Hi [[ session.user.profile.firstName ]]

FireEye Next-Generation Threat Protection

  • Date
  • Rating
  • Views
  • Privileged Accounts and the Cyber Attack Life Cycle Privileged Accounts and the Cyber Attack Life Cycle Adam Bosnian, EVP, Global Business Dev, CyberArk, Milan Gavran, TAP Sales Mgr, FireEye Recorded: May 24 2016 44 mins
    Mandiant Consulting’s 2016 M-Trends report once again shows that cyber attacks follow a regular pattern of crashing through perimeter defenses, obtaining a credential and then using the acquired access to move laterally throughout the network and escalate privileges to complete their primary objective. Once attackers obtain privileged credentials, they can slowly gain control of the entire organization’s IT environment.

    This session will focus on how attackers find their way to the heart of enterprises, the role privileged credentials (passwords and SSH keys) play in an active cyber attack, and how the integration of CyberArk Privileged Account Security Solution and the FireEye Threat Analytics Platform (TAP) can help organizations detect, alert and rapidly respond to cyber attacks.

    The audience will be walked through a few data breach examples and shown how combining intel from both systems is used to assist in detection and response acceleration. Attendees can expect to gain an advanced understanding of how they can start leveraging their enterprise-wide data and privileged threat analytics to quickly identify and disrupt the most critical in-progress attacks.

    Register today.
  • The Eye of The Security Cyberstorm The Eye of The Security Cyberstorm Chris Olive, Vormetric & Kevin Jackson, FireEye Recorded: May 11 2016 50 mins
    It doesn’t matter what industry vertical you are in or how big or small your business is, we are all plagued by the same concern, the security of your most valuable asset – your data. Moreover, the threat is sometimes the ones that you trust most, namely people that have access to your privileged information and data. This insider threat can be your customers, partners and even your employees that accidentally or purposefully release or acquire sensitive data and use it for something other than what it was meant for.

    Just imagine if you had a complete and panoramic scene sizeup along with the ability to proactively address potential threats of both the traditional threat vector of outsiders gaining information as well as the increasingly common and dangerous internal threat. Join us as we discuss this important topic as well as how you can ensure that your organization does not find itself in the eye of the security cyberstorm..
  • Relatório M-Trends 2016 Relatório M-Trends 2016 Luiz Eduardo Dos Santos, Diretor Técnico da FireEye para a América Latina Recorded: Apr 14 2016 59 mins
    Em 2015, os consultores da Mandiant, uma empresa da FireEye, respondeu um grande número de incidentes cibernéticos causados por grupos de ciber-criminosos espalhados por todo o mundo. Com base nessa experiência, os consultores criaram um relatório especial conhecido como M-Trends 2016 focado no que vem acontecendo no panorama das ameaças.
    Participe juntamente com o Diretor Técnico da FireEye para a América Latina, Luiz Eduardo Dos Santos neste webinário onde ele apresentará:
    •As principais descobertas das investigações da Mandiant em 30 verticais distintos
    •Tendências e dados que suportam a evolução dos grupos de ameaças no ultimo ano
    •Campanhas para efetuar o roubo de dados pessoais/confidenciais das organizações
    •Ataques diretamente a dispositivos de redes, - roteadores, switches e firewalls
    Aprenda como melhor analisar e responder às técnicas de persistência de malwares em 2016.
    Inscreva-se hoje.

    Equpe da FireEye
  • Informe M-Trends 2016 Informe M-Trends 2016 Luiz Eduardo Dos Santos, Director Tecnico de LatinoAmerica de FireEye Recorded: Apr 13 2016 62 mins
    En 2015, los consultores Mandiant, una empresa de FireEye, respondieron a una amplia variedad de incidentes cibernéticos creadas por grupos de atacantes alrededor del mundo. Con base en esa experiencia, los consultores crearon un informe especial titulado M-Trends 2016 que muestra cual es la prespectiva con respecto al panorama de las amenazas.

    Únase al Director Tecnico de LatinoAmerica de FireEye, Luiz Eduardo Dos Santos en este seminario donde abordara los siguientes puntos:
    • Las principales conclusiones de las investigaciones Mandiant a través de 30 industrias
    • Tendencias y datos que apoyan la forma avanzada que los ciber-criminales han evolucionado a lo largo del año pasado
    • Campañas para robar información personal
    • Los ataques a dispositivos de redes empresariales-routers, switches y firewalls
    Aprende a analizar y responder mejor a las técnicas de persistencia de malware en 2016.

    Regístrese hoy.

    El equipo de FireEye
  • Inflection Point: Sandworm Team and the Ukrainian Power Outages Inflection Point: Sandworm Team and the Ukrainian Power Outages Dan Scali, Sr. Mgr., ICS Security (Mandiant), Sean McBride, Critical Infrastructure Lead (iSIGHT) Recorded: Mar 8 2016 57 mins
    In the first publicly documented power outage attributed to a cyber attack, the Russian-nexus Sandworm Team caused blackouts in several regions of Ukraine. iSIGHT Partners has tracked this group since October 2014, documenting its targets, tools, attack infrastructure and motivations. In August 2015 we noted Sandworm had infiltrated Ukrainian electricity providers; and, in November we warned that Ukraine was a hot spot for ICS-related activity.
    In this Webinar, Sean McBride, Critical Infrastructure Lead Analyst, and Dan Scali, Senior Manager of Mandiant’s ICS Security Consulting Practice, will tell you what happened to the victim utilities and what could have been done to prevent it.
  • Healthcare Webcast:   So Many Devices, So Much Risk Healthcare Webcast: So Many Devices, So Much Risk Asad Baheri, Product Sales Specialist, Mobile Threat Prevention Recorded: Nov 18 2015 51 mins
    Mobile devices are ubiquitous in today's society. The number and types of devices used by physicians, nurses, clinicians, specialists, administrators, and staff – as well as patients and visitors – are growing at healthcare organizations across the country. Providing anywhere/anytime network access is essential, particularly when instant communication is required to ensure quality patient care. But the mobile devices are launched daily with upgraded versions of operating systems that are ripe for infection.

    FireEye Mobile Threat Prevention identifies and stops mobile threats. Rather than relying on signatures, which are powerless against today’s constantly changing threats, FireEye Mobile Threat Prevention executes applications within the FireEye MVX engine to protect mobile devices against compromise.

    During this webcast, we will discuss the benefits of a mobile security strategy and identify how FireEye Mobile Threat Prevention (MTP):

    - Offers real-time visibility of threats on mobile devices
    - Displays play-by-play analysis of suspicious applications
    - Provides an index of pre-analyzed applications
    - Generates threat assessments for custom applications.

    Join our webcast today to hear about the latest developments in mobile threats for healthcare.
  • When Things Get Reel---You Just Got Phished When Things Get Reel---You Just Got Phished Alec Randazzo, Sr. Incident Response Consultant, DJ Palombo, Consultant, Mandiant Recorded: Nov 10 2015 61 mins
    Email is an essential tool of today’s business. In 2012, firms sent and received an estimated 89 billion emails every day. Email has also become a vector for cyber crime; phishing emails—with and without correct spelling—account for a significant portion of today’s attacks.

    What happens when a targeted victim falls for a phish email and the attacker gains access to a network? Alec Randazzo and DJ Palombo from the Mandiant incident response team will examine an attacker’s step-by-step process, using real world examples. Recommendations will be provided on how to limit an attacker’s success within a network.

    Join us for this webinar to gain critical insights from our experts in the field.
  • Zero Day, Zero Effect: Examining the Clandestine Wolf Zero-Day Zero Day, Zero Effect: Examining the Clandestine Wolf Zero-Day Ben Withnell, Incident Analyst, FireEye as a Service Recorded: Sep 22 2015 43 mins
    Triage and remediation of attacks utilizing zero-day vulnerabilities requires technology, intelligence, and expertise that is often beyond the capabilities of most security teams today. With Clandestine Wolf, the name our security team gave to a recent zero-day campaign exploiting an Adobe Flash vulnerability, our analysts were able to validate the alert and begin response within minutes after first observing the attack.
    In this webinar Ben Withnell, a FireEye as a Service (FAAS) incident analyst, will discuss how the Clandestine Wolf campaign was discovered, triaged, and remediated across the FireEye as a Service customer base. Throughout the webinar he will also share his insights into how our analysts handle APT threats, the attacker lifecycle, and remediation tactics.

    Register today for this exclusive insight!
  • The Email Threat Vector – Defending Your Users from Targeted Attacks The Email Threat Vector – Defending Your Users from Targeted Attacks Brian Schwarz, FireEye Product Manager Recorded: Aug 13 2015 42 mins
    Do you want to stop the complaints from upper management about malicious emails slipping through your current antivirus and antispam gateways? Has your IT team had enough of dealing with scourges such as CyptoWall? Are you tired of hearing that the “next big thing” from various IT security vendors will solve these problems only to see the products fail when put to the test? If you have any or all of these problems, this webinar is for you.

    According to Verizon’s 2015 Data Breach Investigations Report, 77% of infections originate from emails containing malicious attachments or URLs–emails that should be stopped at the perimeter. FireEye can make that happen.

    Join us on August 13 for a demonstration of how our proven Multi-Vector Virtual Execution (MVX) technology can help protect your organization from known and unknown threats. The webinar will also cover the threat landscape and provide information on:

    •How FireEye’s MVX behavior analysis technology works
    •What differentiates FireEye’s MVX technology from the traditional signature-based antivirus approach
    •How FireEye can protect your email in the cloud and in your data center

    As always, we’ll leave plenty of time for Q&A. Register today.

    The FireEye Team
  • Stop Cyber Attacks Where They Start: How to Fortify Your Endpoint Security Stop Cyber Attacks Where They Start: How to Fortify Your Endpoint Security Rajiv Raghunarayan, Director, Product Marketing, Dan Reis, Endpoint Director Recorded: Jul 30 2015 50 mins
    Traditional endpoint solutions were designed to deal with static, known threats. They accumulate large threat databases and signatures and when matches are found the threat is blocked. This approach simply does not work against today’s advanced and unknown attacks. And while organizations must protect every single endpoint, both traditional and mobile, an attacker only needs to compromise one to cause damage. Register now for this webinar where you will:
    • Learn why protecting the multitude of endpoints is an on-going challenge
    • Find out the importance behind detection and containment on all types of endpoints from PC to mobile
    • Hear how FireEye offerings can help proactively protect against unknown threats on the endpoint

Embed in website or blog