-time, continuous protection platform that leverages a combination of people, technology and intelligence to protect customers against advanced cyber attacks.

FireEye IPO

Dubbed “Oculus”, the new platform from FireEye is comprised of three components:

Threat Prevention Platform: The FireEye Threat Prevention Platform, which features a Multi-Vector Virtual Execution (MVX) engine that conducts signature-less analysis within a specialized sandbox. The MVX engine is designed to provide scalable, accurate, and timely protection across the primary threat vectors—Web, email and files. The company plans to add FireEye Mobile Threat Prevention early next year.

Dynamic Threat Intelligence (DTI0): On an hourly basis, FireEye customers recieve updated threat intelligence on worldwide cyber-crime networks and nation state actors. DTI leverages:

– Big Data analysis: By aggregating and analyzing large volumes of attack data in near real-time, FireEye can recognize global attack patterns and pinpoint possible and actual victims, thereby providing customers much needed foresight.

– APT Discovery Center: The APT Discovery Center catalogs and analyzes current and past APT campaigns. It characterizes APT attacks by technical footprint, vertical, geography and target to help security teams, law enforcement and governments improve defenses.

Support and Services: FireEye customers receive 24×7 worldwide support in all major regions around the world. To address the challenges of understaffed security teams, FireEye is introducing Continuous Protection which lets customers leverage FireEye’s expertise in addressing today’s cyber-threats and gain insight into their security posture relative to their industry vertical.

“Today’s attack landscape knows no boundaries or time zones. Customers need protection around the clock and around the world,” said FireEye CEO David DeWalt. “With Oculus, FireEye has re-imagined security to help organizations combat and defeat the menace of cyber crime and espionage. Oculus gives organizations—large and small—a global, real-time continuous protection platform to help protect brand, intellectual property and data.”

Advertisement. Scroll to continue reading.

According to its recent S-1 filing, in 2012, FireEye had revenue of $83.3 million, up from 2011 revenue of $33.7 million, representing year-over-year growth of 148%. The company had net losses of $16.8 million in 2011 and $35.8 million in 2012.

As of the end of June, FireEye claimed over 1,100 customers across more than 40 countries, including over 100 of the Fortune 500.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Malware & Threats

The NSA and FBI warn that a Chinese state-sponsored APT called BlackTech is hacking into network edge devices and using firmware implants to silently...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...