Responding to the most critical cyber security incidents and empowering organizations to protect their assets

Mandiant, a FireEye company, is the leader in helping organizations respond to and proactively protect against advanced cyber security threats. With over 10 years of experience dealing with advanced threat actors from around the world, we support organizations during the most critical times after a security breach has been identified and proactively help them improve their detection, response and containment capabilities.

Technology, Intelligence and Expertise

Mandiant Consulting Overview

Mandiant logo

What cyber security issues are you trying to solve?

Given the rapidly evolving threat landscape, organizations are increasingly challenged to protect their key assets. They need someone they trust to help them respond to cyber breaches and proactively evaluate the effectiveness of their security program and operations to ensure they adequately mitigate risk.

Threat Landscape OverviewAm I At Risk?Am I Prepared?Am I Compromised?I Am Breached!Prepare for Future Events

Am I At Risk?

Identify and mitigate complex security vulnerabilities that can lead to critical data loss or negative headlines.

Learn More

Am I Prepared?

Implement programs and procedures that help you improve your cyber security posture to reduce the risk and impact of cyber breaches.

Learn More

Am I Compromised?

Examine your network for evidence of the presence of an advanced threat actor.

Learn More

I’ve Been Breached! What Do I Do?

Investigate and remediate cyber security incidents with scale, speed and efficiency.

Learn More

Prepare for Future Events

Develop the advanced skills you need to secure your organization.

Learn More

"Mandiant is at the forefront of helping organizations rethink how to prepare for security breaches."

- Michael Chertoff, Former Secretary of Homeland Security

Services directory

Incident Response

Investigate and resolve computer security events ranging from single-system compromises to enterprise-wide intrusions by advanced attack groups that span hundreds of thousands of systems.

Incident Response Retainer Services

Reduce the time to respond to a security incident and minimize its impact on your organization.

Compromise Assessment

Evaluate whether attackers are currently operating undetected in your environment or whether they have been there in the past.

Red Team Operations

Use Red Team Operations to test how well your people, processes and technology protect your most critical assets.

Penetration Testing

Use Penetration Testing to identify and mitigate complex security vulnerabilities that can lead to your most critical assets being compromised.

Security Program Assessment

Get tailored, actionable recommendations to help improve your security posture reduce risk, and eliminate the consequences of security incidents.

Cyber Insurance Risk Assessment

Obtain a quick, high-level analysis of your organization’s risk level based on the C.O.P.E framework (construction, occupancy, protection and exposure).

Response Readiness Assessment

Inventory, assess and compare your existing incident response capabilities, processes and tools with leading practices and develop specific, cost-effective recommendations to improve your security posture.

Tabletop Exercise

Evaluate your organization’s ability to effectively execute your incident response plan through scenario gameplay.

Industrial Control Systems Healthcheck

Reduce security vulnerabilities in SCADA and ICS environments, and learn how to go beyond regulatory and standards requirements to close those gaps.

Mergers And Acquisitions (M&A) Risk Assessment

Use M&A Services to gauge the risk profile and security posture of a merger or acquisition target.

Cyber Defense Center Development

Build your own computer incident response team (CIRT) or security operations center (SOC) to better manage your security process and resolve future cyber threats.

Education Services

Stay informed and up to date on the changing tactics, tools and procedures of advanced attackers.

Why choose Mandiant Consulting?

The Mandiant Consulting team at FireEye is called on by nearly one-third of the Forbes Global 2000. They act as a trusted partner and security expert with a deep understanding of attacker behavior and the rapidly evolving threat landscape. Mandiant combines these capabilities with state-of-the-art technology to defend and respond quickly and efficiently to your most advanced cyber attacks.

Experience and expertise

Experience and expertise

Mandiant provides organizations with practical advice and services based on over a decade of front-line experience responding to the most advanced, often headline-making breaches.

Global threat intelligence

Global threat intelligence

Benefit from our unsurpassed global visibility into the evolving threat landscape gained through a combination of victim, machine and adversary intelligence.

Tools and automation

Tools and automation

By combining commercial FireEye products with purpose-built proprietary tools developed by the consulting organization, our advanced technology stack allows us to prevent, detect, respond and contain the most complex breaches with speed, scale and efficiency.

On-demand and ongoing

On-demand and ongoing

With over 350 consultants in 17 countries across five continents, Mandiant clients can leverage both the technical expertise of on-site consultants and remote services for everything from breach response to proactive cyber security program assessment, strategic program development and staff education.

Mandiant Consulting in the News

Our consulting services take place well outside the media's spotlight. However, our ability to find and stop advanced attackers often makes headlines.


Sign up for email alerts
Get the latest updates on cyber attacks and threat intelligence.



Incident Response
Need immediate assistance?
North America Toll Free: 1 (866) 962-6342
Find Mandiant Support worldwide