FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 7,900 customers across 103 countries, including more than 50 percent of the Forbes Global 2000.
FireEye Email Security detects and blocks every kind of unwanted email, especially targeted advanced attacks. Time and again, this solution has proven itself capable of detecting corporate email threats in traffic accepted as safe by other products.
FireEye Helix is a cloud-hosted security operations platform that allows organizations to take control of any incident from alert to fix. FireEye Helix integrates disparate security tools and augments them with next generation SIEM, orchestration and threat intelligence capabilities to capture the untapped potential of security investments.
Expertise On-Demand is a prepaid, annual subscription that provides flexible, pay-per-use access to FireEye’s industry-recognized security expertise and threat intelligence. Our flexible consumption model provides a unique option for extending your security operations capability and capabilities with the experts you need, when you need them most.
FireEye Network Security is an advanced threat protection and breach detection solution with visibility into the world’s most sophisticated attacks. Built on the patented multi-vector virtual execution (MVX) engine, Network Security can analyze traffic in ways no other company can match.
Mandiant provides world-reknowned incident response and assessment, enhancement and transformation consulting services to help protect vital organizational assets. Mandiant reduces business risk with a deep understanding of attacker behavior, unmatched threat intelligence, and purpose-built technology.
SELECT Resource_ID, Title, Vendor, Vertical, Type, DateAdded, Path, Linktype, InvisibleBit, FeaturedEnd, FeaturedBit, Description, CustomLogo, LegacyLink, Form FROM Resources WHERE Vendor = ? AND InvisibleBit = 0 ORDER BY FeaturedBit DESC, Type ASC