To respond to a new attack, a new threat
vector or creating a new feature, development teams need to create a
new version and roll it out to customers. In most endpoint defense
solutions, this can only be accomplished with a completely new release
that may take months. Attackers do not wait. A new exploit is
discovered or a new attack technique is created in days and exploited
for years. During this time between threat creation and protection
solution, organizations are at risk. They cannot afford to wait.
With FireEye Endpoint Security new
protections, new detections and new features for agents or server is
added through our modular architecture. All modules can be added at
any time to upgrade the ability of an organization to protect their
data, client information or intellectual property.