SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Case Study




U.C. Berkeley EECS Engages FireEye for
Advanced Malware Protection


                                                                                                                    Summary
     Company               University of California Berkeley

        Industry           Education

   Description             The University of California, Berkeley is internationally recognized for excellence and pioneering
                           achievements across many disciplines. The university has over 1,700 full-time faculty members
                           and 35,000 students. The Department of Electrical Engineering and Computer Science (EECS)
                           offers one of the strongest research and instructional programs anywhere in the world.


    Challenge              Identify and deploy solution to address shortcomings in existing security product portfolio, while
                           minimizing operational overhead and impact on users. To achieve the highest possible level of
                           threat detection and remediation precision.

        Solution           Deployment of FireEye Web Malware Protection System 4000 Series Appliance, FireEye Malware
                           Protection Cloud and FireEye Malware Analysis Appliance.

        Benefits           Highly accurate malware detection with nominal false positives, and real-time confirmation
                           of malicious activity, independent of known signature- and pattern-based threats. Easy imple-
                           mentation, requiring no changes to existing processes or infrastructure, and low operational
                           overhead.


Located adjacent to San Francisco Bay, University of California Berkeley is ranked as the world’s premier public university
according to a recent U.S. News & World Report. As the university’s largest single department, Electrical Engineering and
Computer Science (EECS) is home to more than 1,500 undergraduate and graduate students. The pace of innovation and
leading-edge research within the department combine to form a dynamic and stimulating environment for students, staff
and faculty. For the EECS information technology team, attaining a balance that continues to foster learning, creativity and
breakthrough thinking, without imposing unduly restrictive policies, is a constant challenge.



“	 ireEye keeps us ahead of the onslaught of continually escalating Web-based threats. I trust FireEye to give me
 F
 the definitive expert view on how to protect our very unique environment.”
 – 	Fred Archibald, Computing Infrastructure Manager, Department of Electrical Engineering and Computer Science,
 		 University of California, Berkeley



FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com
Case Study



                                                                               are shared with subscribers of the FireEye Malware
Achieving Results When Others Failed
                                                                               Protection Cloud: Being a member of the worldwide
Following a successful proof of concept evaluation,                            FireEye community gives us a truly global perspec-
a FireEye Web Malware Protection System (MPS)                                  tive on malware outbreaks.”
4000 Series appliance was deployed to help protect
the department. Fred Archibald, computing infra-                               Irrefutable Proof
structure manager for EECS, recalled, “We looked
                                                                               A consequence of working for a world-renowned
closely at several competing products, but the FireEye
                                                                               university is the inherent expertise of the user popula-
appliance was very compelling. It was extremely
                                                                               tion. Archibald explained, “Many of our users possess
easy to install, actually taking less than half an hour
                                                                               a highly detailed knowledge of computer science-
in total but more importantly it was immediately able
                                                                               related fields. This sometimes leads to requests for
to identify threats that had not been detected by
                                                                               tangible proof for the reasons a potentially malicious
the existing multiple layers of protection.”
                                                                               piece of code has been intercepted or isolated.
The FireEye Web Malware Protection System is spe-                              Unlike conventional defenses, the FireEye MPS actu-
cifically designed to be deployed alongside other                              ally confirms malicious activity and provides detailed
security gateways to identify zero-day threats that                            descriptions of what was found. In addition, we can
policy- and signature-based firewalls, Web gate-                               use the FireEye Malware Analysis Appliance to do a
ways, intrusion prevention and anti-virus systems, fail                        forensic investigation and this enables me to con-
to detect. A highly sophisticated virtual execution                            vince even the most skeptical of users that an at-
engine identifies both unknown and known malware.                              tack was real, and our remediation actions justified.”


Archibald observed, “Cyber criminals are making                                The FireEye Web Malware Protection System has a
substantial and ever-increasing investments in mal-                            well deserved reputation for its effectiveness and
ware, and new threats are constantly being intro-                              extremely low operational overhead. Archibald
duced: There is no way that even a really good suite                           concurred, “Four years on and FireEye continues to
of traditional security applications can cope. The                             deliver outstanding protection. It requires minimal
FireEye MPS is so effective because it doesn’t rely on                         routine management and delivers precision results
existing signatures or patterns. It searches in real-                          with negligible false positives. It does the job so well
time for any unusual or suspicious activities to deter-                        that I can focus on other tasks, feeling confident
mine if a behavior poses a legitimate threat. Once                             that we are protected.”
something malicious is detected, specific details



Key Components:
FireEye Web Malware Protection System 4000 Series
FireEye Malware Protection Cloud
FireEye Malware Analysis Appliance



FireEye is the world leader in combating advanced malware, zero-day and targeted APT attacks that bypass
traditional defenses, such as Firewalls, IPS, AV, and Web gateways!
© 2011 FireEye, Inc. All rights reserved. FireEye, Inc. and all FireEye, Inc. products are either trademarks or registered trademarks of FireEye, Inc.
Other product and company names mentioned herein may be the trademarks of their respective owners. -- CS.WMPS052011



FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com

Weitere ähnliche Inhalte

Mehr von FireEye, Inc.

M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点FireEye, Inc.
 
M-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du frontM-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du frontFireEye, Inc.
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses FireEye, Inc.
 
Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersFireEye, Inc.
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapFireEye, Inc.
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat FireEye, Inc.
 
M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails FireEye, Inc.
 
M-Trends® 2010: The Advanced Persistent Threat
 M-Trends® 2010: The Advanced Persistent Threat M-Trends® 2010: The Advanced Persistent Threat
M-Trends® 2010: The Advanced Persistent ThreatFireEye, Inc.
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey FireEye, Inc.
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...FireEye, Inc.
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response SurveyFireEye, Inc.
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of CompromiseFireEye, Inc.
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber SecurityFireEye, Inc.
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye, Inc.
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsFireEye, Inc.
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye, Inc.
 
FireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye, Inc.
 

Mehr von FireEye, Inc. (17)

M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点
 
M-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du frontM-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du front
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses
 
Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For Hackers
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security Gap
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat
 
M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails
 
M-Trends® 2010: The Advanced Persistent Threat
 M-Trends® 2010: The Advanced Persistent Threat M-Trends® 2010: The Advanced Persistent Threat
M-Trends® 2010: The Advanced Persistent Threat
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response Survey
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of Compromise
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
 
FireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye Advanced Threat Report
FireEye Advanced Threat Report
 

Kürzlich hochgeladen

Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 

Kürzlich hochgeladen (20)

Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 

U.C. Berkeley Engages FireEye for Advanced Malware Protection

  • 1. Case Study U.C. Berkeley EECS Engages FireEye for Advanced Malware Protection Summary Company University of California Berkeley Industry Education Description The University of California, Berkeley is internationally recognized for excellence and pioneering achievements across many disciplines. The university has over 1,700 full-time faculty members and 35,000 students. The Department of Electrical Engineering and Computer Science (EECS) offers one of the strongest research and instructional programs anywhere in the world. Challenge Identify and deploy solution to address shortcomings in existing security product portfolio, while minimizing operational overhead and impact on users. To achieve the highest possible level of threat detection and remediation precision. Solution Deployment of FireEye Web Malware Protection System 4000 Series Appliance, FireEye Malware Protection Cloud and FireEye Malware Analysis Appliance. Benefits Highly accurate malware detection with nominal false positives, and real-time confirmation of malicious activity, independent of known signature- and pattern-based threats. Easy imple- mentation, requiring no changes to existing processes or infrastructure, and low operational overhead. Located adjacent to San Francisco Bay, University of California Berkeley is ranked as the world’s premier public university according to a recent U.S. News & World Report. As the university’s largest single department, Electrical Engineering and Computer Science (EECS) is home to more than 1,500 undergraduate and graduate students. The pace of innovation and leading-edge research within the department combine to form a dynamic and stimulating environment for students, staff and faculty. For the EECS information technology team, attaining a balance that continues to foster learning, creativity and breakthrough thinking, without imposing unduly restrictive policies, is a constant challenge. “ ireEye keeps us ahead of the onslaught of continually escalating Web-based threats. I trust FireEye to give me F the definitive expert view on how to protect our very unique environment.” – Fred Archibald, Computing Infrastructure Manager, Department of Electrical Engineering and Computer Science, University of California, Berkeley FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com
  • 2. Case Study are shared with subscribers of the FireEye Malware Achieving Results When Others Failed Protection Cloud: Being a member of the worldwide Following a successful proof of concept evaluation, FireEye community gives us a truly global perspec- a FireEye Web Malware Protection System (MPS) tive on malware outbreaks.” 4000 Series appliance was deployed to help protect the department. Fred Archibald, computing infra- Irrefutable Proof structure manager for EECS, recalled, “We looked A consequence of working for a world-renowned closely at several competing products, but the FireEye university is the inherent expertise of the user popula- appliance was very compelling. It was extremely tion. Archibald explained, “Many of our users possess easy to install, actually taking less than half an hour a highly detailed knowledge of computer science- in total but more importantly it was immediately able related fields. This sometimes leads to requests for to identify threats that had not been detected by tangible proof for the reasons a potentially malicious the existing multiple layers of protection.” piece of code has been intercepted or isolated. The FireEye Web Malware Protection System is spe- Unlike conventional defenses, the FireEye MPS actu- cifically designed to be deployed alongside other ally confirms malicious activity and provides detailed security gateways to identify zero-day threats that descriptions of what was found. In addition, we can policy- and signature-based firewalls, Web gate- use the FireEye Malware Analysis Appliance to do a ways, intrusion prevention and anti-virus systems, fail forensic investigation and this enables me to con- to detect. A highly sophisticated virtual execution vince even the most skeptical of users that an at- engine identifies both unknown and known malware. tack was real, and our remediation actions justified.” Archibald observed, “Cyber criminals are making The FireEye Web Malware Protection System has a substantial and ever-increasing investments in mal- well deserved reputation for its effectiveness and ware, and new threats are constantly being intro- extremely low operational overhead. Archibald duced: There is no way that even a really good suite concurred, “Four years on and FireEye continues to of traditional security applications can cope. The deliver outstanding protection. It requires minimal FireEye MPS is so effective because it doesn’t rely on routine management and delivers precision results existing signatures or patterns. It searches in real- with negligible false positives. It does the job so well time for any unusual or suspicious activities to deter- that I can focus on other tasks, feeling confident mine if a behavior poses a legitimate threat. Once that we are protected.” something malicious is detected, specific details Key Components: FireEye Web Malware Protection System 4000 Series FireEye Malware Protection Cloud FireEye Malware Analysis Appliance FireEye is the world leader in combating advanced malware, zero-day and targeted APT attacks that bypass traditional defenses, such as Firewalls, IPS, AV, and Web gateways! © 2011 FireEye, Inc. All rights reserved. FireEye, Inc. and all FireEye, Inc. products are either trademarks or registered trademarks of FireEye, Inc. Other product and company names mentioned herein may be the trademarks of their respective owners. -- CS.WMPS052011 FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com