• slide
  • slide


FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 7,900 customers across 103 countries, including more than 50 percent of the Forbes Global 2000.


Demo Desk

FireEye Demo Desk

In today's age where all of our most critical information is stored digitally and having a security posture that can only defend based off known signatures is not enough. Enterprises must be able to implement proactive defensive capabilities, while also engaging in threat hunting for the latest cyber-attacks. Our experts' knowledge of the threat landscape provides best-of-breed intelligence that feeds into our security platform.

Join us for our monthly demo to  learn more of what you can do with FireEye with topics including FireEye Threat Intelligence, Expertise-On-Demand, and Email, Endpoint and Network Security. Our demo desks are only 30 minutes so you can quickly get back to your busy day. Accidentally miss a session? We host two a month for your convenience! 

If you have any questions, feel free to contact our demo desk team.

Join us for Upcoming Sessions!


GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021

SEWP Contracts


Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - May 1, 2025

ESI BPA Contracts

Department of Defense ESI BPA Contract # N00104-12-A-ZF31

BPA # N00104-12-A-ZF31

State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021


Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: December 04, 2021 (with 5 option years)

NASPO ValuePoint

Multiple Participating State Addendums Term: through September 15, 2026

National Cooperative Purchasing Alliance (NCPA)

Term: through November 30, 2021

National Intergovernmental Purchasing Alliance (National IPA - TCPN)

Term: through November 30, 2021

North Carolina Mass Storage Contract 204J

Contract Number: 204J Term: through March 31, 2019

Orange County National IPA Co-Op

Through May 31, 2021


PEPPM PA - Central Susquehanna Intermediate Unit Term: Through December 31, 2018


PEPPM CA - Kern County Superintendent of Schools Term:Through December 31, 2018

State of New Mexico Contract

Contract Number: 80-000-18-00002 Contract Period: August 1, 2017 – August 1, 2021

Texas DIR-TSO-3149

DIR-TSO-3149 Contract Period: June 22, 2015 - June 22, 2019(with 1 option year)

Texas DIR-TSO-3926

Expiration Term: June 28, 2022 (with 3 option years)


Contract Number: UVA1482501 Term: May 2, 2014– December 19, 2021

Wisconsin Department of Administration

Contract Number: 50ENT-016-FIREEYE-01 Term: through May 5, 2021


Upcoming Events

September 23, 2020 at 11:00 PM PT
September 29, 2020 at 1:00 PM CT
October 14, 2020 at 2:00 PM ET

Archived Events


Latest News

Yesterday's buzzword has become today's security imperative, according to the department's CISO.
Carahsoft Technology Corp., The Trusted Government IT Solutions Provider®, today announced that it has been named Global Distributor of the Year by FireEye.
Ransomware attacks, continued disinformation campaigns and aggressive nation-state attacks threaten the November election.
Security experts tell The Cybersecurity 202 that Iran may be willing to cross dangerous boundaries in cyberspace.
FireEye advised CNN Business on Iran’s use of online information to support its geopolitical objectives.
Officials were still investigating the attack, which was consistent with the work of low-level Iranian nationalist hackers looking for easy American targets, experts said.
John Hultquist, senior director of intelligence analysis at FireEye Inc., talks about the concerns of an increase in Iranian cyber-attacks on U.S. businesses and government agencies. Shares of ...
Carahsoft Technology Corp., The Trusted Government IT Solutions Provider®, announced today that it has been named the 2018 U.S. Public Sector & Americas Distributor of the Year by FireEye.
MILPITAS, Calif.-- FireEye, Inc. (NASDAQ: FEYE), the intelligence-led security company, today ...



FireEye is helping agencies minimize the impact, downtime, and cost of a breach, and detecting or stopping Zero Day attacks in real-time.
Check out these resources that were available at FireEye's DoDIIS booth:M-Trends 2018How Government Agencies are Facing Cyber Security ChallengesHelixiSigh

The end of the year is an important time. In our personal lives we have plenty of holidays to celebrate and we get to spend extra time with those who are most important to us. In our professional lives—and in the cyber security industry, in particular—we get a chance to pause and think abou...

Solutions Brief

Solutions Brief
Today's threat landscape continues to evolve, making preventive measures less and less reliable for thwarting sophisticated attackers. The days of "smash-and-grab" attacks are over. Once inside the network, today's attackers are likely to remain active in the breached environment, conducting stealth...

The next generation of cyber attacks has changed radically and are targeted to get something valuable—sensitive, personal information, intellectual property, authentication credentials, and insider information. Each attack is multi-staged with steps to get in, to call back from the compromised net...


Lauren Burnell, FireEye’s US Public Sector Cloud Alliances Lead, hosted a webinar discussing:The challenges of securing the cloudThe role of analytics in detecting cloud compromisesCloud security best practices and developing a comprehensive cloud security planDefending the cloud with FireEye

Protect against signature-based and the latest unknown threats with an endpoint solution that gathers real-time intelligence from multiple sources.


Practical Guidance for Endpoint Protection, Hardening and ContainmentRansomware is a common method of cyber extortion or disruption for financial gain. This type of attack can instantly disrupt access to files, applications or systems until the victim pays the ransom (and the attacker restores acces...

Ransomware is a common method of cyber extortion or disruption for financial gain. This type of attack can instantly disrupt access to files, applications or systems until the victim pays the ransom (and the attacker restores access with a decryption key) or the organization restores and reconsti...

: In many ways, the public cloud is more secure than a traditional data center. Asset management, inventory, audit logging, two-factor access controls, connectivity redundancy, and firewalls are built into the cloud provider platform. Servers are easier to patch. And since implementations that are j...

Government networks and the critical infrastructure of elected officials around the world are under a constant state of attack. Even more so during the critical election periods. Threats continuously evolve as nation states, cyber criminals and hacktivists stress government cyber defenses to their b...