FireEye is a leader in stopping the new generation of cyber-attacks, such as advanced malware, that easily bypass traditional signature-based defenses and compromise over 95 percent of enterprise networks. FireEye has invented a purpose-built, virtual machine-based platform that provides real-time threat protection to organizations across all major threat vectors and each stage of an attack life cycle.



GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021

SEWP Contracts


Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020

State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021


Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

NASPO ValuePoint

Term: through September 15, 2026

National Intergovernmental Purchasing Alliance (National IPA - TCPN)

Term: through May 31, 2018 (with 2 option renewal years)

Ohio State Contract- 534354

Contract # 534354 Term: December 19, 2021

Orange County National IPA Co-Op

Through May 31, 2020 (with 2 option years)

Pennsylvania Office of Administration - ITQ

Pennsylvania Office of Administration Master Contract: 4400004480

Texas DIR-TSO-2660

Term: Through November 17, 2018


Contract Number: UVA1482501 Contract Term: May 2, 2014– December 19, 2021


Upcoming Events

December 13, 2017 at 2:00 PM ET

Archived Events


Latest News

MILPITAS, Calif.-- FireEye, Inc. (NASDAQ: FEYE), the intelligence-led security company, today ...
MILPITAS, Calif. – June 3, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced the addition of 12 new technology partners to the FireEye® ...
MILPITAS, Calif. – May 23, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader at stopping today’s advanced cyber attacks, today announced upcoming conference participation for the second quarter of ...
MILPITAS, Calif. – May 19, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced the integration of iSIGHT Partners threat intelligence into ...
MILPITAS, Calif. – May 5, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced FireEye® Security Orchestrator™ (FSO™) — the ...
MILPITAS, Calif. – May 5, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced that Chairman of the Board and Chief Executive Officer David ...
MILPITAS, Calif. – April 19, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced the launch of Mandiant® Mergers & Acquisitions (M&A) ...
Carahsoft Technology Corp., the trusted government IT solutions provider, announced today that it has been recognized as the Global Distributor of the Year for 2015 by FireEye, the leader in stopping ...


Today, federal agencies are under virtually constant attack, targeted by increasingly sophisticated and well-funded criminals and nation-states. The increasing efficacy of advanced persistent threats (APTs) continues to highlight the inadequacies of traditional signature-based defense mechanisms s...

Cyber attacks are on the rise, and it’s no secret that governmental organizations—both federal, state and local— have found themselves the target of numerous high-profile attacks. But with so much critical information at stake, what should agencies know about breaches, and how to defend aga...

In 2015, more breaches than ever before became public knowledge. Suffice it to say that the security industry is changing because of new pressures being applied to these victim organizations. They now have to respond to the court of public opinion, as well as all other statutes, regulations, an...

Knowing how to protect critical information, data, and infrastructure in today’s landscape can be tricky— especially as the threat landscape becomes increasingly complex with state-sponsored cyber espionage and attacks. The best line of defense often comes from advance threat protection ...

Today’s security threats are increasingly sophisticated in the ways they target, attack and infiltrate organizations to steal their core assets. Technology alone will not defeat a determined attacker. And it’s difficult and costly to hire, train and retain security experts. You need a trusted pa...

This handbook shines a light on the dark corners of advance malware, both to educate as well as to spark renewed efforts against these stealthy and persistent threats. By understanding the tools being used by criminals, we can better defend our nations, our critical infrastructures and our citizens....

Cyber-attack volume has never been higher, and if your defenses can’t keep up, you dramatically increase your risk of a breach. Attackers have the intellectual resources, the computing power, and the backbone of the fastest digital delivery networks. They can iterate on your defenses at will, ...

For our M-Trends® 2017 report, we took a look at the incidents we investigated last year and provided a global and regional (the Americas, Asia Pacific (APAC) and Europe, Middle East, Africa (EMEA)) analysis focused on attack trends and defensive and emerging trends. For the second consecutive y...

Today, email-based threats represent significant and persistent risks for government agencies, and those dangers are only exacerbated by the move to cloud delivery models. This paper shows how government agencies can capitalize on the benefits of the cloud, while addressing their critical security...

This whitepaper examines the changing threat landscape, how the nature of security threats has evolved, and the potential financial impact across vertical markets and organizations of all sizes. This paper will explain why advanced target attacks have been extremely effective at breaking through tra...