Overview

FireEye is a leader in stopping the new generation of cyber-attacks, such as advanced malware, that easily bypass traditional signature-based defenses and compromise over 95 percent of enterprise networks. FireEye has invented a purpose-built, virtual machine-based platform that provides real-time threat protection to organizations across all major threat vectors and each stage of an attack life cycle.

Products

Contracts

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- June 17, 2017


SEWP Contracts

SEWP V

Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020


State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: June 17, 2017

CMAS

Contract # CMAS 3-12-70-2247E Term: through March 31, 2017

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

Florida - Palm Beach County

Through April 30, 2019

NASPO ValuePoint

Term: through September 15, 2026

National Intergovernmental Purchasing Alliance (National IPA)

Term: through May 31, 2018 (with 2 option renewal years)

Ohio State Contract- 534354

Contract # 534354 Term: June 17, 2017

Oklahoma DIR Contract # SDD-2035

Vendors: Various Term: May 3, 2013 - May 3, 2017

Orange County National IPA Co-Op

Through May 31, 2020 (with 2 option years)

Pennsylvania Office of Administration - ITQ

Pennsylvania Office of Administration Master Contract: 4400004480

State of New Mexico General Services Department Contract

Contract # 30-000-13-00060 Term: March 17, 2017

Texas DIR-SDD-2035

Term: May 3, 2017

Texas DIR-TSO-2660

Term: Through November 17, 2018

VASCUPP

Contract Number: UVA1482501 Contract Term: May 2, 2014– June 17, 2017


Events

Archived Events

News

Latest News

MILPITAS, Calif. – June 3, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced the addition of 12 new technology partners to the FireEye® ...
READ MORE >
MILPITAS, Calif. – May 23, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader at stopping today’s advanced cyber attacks, today announced upcoming conference participation for the second quarter of ...
READ MORE >
MILPITAS, Calif. – May 19, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced the integration of iSIGHT Partners threat intelligence into ...
READ MORE >
MILPITAS, Calif. – May 5, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced FireEye® Security Orchestrator™ (FSO™) — the ...
READ MORE >
MILPITAS, Calif. – May 5, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced that Chairman of the Board and Chief Executive Officer David ...
READ MORE >
MILPITAS, Calif. – April 19, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced the launch of Mandiant® Mergers & Acquisitions (M&A) ...
READ MORE >
Carahsoft Technology Corp., the trusted government IT solutions provider, announced today that it has been recognized as the Global Distributor of the Year for 2015 by FireEye, the leader in stopping ...
READ MORE >

Resources

Just how (in)effective are today’s defensein- depth deployments? Unfortunately, industry testing bodies offer little help for organizations looking to assess their defenses. Controlled laboratory settings rely on samples of known threats and assumptions about cyber attacks, which may be out...

FireEye intelligence analysts frequently observe two types of advanced threat actors targeting companies involved in healthcare services, pharmaceuticals production, and medical manufacturing:

 

This paper offers a better and more current framework to understand both the next-generation threat landscape of advanced malware and the five key design principles needed to eliminate the devil’s bargain implicit in today’s dated and highly ineffective rule-, signature- and list-based defenses.

Mobile devices have become critical in today’s digital workplace. But most organizations lack the security to ensure they, and the data they contain, are secure. Most security teams cannot fully account for—let alone monitor—the vast array of apps that have access to valuable corporate...