Good enough cyber security isn't good enough. But how much should you be willing to spend to protect your network? FireEye commissioned Forrester Consulting to study just what kind of return on investment existing FireEye customers are getting, and what that means for them in the long run.
Products and Services Central
The latest updates on FireEye products and services from the teams building the FireEye Security platform.
Return on Investment: The Financial Impact of FireEye on Organizations
July 27, 2016 10:00 AM By Rajiv RaghunarayanThe People of FaaS – Chris Tannery
July 26, 2016 8:00 AM By Grady SummersFireEye as a Service, or Faas, offers advanced threat management services. FaaS focuses on threat validation and proactive, analyst-driven hunting for any signs of compromise.
In this blog series, we introduce you to the people behind the scenes who use enterprise forensics, endpoint security and our threat analytics platform to provide the information needed to track an attacker down quickly.
In this post, you'll meet Chris Tannery, a senior manager of the FaaS team.
Read more...MTP Catches Aggressive Ad Displaying App in Google Play Leveraging Pokémon
July 22, 2016 3:25 PM By Wu Zhou, Jimmy Su, Jens Monrad, Linhai SongCyber criminals will always target the hottest apps to distribute malicious payloads, and with the Pokémon Go being unavailable in some countries, people will undoubtedly be driven to find other ways to install the popular app – even if it’s risky. In this blog post, we offer tips to keep your mobile device more secure.
Applying Threat Intelligence to Industrial Control Systems Security
July 20, 2016 5:30 PM By Erica GalvinIndustrial Control Systems, or ICS, are a target for cyber attacks, and 67 percent of global ICS professionals surveyed perceive severe or high levels of cyber threat to control systems. Leveraging threat intelligence is crucial to proactively assess risk and prioritize alerts based on the context. A new webinar addresses these ideas and more.
Gaps in Email Threat Detection Open the Door to Cybercrime
July 20, 2016 10:00 AM By Elizabeth FlamminiEmails are a target for threat actors, and having a security plan in place doesn't guarantee your network is safe from compromise. The blog details features your organization needs in an email security solution to help prevent your email traffic from becoming a superhighway for cybercrime.
Read more...