Overview

FireEye is a leader in stopping the new generation of cyber-attacks, such as advanced malware, that easily bypass traditional signature-based defenses and compromise over 95 percent of enterprise networks. FireEye has invented a purpose-built, virtual machine-based platform that provides real-time threat protection to organizations across all major threat vectors and each stage of an attack life cycle.

Products

Contracts

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021


SEWP Contracts

SEWP V

Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020


State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021

CMAS

Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

NASPO ValuePoint

Term: through September 15, 2026

National Intergovernmental Purchasing Alliance (National IPA - TCPN)

Term: through May 31, 2018 (with 2 option renewal years)

Ohio State Contract- 534354

Contract # 534354 Term: December 19, 2021

Orange County National IPA Co-Op

Through May 31, 2020 (with 2 option years)

Pennsylvania Office of Administration - ITQ

Pennsylvania Office of Administration Master Contract: 4400004480

Texas DIR-TSO-2660

Term: Through November 17, 2018

VASCUPP

Contract Number: UVA1482501 Contract Term: May 2, 2014– December 19, 2021


Events

Archived Events

News

Latest News

MILPITAS, Calif.-- FireEye, Inc. (NASDAQ: FEYE), the intelligence-led security company, today ...
READ MORE >
MILPITAS, Calif. – June 3, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced the addition of 12 new technology partners to the FireEye® ...
READ MORE >
MILPITAS, Calif. – May 23, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader at stopping today’s advanced cyber attacks, today announced upcoming conference participation for the second quarter of ...
READ MORE >
MILPITAS, Calif. – May 19, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced the integration of iSIGHT Partners threat intelligence into ...
READ MORE >
MILPITAS, Calif. – May 5, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced FireEye® Security Orchestrator™ (FSO™) — the ...
READ MORE >
MILPITAS, Calif. – May 5, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced that Chairman of the Board and Chief Executive Officer David ...
READ MORE >
MILPITAS, Calif. – April 19, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced the launch of Mandiant® Mergers & Acquisitions (M&A) ...
READ MORE >
Carahsoft Technology Corp., the trusted government IT solutions provider, announced today that it has been recognized as the Global Distributor of the Year for 2015 by FireEye, the leader in stopping ...
READ MORE >

Resources

This solution brief outlines how agencies can securely move their Office 365 and Exchange email to the cloud by utilizing FireEye Email Threat Prevention Cloud.

The new threat landscape has changed. Cybercriminals and nation-states are aggressively pursuing valuable data assets, such as financial transaction information, product design blueprints, user credentials to sensitive systems, and other intellectual property. Simply put, the cyber offense has outpa...

Just how (in)effective are today’s defensein- depth deployments? Unfortunately, industry testing bodies offer little help for organizations looking to assess their defenses. Controlled laboratory settings rely on samples of known threats and assumptions about cyber attacks, which may be out...

FireEye intelligence analysts frequently observe two types of advanced threat actors targeting companies involved in healthcare services, pharmaceuticals production, and medical manufacturing:

 

A rash of recent high-profile data breaches among well-known companies has drawn attention to the critical role that corporate directors play in cyber security. Boards are increasingly involved in assessing the risk, improving the security profile of the companies they advise, and managing the ...

This paper offers a better and more current framework to understand both the next-generation threat landscape of advanced malware and the five key design principles needed to eliminate the devil’s bargain implicit in today’s dated and highly ineffective rule-, signature- and list-based defenses.

Mobile devices have become critical in today’s digital workplace. But most organizations lack the security to ensure they, and the data they contain, are secure. Most security teams cannot fully account for—let alone monitor—the vast array of apps that have access to valuable corporate...