U.S. federal agencies were disproportionately targeted in 2010, facing 39 percent more cyber incidents than in 2009 while overall cyber incidents declined, according to the Office of Management and Budget (OMB)*.
To counter cyber incidents such as nation-state sponsored espionage, data breaches and advanced persistent threats (APTs), government agencies must fill the hole left by next-generation firewalls, IPS, anti-virus, and Web gateways. These tools, reacting based primarily on rules and signatures, are no match for well-funded adversaries employing a new generation of dynamic, stealthy threats.
Consistent with FISMA and NIST directives to embrace risk management through continuous monitoring and attack-based metrics, government agencies everywhere are turning to FireEye. FireEye offers the only platforms that can detect and block threats in real time for a proactive stance against advanced malware, zero-day, and targeted APT attacks.
The FireEye NX and EX series continuously detect, confirm, and block both unknown and known threats. The comprehensive threat prevention provided by FireEye continuously monitors and acts on both inbound and outbound paths. Operating either in-line or out-of-band, FireEye strengthens government security infrastructures without disrupting operations. FireEye adds a vital layer of protection as agencies adopt the cloud.
For threat researchers, the FireEye Multi-Vector Virtual Execution (MVX) engine provides a full-featured, hands-on testing environment for analysis of advanced malware and targeted attacks.
- Common Criteria EAL 2+ accredited – Proven to meet stringent government standards
- FIPS140-2 – Compliant via utilization of OpenSSL FIPS Library
- Real-time alert notifications – Lets you respond to critical events immediately with instant alerts sent via SMTP, SNMP, syslog or HTTP POST or seen within the FireEye Web console
- Robust integrations:
- With all leading SIEM tools
- With many technology partners
- Data storehouse – Collects and stores audit relevant security events to meet long-term data retention and FISMA quarterly reporting requirements
- Fast-acting, virtually "set and forget" – Hardened platforms drop in behind existing gateway controls and start work in 30 minutes or less; automatic updates and shared intelligence keep configurations current
* InformationWeek, "Federal Cyber Attacks Rose 39% in 2010", March 2011