MILPITAS, Calif., Feb. 14, 2014 (GLOBE NEWSWIRE) -- FireEye, Inc. (Nasdaq:FEYE), the leader in stopping today's advanced cyber attacks, today introduced FireEye® Endpoint Threat Prevention™ for the FireEye Security Platform. The new solution, which incorporates endpoint products acquired from Mandiant, is designed to enable security teams to resolve security incidents in a fraction of the time it takes using conventional approaches that knit together endpoint and network-detection capabilities from multiple vendors.
"Once a threat has been identified, rapid incident response is the key to preventing the theft of intellectual property, minimizing disruption to the business and eliminating reputational impact," said Manish Gupta, senior vice president of products at FireEye. "FireEye Endpoint Threat Prevention helps reduce the cost of response by equipping security analysts to make faster, more accurate decisions about potential threats. It connects the dots between what's happening on their network and what's happening on their endpoints so they can shorten the time required to resolve security incidents."
According to Gartner, "Endpoint threat detection and response tools enable an organization to achieve comprehensive endpoint visibility, simplify security incident response and detect malicious activities." The report goes on to say "In particular, organizations that face attacks from advanced persistent threat actors must evaluate these tools and accelerate the deployment alongside network forensics and other "lean forward" security technologies and practices." (Source, Gartner, Endpoint Threat Detection and Response Tools and Practices, A. Chuvak, September 25, 2013).By incorporating endpoint threat detection and response capabilities into the FireEye platform, organizations can realize additional value from the FireEye advanced threat detection capabilities. With FireEye Endpoint Threat Protection, security teams can automatically trace alerts generated by the FireEye Multi-Vector Virtual Execution™ (MVX) engine directly to compromised servers, laptops, and file shares and then contain devices with a single click.