FireEye and Technology Alliance Partners Offer Approach to Enterprises Breached by Advanced Attacks
Strategy-, Employee-, and Technology-Driven Perspectives from FireEye, Imperva, LogRhythm, and PhishMe Leadership
FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today released a new report addressing the approaches businesses need to take in the event of a security breach. The report gives security practitioners a guide to prepare for breaches caused by morphing, dynamic, and zero-day threats and is a collaboration by advanced threat experts from leading security companies, including: Jason Steer, director of technology strategy, FireEye; Paul C. Dwyer, director of strategic solutions, Mandiant, a FireEye Company; Ross Brewer, managing director and VP international markets, LogRhythm; and Barry Shteiman, director of security strategy, Imperva.
“In today’s society, it is imperative for organisations to protect themselves from advanced persistent threats – a task for which legacy products and practices such as anti-virus and IT-only training are not able to fulfill,” said Jason Steer, director of technology strategy, FireEye. “The current trend we are seeing is the uniqueness of each attack, with the likes of 67 percent of malware only being used once and at the rate of nearly 1.5 per second on average. For all of us, it is now about identifying if an attacker has access to your systems and eliminating the time those attackers evade detection.”
“As cybercriminals become more sophisticated and underhanded in their techniques to infiltrate organisations, it is becoming clear that these organisations are failing to deploy defences that match the attackers’ evolving methods,” said Ross Brewer, managing director and vice president international markets, LogRhythm. “It can be difficult for organisations to predict how they can become a victim, so we must consider every possibility of attack type and implement more robust security defences.”
“Every organisation wants to have a year of zero breaches,” Barry Shteiman, director of security strategy, Imperva said. “It can be hard, but we all need to plan as though an attacker knows how to gain access to the network, and only by playing though the scenario of an attack can we understand what a breach would look like and mean for the organisation.”
“A balanced shift from prevention to detection and timely threat intelligence is paramount to confronting advanced threats,” said Allan Carey, VP of marketing, PhishMe. “With employees being the most targeted point of initial compromise, they are an untapped asset on the front line to feed valuable intelligence into security operations and incident response.”
“Organisations in Europe and around the world are routinely compromised by attackers that seek to steal their financial assets and intellectual property,” said Paul C. Dwyer, director of strategic solutions, Mandiant, a FireEye Company. “FireEye is committed to helping organisations across Europe attack their security gap by equipping them with the tools, intelligence, and expertise required to find and stop attackers that bypass their legacy computer security measures.”
Top tips from the industry thought leaders to ensure an organisation is prepared for a breach include:
- Staff the proper team
- Use the right tools
- Minimize time between detection and response
- Know your network
- Secure your information
- Treat incident detection and response as a consistent business process
About FireEye, Inc.
FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 1,900 customers across more than 60 countries, including over 130 of the Fortune 500.
# # #
© 2014 FireEye, Inc. All rights reserved. FireEye and Mandiant are registered trademarks or trademarks of FireEye, Inc. in the United States and other countries. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.