FireEye Introduces Groundbreaking Endpoint Capabilities With Enterprise Security Search and Intelligence-Driven Response

FireEye HX Version 3.0 Accelerates Detection and Response For Endpoint Protection

MILPITAS, CA, 10/12/15—FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, announced the release of FireEye® HX™ Endpoint 3.0 product which extends FireEye Threat Intelligence to the endpoint and adds enterprise search capabilities that enable quick and precise security searches across endpoints. This release delivers unparalleled visibility to help organizations rapidly find and mitigate threats. Along with FireEye Threat Intelligence, this release empowers enterprises to adapt their endpoint protection utilizing the new visibility into their endpoint and insight gathered from cloud and real-time feeds. Version 3.0 will be generally available in November 2015.

Today's cybercriminals target employee endpoints, such as desktops, laptops, tablets, and mobile devices, using them as a way into the corporate infrastructure. Technology Business Research’s (TBR) September 2015 report, Enterprise Security Market Forecast, stated “Hackers are more often targeting endpoints, compelling customers to add advanced threat solutions to their malware prevention deployments.”  TBR predicts that endpoint security segment will grow at an estimated 23.2% CAGR from 2014 to 2019.

“One of the drivers for the recent increase in endpoint security spending is the organization-wide perception (and unfortunate reality) that antivirus has failed to protect the endpoint from advanced or unknown malware,” wrote Chris Sherman, Forrester endpoint analyst in a Forrester report.[1]  “Traditionally, [security teams] have relied on signature-based anti-malware as the focal point of their endpoint protection strategy, but third-party research has shown this approach is far from perfect when protecting against zero-day malware. [Security teams] are now more than ever looking to augment or replace their failing antimalware tools with more-effective solutions.”

With FireEye HX, visibility into endpoints, integrated threat intelligence and exploit detection gives security teams tools necessary to create a proactive defense against threats. FireEye HX Endpoint allows security teams to:

  • Determine the presence of threats on endpoints. FireEye HX Triage Viewer addresses known events identified by FireEye or other sources, while new enterprise security search capabilities make it easier to uncover potential threats across endpoints. Once a threat is identified, security investigators can conduct deeper inspection and analysis to pinpoint and trace aspects of an exploit.
  • Integrate endpoint and network defenses. Endpoint defenses are integrated into the industry-proven, highly-scalable MVX™ technology that powers endpoint threat detection. With these enhancements, endpoints can be quickly checked when a threat is discovered inside a network.
  • Leverage FireEye Threat Intelligence. Threat intelligence from FireEye DTI™ cloud and real-time feeds enables real-time blocking of advanced attacker activities at the endpoint.  Threat intelligence enables additional endpoint inspection and analysis as needed.

FireEye HX Endpoint 3.0 delivers several other new features that address advanced threats targeting endpoints in organizations of all sizes. With the Triage Viewer, Enterprise Search, and Live Response, FireEye HX offers a workflow by which cyber security specialists can quickly identify if their organization has been targeted for an attack and determine the scope and impact to their organization as well as contain the breach to prevent further compromise. With these tools security teams can determine:

  • The vector by which the attacker infiltrated;
  • If there has been lateral movement of an attacker to other vulnerable systems;
  • If an attacker was present in a system;
  • The length of time the system was compromised; and
  • If sensitive data was exfiltrated.

"Today’s endpoint security offerings continue to rely heavily on legacy technologies that do not account for the fact that advanced threat actors can find ways around the best prevention tools," said Manish Gupta, SVP of products at FireEye. "FireEye is reimagining endpoint protection by leveraging our proven technologies deployed on millions of network sensors and endpoints around the world to detect and prevent advanced attacks. We believe the next-generation FireEye HX Endpoint solution will provide organizations with the critical endpoint protection the security industry has failed to deliver."

This video shows a summary of HX 3.0:

 

About FireEye, Inc.
FireEye 
has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 3,700 customers across 67 countries, including 675 of the Forbes Global 2000.

Forward-Looking Statements
This press release contains forward-looking statements, including statements related to the expectations, beliefs, features, benefits and general availability of FireEye HX Endpoint 3.0. These forward-looking statements involve risks and uncertainties, as well as assumptions which, if they do not fully materialize or prove incorrect, could cause the performance of these new platforms and FireEye’s results to differ materially from those expressed or implied by such forward-looking statements. The risks and uncertainties that could cause our results to differ materially from those expressed or implied by such forward-looking statements include customer demand and adoption of FireEye’s solutions; real or perceived defects, errors or vulnerabilities in FireEye’s products or services; FireEye’s ability to react to trends and challenges in its business and the markets in which it operates; FireEye’s ability to anticipate market needs or develop new or enhanced products and services to meet those needs; and general market, political, economic, and business conditions; as well as those risks and uncertainties included under the captions “Risk Factors” and “Management’s Discussion and Analysis of Financial Condition and Results of Operations,” in FireEye’s quarterly report on Form 10-Q filed with the Securities and Exchange Commission on July 31, 2015, which is available on the Investor Relations section of the company’s website at investors.FireEye.com and on the SEC website at www.sec.gov. All forward-looking statements in this press release are based on information available to the company as of the date hereof, and FireEye does not assume any obligation to update the forward-looking statements provided to reflect events that occur or circumstances that exist after the date on which they were made. Any future product, service, feature, benefit or related specification that may be referenced in this release are for information purposes only and are not commitments to deliver any technology or enhancement. FireEye reserves the right to modify future product and services plans at any time.

Media contact:
Vitor De Souza
FireEye, Inc.
415-699-9838
vitor.desouza@fireeye.com

Investor Contact:
Kate Patterson
FireEye, Inc.
408-321-4957
kate.patterson@fireeye.com

###

© 2015 FireEye, Inc. All rights reserved. FireEye, HX, MVX, Advanced Threat Intelligence, ATI and DTI are registered trademarks or trademarks of FireEye, Inc. in the United States and other countries. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.

 

 

[1] The State Of Endpoint Security Adoption 2014 To 2015, Forrester Research, Inc., September 24, 2014