iSIGHT Intelligence Subscriptions

FireEye iSIGHT Threat Intelligence is a proactive, forward-looking means of qualifying threats poised to disrupt your business based on the intents, tools and tactics of the attacker. Our high-fidelity, comprehensive intelligence delivers visibility beyond the typical attack lifecycle, adding context and priority to global threats before, during and after an attack.

It helps mitigate risk, bolster incident response, and enhance your overall security ecosystem. Get the intel you need to predict attack and refocus your attention on what matters most to your business.

Free trial

Understand Your Attacker and Prioritize Your Threats

iSIGHT Intelligence Subscriptions

Choose the level and depth of intelligence, integration and enablement your security program needs. Learn more about FireEye iSIGHT’s suite of threat intelligence subscriptions of Fusion, Cyber Espionage, Cyber Crime, Operational, Vulnerability and Executive.

Most comprehensive

Fusion

Fusion

The most comprehensive situational awareness offered delivering the fullest scope of the global cyber threat landscape available. Enables visibility into and a deep understanding of threat actors, their activities, and tools, tactics and procedures (TTPs). Equips organizations with deep dives and analysis across all motivations of cyber activity. Fusion Intelligence provides the optimal combination of analytic reporting and technical intelligence for proactive security measures.

Motivation based

Cyber Espionage

Cyber Espionage

Delivering deep intelligence analysis and insights into adversaries who target corporate and government entities to collect information for their strategic advantage. Cyber Espionage intelligence provides profiles on emerging adversary policy, strategy, doctrine and operational art that will empower your organization with insight into this evolving motivation.

Cyber Crime

Cyber Crime

Delivers deep intelligence and technical analysis enabling improved responses to abuses of computer systems, cyber crime operations and the targeting of victim’s money, goods or services. Cyber Crime intelligence facilities an organization’s need to understand credential theft operations, ransomware, distributed denial-of-service (DDoS), network compromises, point-of-sale (POS), mobile malware and malware.

Function based

Operational

Operational

Aids a security analyst with actionable context to alerts, to enable better prioritization and informed response. Operational Intelligence provides access to the full library of malware intelligence reporting, as well as actor overviews and indicator reports.

Vulnerability

Vulnerability

Prioritize your patch management workflow based on relevant vulnerabilities being exploited in the wild. Enables your vulnerability analyst to respond to the most relevant vulnerabilities with confidence. Vulnerability also includes all Critical Infrastructure related threat intelligence reporting and vulnerabilities.

Executive

Executive

Conveys organizational risks to decision makers for better informed security investment and strategy. Includes intelligence analysis on industries, regions, and threats targeting enterprise networks improving executive-level communication on security topics relevant to your enterprise.

Experts who use threat intelligence

Vulnerability Analyst

See how tactical threat intelligence helps vulnerability analysts determine what threats are critical and how to communicate risks to management.

Read profile

Security Operations Center Analyst

Understand how operational intelligence enables SOC analysts to make better, faster decisions about alert escalations.

Read profile

Incident Responder

Find out how operational intelligence provides incident responders the answers they need - the who, what, why, when and how - about their attackers.

Read profile

CISO and Sr. IT Executives

Discover how fusion intelligence helps CISOs and executives assess risk and make better strategic decisions around security, budget and staffing.

Read profile

FireEye iSIGHT Intelligence enablement and support

FireEye iSIGHT Intelligence Enablement and Support strives to maximize value and your return on investment. Intelligence enablement services bring the human touch to cyber events. From gathering client threat concerns, facilitating requests for support, integrating our API into clients’ existing processes and technologies and acting as a client advocate, to advising and enabling intelligence-led security, the FireEye Intelligence Enablement team is dedicated to client success.

FireEye iSIGHT Intelligence delivers three levels of threat intelligence enablement and support to to help advance your security mission.

  Additional Intel Enablement for Purchase
Service Provided Onboarding & Provisions
Included with All Subscriptions
Level 2: Intel Coordination Level 3: Intel Optimization
Onboarding
Y
Y
Y
Y
Y
Y
Self Service Portal
Y
Y
Y
Y
Y
Y
Customer Support Desk
Y
Y
Y
Y
Y
Y
Collection of Threat Concerns
Y
Y
iSIGHT API Provisioning
Y
Y
Y
Y
Y
Y
Formal Business Reviews
Remote
Remote
Remote
Remote
Remote or Onsite
Remote or Onsite
Intelligence Report Clarification
Y
Y
Y
Y
Analyst Access Original Requests
10 per Q
10 per Q
25 per Q
25 per Q
Priority Analyst Access Requests
2 per Q
2 per Q
iSIGHT API Technical Integration
2hrs / 1 use case
2hrs / 1 use case
4hrs / 2 use cases
4hrs / 2 use cases
General Threat Brief
1 per Q
1 per Q
1 per Q
1 per Q
Focused Threat Brief
1 per Year
1 per Year
Intelligence Workshops
Y
Y

FireEye iSIGHT Intelligence deliverables

Our intelligence experts work around the globe and around the clock to deliver the most comprehensive, contextually rich, actionable intelligence.

Included in each subscription is:

Onboarding and Provisioning – provides provisioning of users and API/Browser Plugin Keys as well as a formal business review conducted yearly.

iSIGHT API and SDK – Easy integration of high-fidelity threat intelligence with your security, risk and compliance management technologies. 

Browser Plugin – scans webpages for technical indicators (IP, domain, hashes) and queries the iSIGHT API to find matches in iSIGHT intelligence holdings.

Intel Portal – On-demand access to the complete library of historical reporting for your specific subscriptions and tools so you can configure push notifications, such as email alerts and digests and SMS mobile alerts.

Analysis Tools – ability to receive context information about domain names, IP addresses and threats as well as upload suspect files for analysis.

Threat Media Highlights – Daily email that tracks the latest security stories, answers inbound questions from business executives, or preempts questions by proactively sending analyses to executives and board members. Our team tracks breaking news, analyzes the accuracy of important stories, and correlates our research and reports to give you the truth behind the headlines.

Related resources

Ready to get started?

Ask about FireEye solutions, implementation or anything else. Our security experts are standing by, ready to answer your questions.

+1 888-227-2721 +61 281034308 +1 877-347-3393 +358 942451151 +33 170612726 +49 35185034500 +852 3975-1882 +91 80 6671 1241 +39 0294750535 +81 345888169 +03 77248276 +52 5585268207 +64 32880234 +48 223072296 +7 4954658084 +65 31585101 +27 105008408 +82 7076860238 +34 932203202 +94 788155851 +886 2-5551-1268 +27873392 +44 2036087538 +842444581914