v

FireEye Cyber Security Platform Overview

 

차세대 위협방지시스템

Next Generation Threat Prevention System

 

파이어아이는 전 세계적으로 분포된 보안 운영 센터를 통해 파이어아이의 독자적인 기술과 인텔리전스, 그리고 전문성을 기반으로 한 위협 분석 전문가의 지원을 받아 기업 보안에 위협을 가하는 공격자를 찾아 방어를 할 수 있도록 해줍니다.

Advanced Persistent Threats Break Through Traditional Network Security

기존의 방화벽, NGFW, IPS, AV, Gateways 같이 signature 기반의 보안Tool들은 날마다 새롭게 발생하고 있는 Advanced Malware의 공격에 끌려 다닐수 밖에 없습니다. FireEye 플랫폼은 특허 받은 최신의 MVX엔진(Multi-Vector Virtual Execution engine)을 기반으로 기존의 보안Tool로는 방어할 수 없는 APT(advanced persistent threat) 와 같은 진화된 사이버공격에 효과적으로 대응합니다.

 

Threat Prevention Platforms 제품군

  • Network Security (NX Series)
  • Email Security (EX Series)
  • Content Security (FX Series)
  • Endpoint Security (HX Series) 

FireEye Platform Supplements Traditional Security Defenses

v How FireEye Stops Cyber Attacks (FireEye Platform)

 

Today's cyber threat landscape is rapidly evolving. Nation-state threat actors, well-funded attack campaigns, highly motivated adversaries, and extremely sophisticated attacks have become daily headlines. This new generation of threat actors and advanced attackers are highly targeted and focused on acquiring something valuable and vital to your organization, such as sensitive personal information, intellectual property, or insider information. These targeted attacks occur across all industries, and are stealthy and persistent enough to go undetected by traditional security technologies, such as next-generation firewalls, traditional IPS, anti-virus, and secure email or Web gateways.

In order to combat these advanced attacks and persistent adversaries organizations need to reimagine security and adopt a Continuous Threat Protection model. This means having the ability to detect threats in real time as well as reduce the time to contain and resolve the threat, thereby preventing or minimizing the business impact of these threats. The FireEye Platform does this with a multi-faceted approach to security – Prevent, Detect, Contain, Resolve.

  • Prevent Prevention must enable real-time, proactive blocking and provide rich and actionable intelligence to better understand the nature of attacks for continuous improvement of the security posture.
  • Detect - Today’s advanced threats require an architecture that is aware of the multi-stage and multi-vector nature of attacks. The security solution should be able to detect known and unknown threats in real time and be able to scale with the demands of the network.
  • Contain - Effective containment demands real-time validation of threats coupled with the ability to rapidly stop the impact of an attack on compromised systems.
  • Resolve - To limit exfiltration and serious business impact, security incidents must be investigated, scoped, and resolved in a timely and cost effective way.

The FireEye Platform provides products, people, and intelligence to deliver the industry’s first continuous threat protection model. The global, real-time platform prevents, detects, contains, and resolves advanced threats to help secure brands, intellectual property, and data.

 

v

FireEye NX series (Network Security)

 

The FireEye Network Threat Prevention Platform stops network-based attacks missed by traditional technologies, such as next-generation firewalls (NGFW), IPS, AV, and Web gateways. FireEye Network protects against zero-day Web exploits and multi-protocol callbacks to keep sensitive data and systems safe. Advanced targeted attacks use the Web as a primary threat vector to compromise key systems, perform reconnaissance on existing defenses, establish long-term control and access to networked systems, and exfiltrate data.

 
v

FireEye EX series (Email Security)

 

The FireEye EX series is a group of threat prevention platforms that protects against advanced email attacks. Organizations have been facing threats from email-based spam and viruses for a long time. However, recently spear-phishing attacks have soared in popularity with the availability of user-specific information on social networks and other Internet resources. With all of the personal information available online, a criminal can socially engineer almost any user into clicking a URL or opening an attachment with a zero-day exploit, and the cybercriminal quickly gets control of a privileged system and user accounts.

 

경기 성남 분당구 판교역로 180 (삼평동, 알파타워 1003호) T : 070-7815-8819 F : 070-7815-8872
Copyright by ebm.co.kr. All Rights Reserved.