FireEye

FireEye

Document request

If you would like the following materials, please proceed to the application form.

  Document content
white paper [Email Security] Protect each store with FireEye's email threat protection940KB /2P PDF
FireEye's Approach to Effective Cloud Security3.42MB /8P PDF
Countering Sophisticated Cyberattacks vs. Real Issues in Security Operations -Enhanced Security and Operational Efficiency with FireEye Helix- 2.78MB/9P PDF
Email security measures realized by FireEye Email Security5.74MB/16P PDF
[Email Security] A must-see for companies that have introduced Office365! What cloud email security should be implemented now3.14MB/10P PDF
Many cyber crimes are said to start with emails. Although companies have introduced email security products and are taking countermeasures, attackers are still trying to infiltrate their systems using all possible means. In particular, the number of companies using Office365 has increased significantly, and simultaneous attacks are being carried out against multiple targets. In this article, we will analyze the actual situation of targeted attacks and the gap between current security measures, and introduce an effective FireEye Email Security solution for companies that are considering introducing Office365.
[E-mail Security] Selection Guide for E-mail Security - Determining a Secure E-mail Gateway (SEG) You Can Really Rely On 654KB/10P PDF
[Email Security] Email Threat Report 2019 Q1 Statistics Revealed1.72MB/16P PDF
[Email Security] E-Mail & Threat Prevention "Email Security Series (Appliance)" "ETP Series (Cloud)" 615KB/2P PDF
[E-mail Security] The number of unknown threats is increasing, and targeted e-mail attacks are becoming more sophisticated .
[Security operation] Security automation makes operation easier! How to proceed with a successful SOAR introduction828KB /13P PDF
In recent years, cyber threats such as targeted attacks have become more sophisticated, increasing the burden on security operations. The skills required of people in charge are becoming more sophisticated, and the current situation is that they are approaching their limits both physically and mentally. As one of the solutions, the automation of security operations by SOAR (Security Orchestration and Automated Response) is attracting attention. SOAR is a security operation platform that works with various security products. By introducing SOAR, companies can obtain many benefits such as "automation of operations", "speeding up incident response", and "resolving lack of skills".
Among the various benefits, this document focuses on "automation of operations" and organizes the security operation issues surrounding companies. We will explain in an easy-to-understand manner how to proceed with the smooth introduction of SOAR for
[Security Operations] SIEM: Breaking Away from "Werewolf Boy" Finding True Alerts and Realizing Efficient Security Operations540KB /7P PDF
[Cloud Security] "5 Urban Legends of Cloud Security" that you should know before working on cloud security 730KB/8P PDF
[Security Trends] M-Trends 2020 7.55MB/60P PDF
For over 15 years, FireEye has been involved in detecting and responding to cyberattacks every day. M-Trends® 2020, now in its 11th year of release, brings insights from the front lines of these attacks to the cyber security industry.
[FireEye products] Differences between 4th and 5th generation0.98MB /12P PDF
Products called FireEye's 4th generation have been discontinued on November 15, 2017, and will be replaced by new generation 5th generation products from 2017. In the 5th generation, power consumption is suppressed and it has evolved to support MAC OS. This time, we will include a comparison table for equipment specifications, so please refer to it. (Detailed function introduction will be announced in a separate document.)
The key to EDR, which is indispensable for countering the latest threats, is "operation" - MDR service that reduces operational load and eliminates threats from the root - 1.67MB/2P PDF