SlideShare ist ein Scribd-Unternehmen logo
1 von 2
Downloaden Sie, um offline zu lesen
Datasheet




Web Malware Protection System
Next Generation Web Security to Combat Advanced Targeted Attacks




Highlights                                   The FireEye Web Malware Protection System (MPS) stops
•	 Deploys inline (block/monitor-            Web-based attacks that traditional and next-generation
   mode) or out-of-band (TCP reset
                                             firewalls, IPS, AV, and Web gateways miss. It protects against
   mode/monitor-mode)
                                             zero-day Web exploits and multi-protocol callbacks to keep
•	 Supports X-Forwarded-For to identify
   the IP address of a host within a         sensitive data and systems safe.
   proxied environment
•	 Blocks outbound malware                   Advanced targeted attacks use the Web as a primary threat vector
   transmissions across multiple             since nearly all organizations allow some Web access. Criminals deliver
   protocols to thwart data exfiltration     zero-day exploits during Web browsing or via a malicious URL in an email.
•	 Analyzes all suspicious Web objects       The Web is also a transport mechanism for data exfiltration.
   including PDFs, Flash, multimedia
   formats, and ZIP/RAR/TNEF archives        Real-time protection to stop Web-based attacks
•	 Custom YARA rule support                  Web MPS appliances can be deployed inline at Internet egress points
   (compatible with version 1.3)             to block Web exploits and outbound multi-protocol callbacks. Utilizing the
•	 AV-Suite integration streamlines          FireEye Virtual Execution (VX) engine, it confirms zero-day attacks, creates
   incident response prioritization          real-time protections, and captures dynamic callback destinations. In
•	 Intelligence sharing with FireEye         monitor-mode, it signals incident response mechanisms and issues TCP
   MPS appliances through Central            resets for out-of-band blocking of TCP, UDP, or HTTP connections.
   Management System (CMS) and
   Malware Protection Cloud (MPC)            Fights blended attacks across Web and email threat vectors
•	 Supports remote third-party AAA           Together, MPS appliances protect against blended, advanced
   (Authentication, Authorization, and
                                             attacks that use the Web, spear phishing emails, and zero-day exploits.
   Accounting) network service access
                                             With the Web MPS, Email MPS, and Central Management System (CMS),
   in addition to local authentication
                                             customers get real-time protection against malicious URLs and the
                                             ability to connect the dots of a blended attack.

                                             Protects against unknown, zero-day attacks
                                             The signature-less VX engine detects advanced attacks exploiting
                                             unknown vulnerabilities as well as malicious code embedded in common
                                             Web and multimedia content. The VX engine reports out forensic details of
                                             the exploit, such as the vulnerability exploited to create a buffer overflow


                                             “The FireEye Malware Protection System was the only product that
                                              focused on real-time interpretation of the specific intent of potentially
                                              malicious code, versus the rigid signature-based and difficult to
Dashboards let you understand Web             administer heuristics approaches that everyone else offered.”
malware traffic and navigate threat events
                                             — Director of IT, Legal Services Firm
Datasheet



condition, attempts at privilege escalation within                           Web MPS. This enables customers to more efficiently
Windows, and the callbacks used to exfiltrate data.                          prioritize incident response follow-ups.

The VX engine executes suspicious binaries and                               Malware intelligence sharing
Web objects against a range of browsers, plug-
                                                                             The resulting dynamically generated, real-time
ins, applications, and operating environments that
                                                                             malware intelligence can help all FireEye appliances
are instrumented to track vulnerability exploitation,
                                                                             protect the local network. Intelligence includes
memory corruption, and other definitive malicious
                                                                             callback coordinates, as well as communication
actions. As the attack plays out, it captures callback
                                                                             characteristics. This intelligence can be shared
channels and dynamically creates blocking rules.
                                                                             globally through the FireEye Malware Protection
                                                                             Cloud (MPC) to notify all subscribers of new threats.
YARA-based rules enables customization
The Web MPS supports custom YARA rule importation                            No rules tuning and no false positives
to enable security analysts to quickly analyze Web
                                                                             This easy-to-manage, clientless appliance deploys
objects for threats specific to the organization.
                                                                             in under 30 minutes and requires absolutely no
                                                                             tuning. It offers flexible deployment modes, including
Streamlined incident prioritization
                                                                             out-of-band via a TAP/SPAN, inline monitoring, or
With FireEye AV-Suite, each malicious object can                             inline active blocking. The FireEye VX engine nearly
be further analyzed to determine if anti-virus vendors                       eliminates false alerts and provides administrators
were able to detect the malware stopped by the                               with the true incidents that merit attention.

Technical Specifications

                          Web MPS 1310             Web MPS 2310             Web MPS 4310             Web MPS 7300             Web MPS 7320

  Form Factor             1U Rack-Mount            1U Rack-Mount            1U Rack-Mount            1U Rack-Mount            1U Rack-Mount

  Weight                  12 lbs (5.4Kg)           12 lbs (5.4Kg)           25 lbs (11.4 Kg)         30 lbs (13.6 Kg)         30 lbs (13.6 Kg)

  Dimensions              16.8” x 14.0” x 1.7”     16.8” x 14.0” x 1.7”     17.2” x 27.5” x 1.7”     17.2” x 25.6” x 1.7”     17.2” x 25.6” x 1.7”
  (WxDxH)                 (42.6 x 35.6 x 4.3 cm)   (42.6 x 35.6 x 4.3 cm)   (43.7 x 69.9 x 4.3 cm)   (43.7 x 65.0 x 4.3 cm)   (43.7 x 65.0 x 4.3 cm)

  Enclosure               Fits 19-Inch Rack        Fits 19-Inch Rack        Fits 19-Inch Rack        Fits 19-Inch Rack        Fits 19-Inch Rack

  Management              (2) 10/100/1000          (2) 10/100/1000          (2) 10/100/1000          (2) 10/100/1000          (2) 10/100/1000
  Interfaces              BASE-T Ports             BASE-T Ports             BASE-T Ports             BASE-T Ports             BASE-T Ports

  Monitoring Interfaces   (2) 10/100/1000          (4) 10/100/1000          (4) 10/100/1000          (4) 10/100/1000          (4) 1000 BASE-SX
                          BASE-T Ports             BASE-T Ports             BASE-T Ports             BASE-T Ports             Fiber Optic Ports

  Performance Rating      Up to 20 Mbps            Up to 50 Mbps            Up to 250 Mbps           Up to 1 Gbps             Up to 1 Gbps

  AC Input Voltage        Auto-switching 100 ~     Auto-switching 100 ~     Auto-switching 100 ~     Auto-switching 100 ~     Auto-switching 100 ~
                          240 VAC Full Range       240 VAC Full Range       240 VAC Full Range       240 VAC Full Range       240 VAC Full Range

  AC Input Current        4.8-2.0 A                4.8-2.0 A                8.5-6 A                  8.5-6 A                  8.5-6 A

  Power Supply/RAID       Single / No              Single / No              Dual / 2 SAS HDD         Dual / 2 SAS HDD         Dual / 2 SAS HDD
                                                                            in HW RAID1              in HW RAID1              in HW RAID1

  Frequency               50-60 Hz                 50-60 Hz                 50-60 Hz                 50-60 Hz                 50-60 Hz

  AC Power                260 W Max                260 W Max                700 W Max                700 W Max                700 W Max

  Ambient Temp            40° C                    40° C                    40° C                    40° C                    40° C




© 2012 FireEye, Inc. All rights reserved. FireEye is a trademark of FireEye, Inc. All other brands, products, or service names are or may
be trademarks or service marks of their respective owners. – DS.WMPS.022012



FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com

Weitere ähnliche Inhalte

Mehr von FireEye, Inc.

Mehr von FireEye, Inc. (17)

M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点
 
M-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du frontM-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du front
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses
 
Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For Hackers
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security Gap
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat
 
M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails
 
M-Trends® 2010: The Advanced Persistent Threat
 M-Trends® 2010: The Advanced Persistent Threat M-Trends® 2010: The Advanced Persistent Threat
M-Trends® 2010: The Advanced Persistent Threat
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response Survey
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of Compromise
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
 
FireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye Advanced Threat Report
FireEye Advanced Threat Report
 

Kürzlich hochgeladen

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

FireEye Web Malware Protection System Stops Web-based Attacks

  • 1. Datasheet Web Malware Protection System Next Generation Web Security to Combat Advanced Targeted Attacks Highlights The FireEye Web Malware Protection System (MPS) stops • Deploys inline (block/monitor- Web-based attacks that traditional and next-generation mode) or out-of-band (TCP reset firewalls, IPS, AV, and Web gateways miss. It protects against mode/monitor-mode) zero-day Web exploits and multi-protocol callbacks to keep • Supports X-Forwarded-For to identify the IP address of a host within a sensitive data and systems safe. proxied environment • Blocks outbound malware Advanced targeted attacks use the Web as a primary threat vector transmissions across multiple since nearly all organizations allow some Web access. Criminals deliver protocols to thwart data exfiltration zero-day exploits during Web browsing or via a malicious URL in an email. • Analyzes all suspicious Web objects The Web is also a transport mechanism for data exfiltration. including PDFs, Flash, multimedia formats, and ZIP/RAR/TNEF archives Real-time protection to stop Web-based attacks • Custom YARA rule support Web MPS appliances can be deployed inline at Internet egress points (compatible with version 1.3) to block Web exploits and outbound multi-protocol callbacks. Utilizing the • AV-Suite integration streamlines FireEye Virtual Execution (VX) engine, it confirms zero-day attacks, creates incident response prioritization real-time protections, and captures dynamic callback destinations. In • Intelligence sharing with FireEye monitor-mode, it signals incident response mechanisms and issues TCP MPS appliances through Central resets for out-of-band blocking of TCP, UDP, or HTTP connections. Management System (CMS) and Malware Protection Cloud (MPC) Fights blended attacks across Web and email threat vectors • Supports remote third-party AAA Together, MPS appliances protect against blended, advanced (Authentication, Authorization, and attacks that use the Web, spear phishing emails, and zero-day exploits. Accounting) network service access With the Web MPS, Email MPS, and Central Management System (CMS), in addition to local authentication customers get real-time protection against malicious URLs and the ability to connect the dots of a blended attack. Protects against unknown, zero-day attacks The signature-less VX engine detects advanced attacks exploiting unknown vulnerabilities as well as malicious code embedded in common Web and multimedia content. The VX engine reports out forensic details of the exploit, such as the vulnerability exploited to create a buffer overflow “The FireEye Malware Protection System was the only product that focused on real-time interpretation of the specific intent of potentially malicious code, versus the rigid signature-based and difficult to Dashboards let you understand Web administer heuristics approaches that everyone else offered.” malware traffic and navigate threat events — Director of IT, Legal Services Firm
  • 2. Datasheet condition, attempts at privilege escalation within Web MPS. This enables customers to more efficiently Windows, and the callbacks used to exfiltrate data. prioritize incident response follow-ups. The VX engine executes suspicious binaries and Malware intelligence sharing Web objects against a range of browsers, plug- The resulting dynamically generated, real-time ins, applications, and operating environments that malware intelligence can help all FireEye appliances are instrumented to track vulnerability exploitation, protect the local network. Intelligence includes memory corruption, and other definitive malicious callback coordinates, as well as communication actions. As the attack plays out, it captures callback characteristics. This intelligence can be shared channels and dynamically creates blocking rules. globally through the FireEye Malware Protection Cloud (MPC) to notify all subscribers of new threats. YARA-based rules enables customization The Web MPS supports custom YARA rule importation No rules tuning and no false positives to enable security analysts to quickly analyze Web This easy-to-manage, clientless appliance deploys objects for threats specific to the organization. in under 30 minutes and requires absolutely no tuning. It offers flexible deployment modes, including Streamlined incident prioritization out-of-band via a TAP/SPAN, inline monitoring, or With FireEye AV-Suite, each malicious object can inline active blocking. The FireEye VX engine nearly be further analyzed to determine if anti-virus vendors eliminates false alerts and provides administrators were able to detect the malware stopped by the with the true incidents that merit attention. Technical Specifications Web MPS 1310 Web MPS 2310 Web MPS 4310 Web MPS 7300 Web MPS 7320 Form Factor 1U Rack-Mount 1U Rack-Mount 1U Rack-Mount 1U Rack-Mount 1U Rack-Mount Weight 12 lbs (5.4Kg) 12 lbs (5.4Kg) 25 lbs (11.4 Kg) 30 lbs (13.6 Kg) 30 lbs (13.6 Kg) Dimensions 16.8” x 14.0” x 1.7” 16.8” x 14.0” x 1.7” 17.2” x 27.5” x 1.7” 17.2” x 25.6” x 1.7” 17.2” x 25.6” x 1.7” (WxDxH) (42.6 x 35.6 x 4.3 cm) (42.6 x 35.6 x 4.3 cm) (43.7 x 69.9 x 4.3 cm) (43.7 x 65.0 x 4.3 cm) (43.7 x 65.0 x 4.3 cm) Enclosure Fits 19-Inch Rack Fits 19-Inch Rack Fits 19-Inch Rack Fits 19-Inch Rack Fits 19-Inch Rack Management (2) 10/100/1000 (2) 10/100/1000 (2) 10/100/1000 (2) 10/100/1000 (2) 10/100/1000 Interfaces BASE-T Ports BASE-T Ports BASE-T Ports BASE-T Ports BASE-T Ports Monitoring Interfaces (2) 10/100/1000 (4) 10/100/1000 (4) 10/100/1000 (4) 10/100/1000 (4) 1000 BASE-SX BASE-T Ports BASE-T Ports BASE-T Ports BASE-T Ports Fiber Optic Ports Performance Rating Up to 20 Mbps Up to 50 Mbps Up to 250 Mbps Up to 1 Gbps Up to 1 Gbps AC Input Voltage Auto-switching 100 ~ Auto-switching 100 ~ Auto-switching 100 ~ Auto-switching 100 ~ Auto-switching 100 ~ 240 VAC Full Range 240 VAC Full Range 240 VAC Full Range 240 VAC Full Range 240 VAC Full Range AC Input Current 4.8-2.0 A 4.8-2.0 A 8.5-6 A 8.5-6 A 8.5-6 A Power Supply/RAID Single / No Single / No Dual / 2 SAS HDD Dual / 2 SAS HDD Dual / 2 SAS HDD in HW RAID1 in HW RAID1 in HW RAID1 Frequency 50-60 Hz 50-60 Hz 50-60 Hz 50-60 Hz 50-60 Hz AC Power 260 W Max 260 W Max 700 W Max 700 W Max 700 W Max Ambient Temp 40° C 40° C 40° C 40° C 40° C © 2012 FireEye, Inc. All rights reserved. FireEye is a trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners. – DS.WMPS.022012 FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com