SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Case Study




Financial Services Company Chooses FireEye
After Competitive Comparison



                                                                                                                   Summary
     Company               S&P 500 Company

        Industry           Financial Services

   Description             Multinational financial services company

    Challenge              Provide protection against Web-based threats that elude traditional firewalls, antivirus and
                           intrusion prevention systems.

        Solution           FireEye Malware Protection System Appliance

        Benefits           Operationally-proven solution fills void in security portfolio to provide verified industry-leading
                           accuracy of detection and mitigation.




A member of the S&P 500 Index®, the company has almost 10,000 employees serving financial services markets
throughout North America, Latin America and Europe. Primarily focused on business customers, its broad portfolio of
products are commonplace components in the toolsets of the world’s leading financial institutions.

The inherent sensitivity of financial information imposes a significant responsibility on all parties entrusted with its
safekeeping. The company’s Chief Security Officer (CSO) elaborated, “The security of each client’s information is
fundamentally important to us. If there is even the merest hint of suspicion that customer details have been compro-
mised in any way, we risk erosion of the foundation of trust on which our company is built.”




“	 definitely feel that we’re getting extreme value for the money. The FireEye solution is filling a huge gap
 I
 that existed in our security architecture.”
 – 	S&P 500 Company Chief Security Officer



FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com
Case Study



Closing the IT Security Gap                                                    7000 appliance into their production environment for
                                                                               evaluation. Despite being installed inline, no discern-
The company had identified Web-based threats as a
                                                                               able impact on network latency was observed. For
likely major vector for data theft. With the perpetual
                                                                               comparison purposes, a competing Damballa prod-
escalation of Web-based threats and their increased
                                                                               uct also was placed into the diverse infrastructure to
sophistication this mandated the need to continually
                                                                               examine the same traffic. The two solutions were tested
evaluate the effectiveness of deployed security defenses.
                                                                               side-by-side for a period of six weeks.
The CSO described, “We had a very robust suite of
traditional tools, such as firewalls, intrusion prevention
                                                                               “We wanted to evaluate the solutions in a real world envi-
systems, antivirus and Web gateways. However, we
                                                                               ronment to see how they performed. We used fundamen-
knew there was a gap in our protection against zero-
                                                                               tal evaluation criteria, such as what was detected, how
day malware-based attacks. Our research showed that
                                                                               quickly things were detected, and the levels of accuracy
we needed a solution that wasn’t subjected to the
                                                                               to measure effectiveness. We looked closely at which
limitations of conventional signature-based analysis.”
                                                                               product legitimately found threats, versus generating false-
The company had a longstanding relationship with                               positives,” stated the company’s CSO.
Damballa Inc. The CSO recalled, “Having evaluated the
                                                                               The results proved to be overwhelming. “We irrefutably
Damballa product, we just didn’t feel confident that it
                                                                               saw a substantially higher caliber of results from the
gave us the level of protection that we were looking for.
                                                                               FireEye appliance over Damballa, and the statistics were
When we expanded our search, one name in particular
                                                                               very easy to substantiate. The FireEye solution found at
kept being mentioned as a leader in the field, and that
                                                                               least two to three times the number of legitimate threats
was FireEye.”
                                                                               than Damballa, even though Damballa generated far
He continued, “We had talked to Palo Alto Networks,                            greater volumes of alerts; in the vast majority of cases,
but didn’t feel comfortable with their approach: We                            these proved to be false-positives.”
are not a big believer in over-loading firewalls with tasks
they were not originally designed to perform because                           Accuracy
they provide sub-par results in those areas.”
                                                                               The detection capabilities of the FireEye Web MPS ap-
We examined the Secure Web Gateway product from                                pliance were so exacting that not a single false-positive
M86 and the IPS product from Sourcefire to round out                           was generated. The CSO commented, “This was fantastic
the evaluation process and found them inadequate to                            for us. We’re interested in quality, not quantity. There was
address our needs. Today’s Web-based threats evolve                            a huge gap between FireEye and Damballa: The in-
too quickly and are far too sophisticated to be detect-                        stances of threats found by the FireEye solution were real
ed by the approaches these companies offered.”                                 and because the FireEye appliance was deployed in-line,
                                                                               these attacks were blocked before entering the corpo-
                                                                               rate network to compromise the hosts. Our resources are
Real World Evaluation                                                          limited so having the level of detection accuracy and
Having decided that a FireEye solution would poten-                            being able to stop the attacks at the gate meant that we
tially meet all required criteria, the company deployed                        didn’t have to re-image the compromised system, which
a FireEye Web Malware Protection System (MPS) series                           was a huge operational cost savings for us.”



Key Components:
FireEye Web Malware Protection System



FireEye is the world leader in combating advanced malware, zero-day and targeted APT attacks that bypass
traditional defenses, such as Firewalls, IPS, AV, and Web gateways!
© 2011 FireEye, Inc. All rights reserved. FireEye, Inc. and all FireEye, Inc. products are either trademarks or registered trademarks of FireEye, Inc.
Other product and company names mentioned herein may be the trademarks of their respective owners. -- CS.SP50092011



FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com

Weitere ähnliche Inhalte

Andere mochten auch

ECE 313 WEEK 5 FINAL PROJECT
ECE 313 WEEK 5 FINAL PROJECTECE 313 WEEK 5 FINAL PROJECT
ECE 313 WEEK 5 FINAL PROJECThw soloutions
 
La tecnologia
La tecnologiaLa tecnologia
La tecnologiaValeOMG
 
대전오피 인천오피 분당오피 선릉역오피걸 무료성인자료
대전오피 인천오피 분당오피 선릉역오피걸 무료성인자료대전오피 인천오피 분당오피 선릉역오피걸 무료성인자료
대전오피 인천오피 분당오피 선릉역오피걸 무료성인자료lycttidl7
 
천안건마 역삼건마 《안양오피》 인천건마
천안건마 역삼건마 《안양오피》 인천건마천안건마 역삼건마 《안양오피》 인천건마
천안건마 역삼건마 《안양오피》 인천건마sfalzgyc5
 
Mid America Buying and Selling on eBay syllabus
Mid America Buying and Selling on eBay syllabusMid America Buying and Selling on eBay syllabus
Mid America Buying and Selling on eBay syllabusLisa Driskill
 
Barreras no arancelarias 2
Barreras no arancelarias 2Barreras no arancelarias 2
Barreras no arancelarias 2Kevin Tapia
 

Andere mochten auch (7)

ECE 313 WEEK 5 FINAL PROJECT
ECE 313 WEEK 5 FINAL PROJECTECE 313 WEEK 5 FINAL PROJECT
ECE 313 WEEK 5 FINAL PROJECT
 
56
5656
56
 
La tecnologia
La tecnologiaLa tecnologia
La tecnologia
 
대전오피 인천오피 분당오피 선릉역오피걸 무료성인자료
대전오피 인천오피 분당오피 선릉역오피걸 무료성인자료대전오피 인천오피 분당오피 선릉역오피걸 무료성인자료
대전오피 인천오피 분당오피 선릉역오피걸 무료성인자료
 
천안건마 역삼건마 《안양오피》 인천건마
천안건마 역삼건마 《안양오피》 인천건마천안건마 역삼건마 《안양오피》 인천건마
천안건마 역삼건마 《안양오피》 인천건마
 
Mid America Buying and Selling on eBay syllabus
Mid America Buying and Selling on eBay syllabusMid America Buying and Selling on eBay syllabus
Mid America Buying and Selling on eBay syllabus
 
Barreras no arancelarias 2
Barreras no arancelarias 2Barreras no arancelarias 2
Barreras no arancelarias 2
 

Mehr von FireEye, Inc.

Asia Pacific & The Security Gap: Don't Stand Still
Asia Pacific & The Security Gap: Don't Stand StillAsia Pacific & The Security Gap: Don't Stand Still
Asia Pacific & The Security Gap: Don't Stand StillFireEye, Inc.
 
EMEA & The Security Gap: Don't Stand Still
EMEA & The Security Gap: Don't Stand StillEMEA & The Security Gap: Don't Stand Still
EMEA & The Security Gap: Don't Stand StillFireEye, Inc.
 
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...FireEye, Inc.
 
M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点FireEye, Inc.
 
[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat PrognosisFireEye, Inc.
 
[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by AttackersFireEye, Inc.
 
M-Trends 2015: 최일선에서 본 관점
M-Trends 2015: 최일선에서 본 관점 M-Trends 2015: 최일선에서 본 관점
M-Trends 2015: 최일선에서 본 관점 FireEye, Inc.
 
M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点FireEye, Inc.
 
M-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du frontM-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du frontFireEye, Inc.
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses FireEye, Inc.
 
Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersFireEye, Inc.
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapFireEye, Inc.
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat FireEye, Inc.
 
M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails FireEye, Inc.
 
M-Trends® 2010: The Advanced Persistent Threat
 M-Trends® 2010: The Advanced Persistent Threat M-Trends® 2010: The Advanced Persistent Threat
M-Trends® 2010: The Advanced Persistent ThreatFireEye, Inc.
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey FireEye, Inc.
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...FireEye, Inc.
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response SurveyFireEye, Inc.
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of CompromiseFireEye, Inc.
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber SecurityFireEye, Inc.
 

Mehr von FireEye, Inc. (20)

Asia Pacific & The Security Gap: Don't Stand Still
Asia Pacific & The Security Gap: Don't Stand StillAsia Pacific & The Security Gap: Don't Stand Still
Asia Pacific & The Security Gap: Don't Stand Still
 
EMEA & The Security Gap: Don't Stand Still
EMEA & The Security Gap: Don't Stand StillEMEA & The Security Gap: Don't Stand Still
EMEA & The Security Gap: Don't Stand Still
 
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
 
M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点
 
[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis
 
[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers
 
M-Trends 2015: 최일선에서 본 관점
M-Trends 2015: 최일선에서 본 관점 M-Trends 2015: 최일선에서 본 관점
M-Trends 2015: 최일선에서 본 관점
 
M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点
 
M-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du frontM-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du front
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses
 
Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For Hackers
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security Gap
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat
 
M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails
 
M-Trends® 2010: The Advanced Persistent Threat
 M-Trends® 2010: The Advanced Persistent Threat M-Trends® 2010: The Advanced Persistent Threat
M-Trends® 2010: The Advanced Persistent Threat
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response Survey
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of Compromise
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 

Kürzlich hochgeladen

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 

Kürzlich hochgeladen (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

S&P 500 Company Chooses FireEye to Combat Web-based Threats

  • 1. Case Study Financial Services Company Chooses FireEye After Competitive Comparison Summary Company S&P 500 Company Industry Financial Services Description Multinational financial services company Challenge Provide protection against Web-based threats that elude traditional firewalls, antivirus and intrusion prevention systems. Solution FireEye Malware Protection System Appliance Benefits Operationally-proven solution fills void in security portfolio to provide verified industry-leading accuracy of detection and mitigation. A member of the S&P 500 Index®, the company has almost 10,000 employees serving financial services markets throughout North America, Latin America and Europe. Primarily focused on business customers, its broad portfolio of products are commonplace components in the toolsets of the world’s leading financial institutions. The inherent sensitivity of financial information imposes a significant responsibility on all parties entrusted with its safekeeping. The company’s Chief Security Officer (CSO) elaborated, “The security of each client’s information is fundamentally important to us. If there is even the merest hint of suspicion that customer details have been compro- mised in any way, we risk erosion of the foundation of trust on which our company is built.” “ definitely feel that we’re getting extreme value for the money. The FireEye solution is filling a huge gap I that existed in our security architecture.” – S&P 500 Company Chief Security Officer FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com
  • 2. Case Study Closing the IT Security Gap 7000 appliance into their production environment for evaluation. Despite being installed inline, no discern- The company had identified Web-based threats as a able impact on network latency was observed. For likely major vector for data theft. With the perpetual comparison purposes, a competing Damballa prod- escalation of Web-based threats and their increased uct also was placed into the diverse infrastructure to sophistication this mandated the need to continually examine the same traffic. The two solutions were tested evaluate the effectiveness of deployed security defenses. side-by-side for a period of six weeks. The CSO described, “We had a very robust suite of traditional tools, such as firewalls, intrusion prevention “We wanted to evaluate the solutions in a real world envi- systems, antivirus and Web gateways. However, we ronment to see how they performed. We used fundamen- knew there was a gap in our protection against zero- tal evaluation criteria, such as what was detected, how day malware-based attacks. Our research showed that quickly things were detected, and the levels of accuracy we needed a solution that wasn’t subjected to the to measure effectiveness. We looked closely at which limitations of conventional signature-based analysis.” product legitimately found threats, versus generating false- The company had a longstanding relationship with positives,” stated the company’s CSO. Damballa Inc. The CSO recalled, “Having evaluated the The results proved to be overwhelming. “We irrefutably Damballa product, we just didn’t feel confident that it saw a substantially higher caliber of results from the gave us the level of protection that we were looking for. FireEye appliance over Damballa, and the statistics were When we expanded our search, one name in particular very easy to substantiate. The FireEye solution found at kept being mentioned as a leader in the field, and that least two to three times the number of legitimate threats was FireEye.” than Damballa, even though Damballa generated far He continued, “We had talked to Palo Alto Networks, greater volumes of alerts; in the vast majority of cases, but didn’t feel comfortable with their approach: We these proved to be false-positives.” are not a big believer in over-loading firewalls with tasks they were not originally designed to perform because Accuracy they provide sub-par results in those areas.” The detection capabilities of the FireEye Web MPS ap- We examined the Secure Web Gateway product from pliance were so exacting that not a single false-positive M86 and the IPS product from Sourcefire to round out was generated. The CSO commented, “This was fantastic the evaluation process and found them inadequate to for us. We’re interested in quality, not quantity. There was address our needs. Today’s Web-based threats evolve a huge gap between FireEye and Damballa: The in- too quickly and are far too sophisticated to be detect- stances of threats found by the FireEye solution were real ed by the approaches these companies offered.” and because the FireEye appliance was deployed in-line, these attacks were blocked before entering the corpo- rate network to compromise the hosts. Our resources are Real World Evaluation limited so having the level of detection accuracy and Having decided that a FireEye solution would poten- being able to stop the attacks at the gate meant that we tially meet all required criteria, the company deployed didn’t have to re-image the compromised system, which a FireEye Web Malware Protection System (MPS) series was a huge operational cost savings for us.” Key Components: FireEye Web Malware Protection System FireEye is the world leader in combating advanced malware, zero-day and targeted APT attacks that bypass traditional defenses, such as Firewalls, IPS, AV, and Web gateways! © 2011 FireEye, Inc. All rights reserved. FireEye, Inc. and all FireEye, Inc. products are either trademarks or registered trademarks of FireEye, Inc. Other product and company names mentioned herein may be the trademarks of their respective owners. -- CS.SP50092011 FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com