Network Security

Defend your network, data, and users with the fastest, most reliable cyber-attack protection available

Today’s network attacks are advanced, targeted, and highly evasive. So-called “next-generation” firewalls, antivirus software, and intrusion prevention systems that are policy-based and prioritize throughput over security simply can’t protect you from them.

But FireEye Network Security solutions can. Purpose-built for security, they detect and stop attacks these traditional security products miss and empower you to rapidly respond to threats in near real-time.

Our patented, signature-less Multi-Vector Virtual Execution™ (MVX) engine and Intelligence-Driven Analysis technology identify and block known and unknown threats. Actionable intelligence gained on the frontlines reduces noise and gives you context so you can quickly prioritize and respond to alerts. And, visibility into SSL-protected network traffic enables you to stop encrypted attacks and intrusions.

The bottom line? When it comes to exposing and preventing even the most highly advanced and evasive attacks, nothing protects you better than FireEye Network Security.

Meet Your Network Security Requirements

Address IT transformations and the evolving threat landscape to help ensure fast, cost-efficient, consistent detection and response.

View infographic

Flexible Network Security

Protect your organization from breaches with on-premise, cloud or hybrid network security solutions that scale with your business needs.
(Video - 2:17 min)

Network Security

FireEye Network Security is designed for high-performance, pervasive and consistent protection against threats across your organization with integrated security workflow and actionable contextual intelligence. It enables you to: 

  • Accurately detect and immediately stop attacks that evade other security devices, including file-based sandboxes
  • Understand and prioritize critical alerts with reliable execution evidence and contextual insights
  • Proactively defend and investigate threats with tactical intelligence from FireEye or a third party using the Structured Threat Information eXpression (STIX) format as well as contextual and strategic threat intelligence
  • Deploy Network Security with integrated all-in-one hardware appliances or with a scalable and flexible on-premise or cloud-based distributed model
  • Future-proof your investment with an extensible, modular architecture
  • Provide your Microsoft Windows and Apple OS X users with the same level of threat protection
  • Achieve quick protection with machine-, attacker- and victim-based intelligence applied as updates to your defenses every 60 minutes
  • Shorten the solution payback period by eliminating the operational cost of triaging alerts manually
  • Integrate and automate your security workflow to easily prioritize, investigate and respond to alerts across different threat vectors

Our network security solutions will help you:

  • Minimize the risk of costly breaches by immediately detecting and stopping attacks hiding in Internet traffic
  • Gain attack context with intelligence on adversaries, breach victims, and insights from 5,000+ customer deployments
  • Have real-time visibility into known and unknown threats with 14 million + virtual analyses per hour
  • Reduce your workload and operational expenses by focusing on real attacks with the lowest false positive rate
  • Benefit from Department of Homeland Security SAFETY Act certification by gaining liability protection and greater confidence in your security
  • Future proof your investment by scaling security with your business, whether in the on-premise or in the cloud

FireEye network security by the numbers:

  • 50%: The percentage of zero-day exploits we have detected in the wild — greater than all other security companies combined.
  • 99.14% vs. 33.62%: Our attack detection rate compared that of the next highest performing technology.
  • 152% and 9.7 months: The ROI you can expect and the estimated amount of time it will take for you to realize payback on your investment.
Product Feature Benefit FireEye Network Security
Detect advanced, targeted and evasive threats traditional security solutions miss
Signature-less threat detection (MVX service) Signature-less threat detection (MVX service) Detects multi-flow, multi-stage, zero-day, polymorphic, ransomware and other advanced attacks Detects multi-flow, multi-stage, zero-day, polymorphic, ransomware and other advanced attacks
Real-time and retroactive detection Real-time and retroactive detection Detects known and unknown threats in real time while also enabling back-in-time detection of threats Detects known and unknown threats in real time while also enabling back-in-time detection of threats
Multi-vector correlation Multi-vector correlation Automates validation and blocking of attacks across multiple vectors Automates validation and blocking of attacks across multiple vectors
Email (on-premise or cloud),
file and endpoint
Email (on-premise or cloud), file and endpoint
Multi-OS, multi-file and multi-application Support Multi-OS, multi-file and multi-application Support Supports heterogeneous endpoint environments for a wide range of applications Supports heterogeneous endpoint environments for a wide range of applications
Hardened hypervisor Hardened hypervisor Provides evasion proofing Provides evasion proofing
Rapidly respond and contain the impact of intrusions
Real-time inline blocking Real-time inline blocking Immediately stops attacks Immediately stops attacks
Signature-based IPS Detection Signature-based IPS Detection Automates and accelerates triaging of traditionally noisy alerts to eliminate overhead Automates and accelerates triaging of traditionally noisy alerts to eliminate overhead
Riskware Detection Riskware Detection Categorizes critical and non-critical malware to prioritize response resources Categorizes critical and non-critical malware to prioritize response resources
Integrated security workflows Integrated security workflows Pivots from detection to investigation and response Pivots from detection to investigation and response Endpoint Forensics
Enterprise Forensics
Actionable contextual intelligence Actionable contextual intelligence Accelerates containment of advanced threat with in-depth information about the attack and attacker Accelerates containment of advanced threat with in-depth information about the attack and attacker
High Availability (HA) High Availability (HA) Provides resilient defense Provides resilient defense
Continually adapt to the evolving threat landscape
Real-time threat intelligence sharing Real-time threat intelligence sharing Globally-shares real evidence to immediately block previously unknown attacks and accelerate response Globally-shares real evidence to immediately block previously unknown attacks and accelerate response
Custom and third-party threat intelligence (STIX)* Custom and third-party threat intelligence (STIX)* Allows ingestion of non-FireEye indicators into the intelligence-driven analytics engines Allows ingestion of non-FireEye indicators into the intelligence-driven analytics engines
Strategic threat intelligence Strategic threat intelligence Enables a proactive assessment of threat landscape changes and empowers a lean-forward security posture Enables a proactive assessment of threat landscape changes and empowers a lean-forward security posture
Scale and remain flexible as the organization grows or the delivery mode of IT services changes
Supported bandwidths Supported bandwidths
10 Mbps – 8 Gbps
10 Mbps – 8 Gbps
Supported users Supported users
50 – 80,000
50 – 80,000
Supported NX Series Supported NX Series
Integrated appliance
or Network Smart Node

Physical: NX 900 – NX 10550**
Virtual: NX 1500V – NX 6500V
Distributed mode: FireEye Cloud MVX or MVX Smart Grid

MVX Smart Grid
Physical: VX 5500, VX 12500
Integrated appliance
or Network Smart Node

Physical: NX 900 – NX 10550**
Virtual: NX 1500V – NX 6500V
Distributed mode: FireEye Cloud MVX or MVX Smart Grid

MVX Smart Grid
Physical: VX 5500, VX 12500
MVX capabilities MVX capabilities
Integrated appliances
FireEye Cloud MVX
Integrated appliances
FireEye Cloud MVX
Supported form factors Supported form factors
Physical, virtual, cloud
Physical, virtual, cloud
Deployment models Deployment models
Integrated, on-premise and cloud-based distributed
Integrated, on-premise and cloud-based distributed
Cost-free integrated / distributed migration Cost-free integrated / distributed migration

* Only supported on fourth-generation (NX x4xx) and newer appliances configured in the integrated mode.
** All third-generation (NX x3xx) and newer devices can be converted to Network Smart Nodes as part of a distributed deployment.

TESTIMONIAL

“When it comes to detecting and preventing advanced attacks, the power of FireEye MVX technology has no competition.”

- Wahid Hammami, Chief Information Officer

Resources

Forrester: The total economic impact of FireEye Network Security

Learn how FireEye Network Security customers can expect a 152% ROI and payback on their initial investment in just 9.7 months.

Read the study 

Better detection. Smarter alerts. Faster response.

An overview of how the FireEye Network and Email security products work better together, including a customer example.

Download overview 

Frost & Sullivan network security sandbox market analysis

Research firm Frost & Sullivan recognizes FireEye as the market leader when it comes to "must have" network security.

Read the excerpt 

Frost & Sullivan advanced malware sandbox market analysis

Advanced malware uses evasion techniques to bypass traditional security methods. See how FireEye is the market leader in advanced malware sandbox detection technology.

Read the excerpt 

Ready to get started?

Ask about FireEye solutions, implementation or anything else. Our security experts are standing by, ready to answer your questions.

+1 888-227-2721 +61 281034308 +1 877-347-3393 +358 942451151 +33 170612726 +49 35185034500 +852 3975-1882 +91 80 6671 1241 +39 0294750535 +81 345888169 +03 77248276 +52 5585268207 +64 32880234 +48 223072296 +7 4954658084 +65 31585101 +27 105008408 +82 7076860238 +34 932203202 +94 788155851 +886 2-5551-1268 +27873392 +44 2036087538 +842444581914