• slide
  • slide

Overview

FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant® consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 7,900 customers across 103 countries, including more than 50 percent of the Forbes Global 2000.

Products

Demo Desk

FireEye Demo Desk

In today's age where all of our most critical information is stored digitally and having a security posture that can only defend based off known signatures is not enough. Enterprises must be able to implement proactive defensive capabilities, while also engaging in threat hunting for the latest cyber-attacks. Our experts' knowledge of the threat landscape provides best-of-breed intelligence that feeds into our security platform.

Join us for our monthly demo to  learn more of what you can do with FireEye with topics including FireEye Threat Intelligence, Expertise-On-Demand, and Email, Endpoint and Network Security. Our demo desks are only 30 minutes so you can quickly get back to your busy day. Accidentally miss a session? We host two a month for your convenience! 

If you have any questions, feel free to contact our demo desk team.

Join us for Upcoming Sessions!

Contracts

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021


SEWP Contracts

SEWP V

Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - May 1, 2025


ESI BPA Contracts

Department of Defense ESI BPA Contract # N00104-12-A-ZF31

BPA # N00104-12-A-ZF31


State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021

CMAS

Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

NASPO ValuePoint

Term: through September 15, 2026

National Cooperative Purchasing Alliance (NCPA)

Term: through November 30, 2021

National Intergovernmental Purchasing Alliance (National IPA - TCPN)

Term: through November 30, 2021

North Carolina Mass Storage Contract 204J

Contract Number: 204J Term: through March 31, 2019

Orange County National IPA Co-Op

Through May 31, 2020 (with 2 option years)

PEPPM

PEPPM PA - Central Susquehanna Intermediate Unit Term: Through December 31, 2018

PEPPM CA

PEPPM CA - Kern County Superintendent of Schools Term:Through December 31, 2018

State of New Mexico Contract

Contract Number: 80-000-18-00002 Contract Period: August 1, 2017 – August 1, 2021

Texas DIR-TSO-3149

DIR-TSO-3149 Contract Period: June 22, 2015 - June 22, 2019(with 1 option year)

Texas DIR-TSO-3926

Expiration Term: June 28, 2022 (with 3 option years)

VASCUPP

Contract Number: UVA1482501 Term: May 2, 2014– December 19, 2021

Wisconsin Department of Administration

Contract Number: 50ENT-016-FIREEYE-01 Term: through May 5, 2021


Events

Archived Events

News

Latest News

Carahsoft Technology Corp., The Trusted Government IT Solutions Provider®, today announced that it has been named Global Distributor of the Year by FireEye.
READ MORE >
Ransomware attacks, continued disinformation campaigns and aggressive nation-state attacks threaten the November election.
READ MORE >
Security experts tell The Cybersecurity 202 that Iran may be willing to cross dangerous boundaries in cyberspace.
READ MORE >
FireEye advised CNN Business on Iran’s use of online information to support its geopolitical objectives.
READ MORE >
Officials were still investigating the attack, which was consistent with the work of low-level Iranian nationalist hackers looking for easy American targets, experts said.
READ MORE >
John Hultquist, senior director of intelligence analysis at FireEye Inc., talks about the concerns of an increase in Iranian cyber-attacks on U.S. businesses and government agencies. Shares of ...
READ MORE >
Carahsoft Technology Corp., The Trusted Government IT Solutions Provider®, announced today that it has been named the 2018 U.S. Public Sector & Americas Distributor of the Year by FireEye.
READ MORE >
MILPITAS, Calif.-- FireEye, Inc. (NASDAQ: FEYE), the intelligence-led security company, today ...
READ MORE >

Resources

Resources

FireEye is helping agencies minimize the impact, downtime, and cost of a breach, and detecting or stopping Zero Day attacks in real-time.
Check out these resources that were available at FireEye's DoDIIS booth:M-Trends 2018How Government Agencies are Facing Cyber Security ChallengesHelixiSigh

The end of the year is an important time. In our personal lives we have plenty of holidays to celebrate and we get to spend extra time with those who are most important to us. In our professional lives—and in the cyber security industry, in particular—we get a chance to pause and think abou...

Solutions Brief

new-fireeye.png
Solutions Brief
Today's threat landscape continues to evolve, making preventive measures less and less reliable for thwarting sophisticated attackers. The days of "smash-and-grab" attacks are over. Once inside the network, today's attackers are likely to remain active in the breached environment, conducting stealth...

The next generation of cyber attacks has changed radically and are targeted to get something valuable—sensitive, personal information, intellectual property, authentication credentials, and insider information. Each attack is multi-staged with steps to get in, to call back from the compromised net...

Video

Lauren Burnell, FireEye’s US Public Sector Cloud Alliances Lead, hosted a webinar discussing:The challenges of securing the cloudThe role of analytics in detecting cloud compromisesCloud security best practices and developing a comprehensive cloud security planDefending the cloud with FireEye

Protect against signature-based and the latest unknown threats with an endpoint solution that gathers real-time intelligence from multiple sources.

Whitepaper

Practical Guidance for Endpoint Protection, Hardening and ContainmentRansomware is a common method of cyber extortion or disruption for financial gain. This type of attack can instantly disrupt access to files, applications or systems until the victim pays the ransom (and the attacker restores acces...

Ransomware is a common method of cyber extortion or disruption for financial gain. This type of attack can instantly disrupt access to files, applications or systems until the victim pays the ransom (and the attacker restores access with a decryption key) or the organization restores and reconsti...

: In many ways, the public cloud is more secure than a traditional data center. Asset management, inventory, audit logging, two-factor access controls, connectivity redundancy, and firewalls are built into the cloud provider platform. Servers are easier to patch. And since implementations that are j...

Government networks and the critical infrastructure of elected officials around the world are under a constant state of attack. Even more so during the critical election periods. Threats continuously evolve as nation states, cyber criminals and hacktivists stress government cyber defenses to their b...