Overview

FireEye is a leader in stopping the new generation of cyber-attacks, such as advanced malware, that easily bypass traditional signature-based defenses and compromise over 95 percent of enterprise networks. FireEye has invented a purpose-built, virtual machine-based platform that provides real-time threat protection to organizations across all major threat vectors and each stage of an attack life cycle.

Products

Contracts

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021


SEWP Contracts

SEWP V

Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020


ESI BPA Contracts

Department of Defense ESI BPA Contract # N00104-12-A-ZF31

BPA # N00104-12-A-ZF31


State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021

CMAS

Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

NASPO ValuePoint

Term: through September 15, 2026

National Cooperative Purchasing Alliance (NCPA)

Term: through April 30, 2019

National Intergovernmental Purchasing Alliance (National IPA - TCPN)

Term: through May 31, 2019 (with 2 option renewal years)

North Carolina Mass Storage Contract

Contract Number: 204J Term: through March 31, 2018

Ohio State Contract- 534354

Contract # 534354 Term: December 19, 2021

Orange County National IPA Co-Op

Through May 31, 2019 (with 2 option years)

Pennsylvania Office of Administration

Contract Number: 4400004252, Contract Expiration: December 19, 2021

PEPPM

PEPPM PA - Central Susquehanna Intermediate Unit Term: Through December 31, 2018

PEPPM CA

PEPPM CA - Kern County Superintendent of Schools Term:Through December 31, 2018

State of New Mexico Contract

Contract Number: 80-000-18-00002 Contract Period: August 1, 2017 – August 1, 2021

Texas DIR-TSO-2660

Term: Through November 17, 2018

Texas DIR-TSO-3149

DIR-TSO-3149 Contract Period: June 22, 2015 - June 22, 2019(with 1 option year)

Texas DIR-TSO-3926

Expiration Term: June 28, 2022 (with 3 option years)

VASCUPP

Contract Number: UVA1482501 Term: May 2, 2014– December 19, 2021

VITA Contract

Term: through March 31, 2019

Wisconsin Department of Administration

Contract Number: 50ENT-016-FIREEYE-01 Term: through May 5, 2021


Education Contracts

Washington Learning Source Contract

Contract Number: WLS260 Contract Period: 7/23/13 - 7/22/19


Events

Archived Events

News

Latest News

MILPITAS, Calif.-- FireEye, Inc. (NASDAQ: FEYE), the intelligence-led security company, today ...
READ MORE >
MILPITAS, Calif. – June 3, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced the addition of 12 new technology partners to the FireEye® ...
READ MORE >
MILPITAS, Calif. – May 23, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader at stopping today’s advanced cyber attacks, today announced upcoming conference participation for the second quarter of ...
READ MORE >
MILPITAS, Calif. – May 19, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced the integration of iSIGHT Partners threat intelligence into ...
READ MORE >
MILPITAS, Calif. – May 5, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced FireEye® Security Orchestrator™ (FSO™) — the ...
READ MORE >
MILPITAS, Calif. – May 5, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced that Chairman of the Board and Chief Executive Officer David ...
READ MORE >
MILPITAS, Calif. – April 19, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced the launch of Mandiant® Mergers & Acquisitions (M&A) ...
READ MORE >
Carahsoft Technology Corp., the trusted government IT solutions provider, announced today that it has been recognized as the Global Distributor of the Year for 2015 by FireEye, the leader in stopping ...
READ MORE >

Resources

SELECT Resource_ID, Title, Vendor, Vertical, Type, DateAdded, Path, Linktype, InvisibleBit, FeaturedEnd, FeaturedBit, Description, CustomLogo, LegacyLink, Form FROM Resources WHERE Vendor = ? AND InvisibleBit = 0 ORDER BY FeaturedBit DESC, Type ASC

Resource

 

Today’s security threats are increasingly sophisticated in the ways they target, attack and infiltrate organizations to steal their core assets. Technology alone will not defeat a determined attacker. And it’s difficult and costly to hire, train and retain security experts. You need a trusted pa...

The Russian cyber threat groups that we monitor frequently design innovative ways to cover their tracks. In early 2015, we came across stealthy malware—which we call HAMMERTOSS—from an advanced persistent threat group that we suspect the Russian government sponsors. We designate t...

Attackers targeted a wide spectrum of industries in 2014, including several that we had not seen in large numbers before. While organizations learned of breaches sooner than they did in 2013, attackers still roamed undetected in breached environments far too long. And fewer victims discovered the...

Mobile devices have become critical in today’s digital workplace. But most organizations lack the security to ensure they, and the data they contain, are secure. Most security teams cannot fully account for—let alone monitor—the vast array of apps that have access to valuable corporate...

Technology is outpacing our ability to secure it. Despite substantial spending on legacy security products, advanced attackers are bypassing these defenses at will and spreading unchallenged. There’s no single technical answer. There’s no legislative fix. Bad guys will always exist, and determin...

fireeye-logo-R2.png
Resource
For our M-Trends® 2017 report, we took a look at the incidents we investigated last year and provided a global and regional (the Americas, Asia Pacific (APAC) and Europe, Middle East, Africa (EMEA)) analysis focused on attack trends and defensive and emerging trends. For the second consecutive y...

While we have seen modest gains in organizations’ ability to attack the security gap, advanced (and not-so advanced) threat actors continue to evolve their tactics to find a way through it. In last year’s M-Trends we noted that cyber security had gone from a niche IT issue to a board...

fireeye-logo-R2.png
Resource
In 2015, more breaches than ever before became public knowledge. Suffice it to say that the security industry is changing because of new pressures being applied to these victim organizations. They now have to respond to the court of public opinion, as well as all other statutes, regulations, an...

FireEye previously conducted an investigation into a suspected network intrusion that a university system administrator discovered when he noticed the presence of suspicious files on a server. The investigation revealed a compromise that affected three of the university’s servers, and involve...