Network Security
Defend your network, data, and users with the fastest, most reliable cyber-attack protection available
Today’s network attacks are advanced, targeted, and highly evasive. So-called “next-generation” firewalls, antivirus software, and intrusion prevention systems that are policy-based and prioritize throughput over security simply can’t protect you from them.
But FireEye Network Security solutions can. Purpose-built for security, they detect and stop attacks these traditional security products miss and empower you to rapidly respond to threats in near real-time.
Our patented, signature-less Multi-Vector Virtual Execution™ (MVX) engine and Intelligence-Driven Analysis technology identify and block known and unknown threats. Actionable intelligence gained on the frontlines reduces noise and gives you context so you can quickly prioritize and respond to alerts. And, visibility into SSL-protected network traffic enables you to stop encrypted attacks and intrusions.
The bottom line? When it comes to exposing and preventing even the most highly advanced and evasive attacks, nothing protects you better than FireEye Network Security.
Meet Your Network Security Requirements
Address IT transformations and the evolving threat landscape to help ensure fast, cost-efficient, consistent detection and response.
Flexible Network Security
Protect your organization from breaches with
on-premise, cloud or hybrid network security solutions that scale with
your business needs.
(Video - 2:17 min)
Network Security
FireEye Network Security is designed for high-performance, pervasive and consistent protection against threats across your organization with integrated security workflow and actionable contextual intelligence. It enables you to:
- Accurately detect and immediately stop attacks that evade other security devices, including file-based sandboxes
- Understand and prioritize critical alerts with reliable execution evidence and contextual insights
- Proactively defend and investigate threats with tactical intelligence from FireEye or a third party using the Structured Threat Information eXpression (STIX) format as well as contextual and strategic threat intelligence
- Deploy Network Security with integrated all-in-one hardware appliances or with a scalable and flexible on-premise or cloud-based distributed model
- Future-proof your investment with an extensible, modular architecture
- Provide your Microsoft Windows and Apple OS X users with the same level of threat protection
- Achieve quick protection with machine-, attacker- and victim-based intelligence applied as updates to your defenses every 60 minutes
- Shorten the solution payback period by eliminating the operational cost of triaging alerts manually
- Integrate and automate your security workflow to easily prioritize, investigate and respond to alerts across different threat vectors
Our network security solutions will help you:
- Minimize the risk of costly breaches by immediately detecting and stopping attacks hiding in Internet traffic
- Gain attack context with intelligence on adversaries, breach victims, and insights from 5,000+ customer deployments
- Have real-time visibility into known and unknown threats with 14 million + virtual analyses per hour
- Reduce your workload and operational expenses by focusing on real attacks with the lowest false positive rate
- Benefit from Department of Homeland Security SAFETY Act certification by gaining liability protection and greater confidence in your security
- Future proof your investment by scaling security with your business, whether in the on-premise or in the cloud
FireEye network security by the numbers:
- 50%: The percentage of zero-day exploits we have detected in the wild — greater than all other security companies combined.
- 99.14% vs. 33.62%: Our attack detection rate compared that of the next highest performing technology.
- 152% and 9.7 months: The ROI you can expect and the estimated amount of time it will take for you to realize payback on your investment.
| Product Feature | Benefit | FireEye Network Security |
|---|---|---|
| Detect advanced, targeted and evasive threats traditional security solutions miss | ||
| Signature-less threat detection (MVX service) Signature-less threat detection (MVX service) | Detects multi-flow, multi-stage, zero-day, polymorphic, ransomware and other advanced attacks Detects multi-flow, multi-stage, zero-day, polymorphic, ransomware and other advanced attacks |
|
| Real-time and retroactive detection Real-time and retroactive detection | Detects known and unknown threats in real time while also enabling back-in-time detection of threats Detects known and unknown threats in real time while also enabling back-in-time detection of threats |
|
| Multi-vector correlation Multi-vector correlation | Automates validation and blocking of attacks across multiple vectors Automates validation and blocking of attacks across multiple vectors |
Email (on-premise or cloud),
Email (on-premise or cloud), file and endpoint
file and endpoint |
| Multi-OS, multi-file and multi-application Support Multi-OS, multi-file and multi-application Support | Supports heterogeneous endpoint environments for a wide range of applications Supports heterogeneous endpoint environments for a wide range of applications |
|
| Hardened hypervisor Hardened hypervisor | Provides evasion proofing Provides evasion proofing |
|
| Rapidly respond and contain the impact of intrusions | ||
| Real-time inline blocking Real-time inline blocking | Immediately stops attacks Immediately stops attacks |
|
| Signature-based IPS Detection Signature-based IPS Detection | Automates and accelerates triaging of traditionally noisy alerts to eliminate overhead Automates and accelerates triaging of traditionally noisy alerts to eliminate overhead |
|
| Riskware Detection Riskware Detection | Categorizes critical and non-critical malware to prioritize response resources Categorizes critical and non-critical malware to prioritize response resources |
|
| Integrated security workflows Integrated security workflows | Pivots from detection to investigation and response Pivots from detection to investigation and response |
Endpoint Forensics Enterprise Forensics |
| Actionable contextual intelligence Actionable contextual intelligence | Accelerates containment of advanced threat with in-depth information about the attack and attacker Accelerates containment of advanced threat with in-depth information about the attack and attacker |
|
| High Availability (HA) High Availability (HA) | Provides resilient defense Provides resilient defense |
|
| Continually adapt to the evolving threat landscape | ||
| Real-time threat intelligence sharing Real-time threat intelligence sharing | Globally-shares real evidence to immediately block previously unknown attacks and accelerate response Globally-shares real evidence to immediately block previously unknown attacks and accelerate response |
|
| Custom and third-party threat intelligence (STIX)* Custom and third-party threat intelligence (STIX)* | Allows ingestion of non-FireEye indicators into the intelligence-driven analytics engines Allows ingestion of non-FireEye indicators into the intelligence-driven analytics engines |
|
| Strategic threat intelligence Strategic threat intelligence | Enables a proactive assessment of threat landscape changes and empowers a lean-forward security posture Enables a proactive assessment of threat landscape changes and empowers a lean-forward security posture |
|
| Scale and remain flexible as the organization grows or the delivery mode of IT services changes | ||
| Supported bandwidths Supported bandwidths |
10 Mbps – 8 Gbps
10 Mbps – 8 Gbps
|
|
| Supported users Supported users |
50 – 80,000
50 – 80,000
|
|
| Supported NX Series Supported NX Series |
Integrated appliance
Integrated applianceor Network Smart Node Physical: NX 900 – NX 10550** Virtual: NX 1500V – NX 6500V Distributed mode: FireEye Cloud MVX or MVX Smart Grid MVX Smart Grid Physical: VX 5500, VX 12500 or Network Smart Node Physical: NX 900 – NX 10550** Virtual: NX 1500V – NX 6500V Distributed mode: FireEye Cloud MVX or MVX Smart Grid MVX Smart Grid Physical: VX 5500, VX 12500 |
|
| MVX capabilities MVX capabilities |
Integrated appliances
Integrated appliancesFireEye Cloud MVX FireEye Cloud MVX |
|
| Supported form factors Supported form factors |
Physical, virtual, cloud
Physical, virtual, cloud
|
|
| Deployment models Deployment models |
Integrated, on-premise and cloud-based distributed
Integrated, on-premise and cloud-based distributed
|
|
| Cost-free integrated / distributed migration Cost-free integrated / distributed migration |
|
|
* Only supported on fourth-generation (NX x4xx) and newer appliances
configured in the integrated mode.
** All third-generation (NX
x3xx) and newer devices can be converted to Network Smart Nodes as
part of a distributed deployment.
TESTIMONIAL
“When it comes to detecting and preventing advanced attacks, the power of FireEye MVX technology has no competition.”
- Wahid Hammami, Chief Information Officer
Related information
Resources
Forrester: The total economic impact of FireEye Network Security
Learn how FireEye Network Security customers can expect a 152% ROI and payback on their initial investment in just 9.7 months.
Better detection. Smarter alerts. Faster response.
An overview of how the FireEye Network and Email security products work better together, including a customer example.
Frost & Sullivan network security sandbox market analysis
Research firm Frost & Sullivan recognizes FireEye as the market leader when it comes to "must have" network security.
Frost & Sullivan advanced malware sandbox market analysis
Advanced malware uses evasion techniques to bypass traditional security methods. See how FireEye is the market leader in advanced malware sandbox detection technology.
Ready to get started?
Ask about FireEye solutions, implementation or anything else. Our security experts are standing by, ready to answer your questions.
