FireEye Next-Generation Threat Protection

Channel profile:

The leading provider of next generation threat protection

FireEye is the world leader in combating advanced malware, zero-day and targeted attacks that bypass traditional defenses, such as firewalls, IPS and antivirus.

Subscribers (19,172)
Stop Cyber Attacks Where They Start: How to Fortify Your Endpoint Security Rajiv Raghunarayan, Director, Product Marketing, Dan Reis, Endpoint Director Traditional endpoint solutions were designed to deal with static, known threats. They accumulate large threat databases and signatures and when matches are found the threat is blocked. This approach simply does not work against today’s advanced and unknown attacks. And while organizations must protect every single endpoint, both traditional and mobile, an attacker only needs to compromise one to cause damage. Register now for this webinar where you will:
• Learn why protecting the multitude of endpoints is an on-going challenge
• Find out the importance behind detection and containment on all types of endpoints from PC to mobile
• Hear how FireEye offerings can help proactively protect against unknown threats on the endpoint
Read more >
Jul 30 2015
50 mins
Play
  • Live and recorded (79)
  • Upcoming (2)
  • Date
  • Rating
  • Views
  • Traditional endpoint solutions were designed to deal with static, known threats. They accumulate large threat databases and signatures and when matches are found the threat is blocked. This approach simply does not work against today’s advanced and unknown attacks. And while organizations must protect every single endpoint, both traditional and mobile, an attacker only needs to compromise one to cause damage. Register now for this webinar where you will:
    • Learn why protecting the multitude of endpoints is an on-going challenge
    • Find out the importance behind detection and containment on all types of endpoints from PC to mobile
    • Hear how FireEye offerings can help proactively protect against unknown threats on the endpoint
  • How can your company ensure all threat vectors are protected? In this webinar you will:

    - Find out what it takes to secure your organization from today’s evasive advanced cyber threats
    - Discover how to detect blended attacks that point products miss
    - Learn how to safeguard your intellectual property, critical infrastructure, and customer records from multi-vector, targeted attacks
    - Understand how to respond to incidents faster by reducing the number of false positives your security team has to sift through
    - Get introduced to the FireEye products that can help achieve enterprise network security
  • In this webinar, we will discuss the healthcare industry threat landscape. In the past year alone, attacks against the healthcare industry have skyrocketed and the threat landscape has shifted.

    Join us as we discuss the following:

    •The current threat landscape
    •Observation on the security posture of the healthcare industry
    •Attacker tactics targeted at the healthcare industry
    •A case study of a healthcare breach
    •The threat horizon for the healthcare industry
    •Lessons learned from the latest healthcare breaches

    Register today!
  • Most of us rely on mobile apps for everything from banking to buying and messaging to mapping our route. Mobile devices are the go-to source to do work, watch videos, play games and—oh yes—even speak with another person.

    But every time we download or use a new app to simplify our lives, we run the risk of a hacker accessing our data. A recent FireEye Special Report, Out of Pocket: A Comprehensive Mobile Threat Assessment of 7 Million iOS and Android Apps – is a revealing look at today’s top mobile app threats on two of the most widely used platforms. The report outlines the real risks associated with mobile apps and their implications to privacy, corporate data and security.

    Join our industry experts for this interactive session to learn:
    -Key Android and iOS threats based on the analysis of 7 million
    mobile apps
    -Trends in mobile app behaviors
    -The impact of targeted malware and vulnerabilities
    -Takeaways security leaders can implement to make devices more
    secure in the workplace

    Be prepared for the next wave of mobile cyberattacks. Register today to gain insight from FireEye’s latest report and our mobile subject matter experts!

    The FireEye Team
  • Join FireEye Labs Advanced Reverse Engineering (FLARE) team members Matt Graeber and Dimiter Andonov for another exciting deep dive on new malware case studies found during Mandiant investigations. FLARE is dedicated to malware analysis and the development of tools to assist reverse engineering. The two malware they’ll dissect as part of this interactive discussion include:

    1.Steganogram Shellcode Backdoor - The malware is a downloader and launcher that uses steganography to extract shellcode, commands, and data from PNG images. Which results in advanced modular backdoor capable of collecting wide range information related to the compromised system and executing even more shellcode!
    2.Hybrid 32/64-bit Malware - The malware mixes 32-bit and 64-bit code to inject into the explorer.exe process depending upon the target architecture. We’ll show how this broke our malware tools and our solution.

    Register today!
  • Your adversaries are people: creative, nimble and persistent. They can bypass conventional security deployments almost at will, breaching systems in a wide swatch of industries and geographies.

    Technology alone will not defeat a determined attacker. You need a strategic defense partner that combines the most advanced technology platform with the leading cyber security expertise and the latest global threat intelligence from around the world. FireEye as a Service (FaaS) does exactly this, and allows you to detect, prevent, analyze, and respond to security incidents in minutes rather than months.

    Join FireEye, VP, CTO - Americas Josh Goldfarb, as he explores:

    - The current state of cybersecurity and the new threat landscape
    - The failure of traditional defense models in the face of a new adversary
    - The value of an Adaptive Defense strategy and working with a trusted partner
    - Real-world case studies

    As always, we will save plenty of time for Q&A. Be sure to register now to take part in this critical webinar.
  • Well-maintained perimeter defenses are a key part of any security strategy. Organizations increasingly recognize that they must also complement their perimeter defenses with strong forensics capabilities to investigate and analyze attacks. When attacked, an enterprise needs to be able to rapidly investigate and determine the scope and impact of the incident so they can effectively contain the threat and secure their network.
    In interactive this session, you will learn about:
    • The key use cases for network forensics
    • The typical organization that acquires network forensics technologies
    • How FireEye Enterprise Forensics enables the proper response to today’s cyber attacks
  • FireEye recently released a new report that documents how and why governments around the world are turning to the cyber domain as a cost-effective way to spy on other countries, steal technology, and even wage war.

    Whether it’s sensitive military, diplomatic, or economic information, governments depend on the integrity of their data. If that data falls into the wrong hands, the consequences could be severe.

    In the wake of two apparent state- and government-sponsored attacks, APT1 and APT28, government agencies must understand why they are in attackers’ crosshairs, what attackers might be seeking, and how they can protect themselves.

    Join us for a dynamic discussion with subject matter experts where you will learn:

    •What makes your government-related organization an appealing target – whether you’re a political opponent, business, agency or vendor
    •Why it’s important to determine who could be planning an attack, their motives, and how they might carry out their goals
    •How to assess your level of preparedness and how to protect yourself if you are not ready for this new era of cyber warfare
  • FireEye recently released a new report “Behind the Syrian Conflict’s Digital Frontlines” that documents a well-executed hacking operation that successfully breached the Syrian opposition.

    Between at least November 2013 and January 2014, the hackers stole a cache of critical documents and Skype conversations revealing the Syrian opposition’s strategy, tactical battle plans, supply needs, and troves of personal information and chat sessions. This data belonged to the men fighting against Syrian President Bashar al-Assad’s forces as well as media activists, humanitarian aid workers, and others within the opposition located in Syria, the region and beyond.

    We have only limited indications about the origins of this threat activity. Our research revealed multiple references to Lebanon both in the course of examining the malware and in the avatar’s social media use. While we do not know who conducted this hacking operation, if this data was acquired by Assad’s forces or their allies it could confer a distinct battlefield advantage.

    Join us for a roundtable discussion with subject matter experts where we’ll talk about the details of the report and explore surrounding topics, to include:

    • An overview of the conflict in Syria and why cyber-espionage is an increasingly important factor
    • An in-depth analysis of a critical breach of the Syrian opposition including an overview of the tools and techniques used by the threat actors

    All webinar attendees will receive a free copy of the new Syrian report. Register today!
  • From Cryptolocker to the Apple iOS vulnerability, there have been numerous high-profile breaches in 2014. With the ever-changing threat landscape and advanced cyber attacks showing no sign of slowing down, organizations need to be prepared as we head into 2015.

    Join our live webinar where Bryce Boland, CTO for Asia Pacific at FireEye, will share top, global security predictions and challenges for 2015. In this webinar:
    •Find out the top 10 security predictions for 2015 and how they impacts organizations
    •Discover the data that drove these predictions
    •Learn about key strategies to take a proactive stance against advanced attacks

Embed in website or blog