FireEye Delivers Proactive OT Environment Protection with New Cyber Physical Threat Intelligence Subscription

FireEye, Inc. (NASDAQ: FEYE), the intelligence-led security company, today announced the availability of FireEye® Cyber Physical Threat Intelligence. The new subscription provides context, data and actionable analysis on threats to cyber physical systems, including operational technology (OT), industrial control systems (ICS), Internet of Things (IoT) and other equipment used to manage interconnected physical processes.

Detecting Attacks at the Intersection of Virtual and Physical Worlds

“While the intersection of the virtual and physical worlds has led to revolutionary connectivity and instrumentation, these benefits also introduce new and complex risks,” said Sandra Joyce, SVP of Global Intelligence at FireEye. “For organizations tasked with maintaining the security and continuity of these systems, FireEye Cyber Physical Threat Intelligence provides an early warning on critical vulnerabilities, and actionable intelligence on the adversaries targeting them.”

The subscription delivers in-depth analysis on cyber physical-focused malware and malicious tactics, techniques and procedures (TTPs), threat actors, threat activity, vulnerabilities and strategic insights. This reporting is derived from frontline findings of industry-leading threat intelligence experts and FireEye Mandiant® engagements, as well as deployed FireEye technology and an extensive worldwide network of FireEye sensors.

Details on all available FireEye Threat Intelligence subscriptions can be found at: https://www.fireeye.com/solutions/cyber-threat-intelligence/threat-intelligence-subscriptions.html

OT Security: The FireEye Approach

Over the past 15 years of responding to and analyzing many of the world’s most high-profile attacks, FireEye has observed a consistent pattern across almost all OT security incidents – the significant overlap across TTPs utilized by threat actors targeting both IT and OT networks. Expertise in responding to thousands of intrusions and a unique understanding of the full attack lifecycle have shaped the FireEye philosophy that visibility into network traffic and endpoint behaviors is as critical in preventing pivots to key assets in the OT network as in IT security. By drawing parallels between these intrusion methods, detection opportunities can be identified earlier.

FireEye offers organizations an end-to-end solution for ICS and OT, inclusive of threat intelligence, consulting, and Managed Detection and Response (MDR) services. This combination of in-depth insight into ICS threats, custom risk ratings with actionable recommendations, and continuous threat detection, asset modeling, and direct collaboration with FireEye OT security experts during high priority incidents presents a powerful way to identify areas of concern and accelerate response.

For more on how FireEye approaches OT security, please visit this blog post: https://www.fireeye.com/blog/threat-research/2019/12/fireeye-approach-to-operational-technology-security.html

About FireEye, Inc.

FireEye is the intelligence-led security company. Working as a seamless, scalable extension of customer security operations, FireEye offers a single platform that blends innovative security technologies, nation-state grade threat intelligence, and world-renowned Mandiant consulting. With this approach, FireEye eliminates the complexity and burden of cyber security for organizations struggling to prepare for, prevent, and respond to cyber attacks. FireEye has over 8,500 customers across 103 countries, including more than 50 percent of the Forbes Global 2000.

© 2019 FireEye, Inc. All rights reserved. FireEye and Mandiant are registered trademarks or trademarks of FireEye, Inc. in the United States and other countries. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.

Contacts:

Media Inquiries:
Media.Relations@FireEye.com

Data & News supplied by www.cloudquote.io
Stock quotes supplied by Barchart
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms and Conditions.