Threat Intelligence pictogram

Threat Intelligence Subscriptions

An intelligent path to more effective security

Threat Intelligence Subscriptions

Choose the level and depth of intelligence, integration and enablement your security program needs.

Strategic Intelligence

  • Learn how to align your security resources against the most likely threats and actors
  • Manage business and technical risks around major business decisions and security resource planning

Operational Intelligence

  • Prioritize and add context to your alerts in order to respond more effectively and efficiently
  • Improve defenses with high fidelity machine-readable indicators of compromise (IOCs) with associated contextual information

Vulnerability Intelligence

  • Prioritize the vulnerabilities that pose the most significant threats to the organization
  • Understand the options for patching or otherwise mitigating these vulnerabilities

Cyber Crime Intelligence

  • Understand the threat actors who focus on financial crime — who they target, how they attack and what motivates them
  • Gain analysis of fraud activity, credential collection, underground marketplaces and enabling infrastructure

Cyber Espionage Intelligence

  • Facilitates the understanding of adversaries that target corporate and government entities for strategic advantage
  • Leverage insight into the tactics, techniques and procedures (TTPs) of tracked threat actor groups to better defend your organization

Fusion Intelligence

  • Comprehensive package that includes Operational, Cyber Crime and Cyber Espionage intelligence offerings
  • Use understanding of full attack lifecycle to prepare your defenses against the TTPs of the threat actors of interest

Threat Intelligence Subscriptions

Choose the level and depth of intelligence, integration and enablement your security program needs.

Most comprehensive

Fusion

Fusion

The most comprehensive situational awareness offered delivering the fullest scope of the global cyber threat landscape available. Enables visibility into and a deep understanding of threat actors, their activities, and tools, tactics and procedures (TTPs). Equips organizations with deep dives and analysis across all motivations of cyber activity. Fusion Intelligence provides the optimal combination of analytic reporting and technical intelligence for proactive security measures.

Motivation based

Cyber Espionage

Cyber Espionage

Delivering deep intelligence analysis and insights into adversaries who target corporate and government entities to collect information for their strategic advantage. Cyber Espionage intelligence provides profiles on emerging adversary policy, strategy, doctrine and operational art that will empower your organization with insight into this evolving motivation.

Cyber Crime

Cyber Crime

Delivers deep intelligence and technical analysis enabling improved responses to abuses of computer systems, cyber crime operations and the targeting of victim’s money, goods or services. Cyber Crime intelligence facilities an organization’s need to understand credential theft operations, ransomware, distributed denial-of-service (DDoS), network compromises, point-of-sale (POS), mobile malware and malware.

Function based

Strategic

Strategic

Conveys organizational risks to decision makers for better informed security investment and strategy. Includes intelligence analysis on industries, regions, and threats targeting enterprise networks improving executive-level communication on security topics relevant to your enterprise.

Operational

Operational

Aids a security analyst with actionable context to alerts, to enable better prioritization and informed response. Operational Intelligence provides access to the full library of malware intelligence reporting, as well as actor overviews and indicator reports.

Vulnerability

Vulnerability

Prioritize your patch management workflow based on relevant vulnerabilities being exploited in the wild. Enables your vulnerability analyst to respond to the most relevant vulnerabilities with confidence. Vulnerability also includes all Critical Infrastructure related threat intelligence reporting and vulnerabilities.

Forrester New Wave logo


FireEye named leader in The Forrester New Wave™:
External Threat Intelligence Services, Q3 2018

“Cyber threat intelligence services help extend threat communications to stakeholders across the entire organization for efficient response to cyber threats.”

FireEye Threat Intelligence enablement and support

FireEye offers three different levels of enablement and support
to ensure your success and optimize the value of your intelligence investment.

Baseline

Introduces you to the basic materials and processes required to use the Intelligence portal, interact with the Customer Support Desk, and configure the Intelligence API into your organization.

Coordination

In addition to the Baseline enablement steps, this level of support provides access to FireEye’s Threat Intelligence analysts as well as a designated Intelligence Enablement Manager. The IEM is the primary point of contact for the customer who acts as a trusted advisor and liaison for all FireEye Threat Intelligence matters.

Optimization

In addition to the Baseline and Coordination entitlements, a designated Intelligence Optimization Analyst will work to address your unique security concerns, including deep dives on existing intelligence reports, managing your threat profile, and delivering focused threat briefs.

Forward Deployed Analyst

  • Enables the creation of tailored intelligence by leveraging FireEye and Mandiant’s global visibility, intelligence, and insights.
  • Extends your team through a dedicated analyst who can develop customer-specific research and analysis.
  • Includes threat intelligence and information security expertise to reveal meaningful insights.

FireEye Threat Intelligence features

Our intelligence experts work around the globe and around the clock
to deliver the most comprehensive, contextually rich, actionable intelligence.

Worldwide Intelligence Organization

Worldwide Intelligence Organization

Provide adversarial insight with hundreds of in-theater intelligence researchers across 23 countries speaking over 30 native and local languages.

FireEye Intelligence Portal

FireEye Intelligence Portal

Online access to FireEye intelligence reports as well as intel on actors, industries, regions and malware.

Analyst Access

Analyst Access

Clarify and deepen your understanding of actors and threat intelligence and how it applies to you.

Unlimited Users

Unlimited Users

Allows anyone in your organization to benefit from FireEye Threat Intelligence without you having to pay an additional price.

Intelligence Jumpstart Workshop

Elective interactive workshop designed to effectively integrate threat intelligence into your security operations.

Intelligence API

FireEye Intelligence API enables you to integrate the world's best cyber threat intelligence into your existing security and risk management processes and technologies.

Related resources

Ready to get started?

Ask about FireEye solutions, implementation or anything else. Our security experts are standing by, ready to answer your questions.

+1 888-227-2721 +61 281034308 +32 28962867 +1 877-347-3393 +971 45501444 +358 942451151 +33 170612726 +49 35185034500 +852 3975-1882 +91 80 6671 1566 +353 (0)216019160 +39 0294750535 +81 3 4577 4401 +03 77248276 +52 5585268207 +31 207941289 +64 32880234 +48 223072296 +7 4954658084 +65 31585101 +27 105008408 +82 7076860238 +34 932203202 +94 788155851 +46 853520870 +886 2-5551-1268 +27873392 +44 2036087538 +842444581914