Overview

FireEye is a leader in stopping the new generation of cyber-attacks, such as advanced malware, that easily bypass traditional signature-based defenses and compromise over 95 percent of enterprise networks. FireEye has invented a purpose-built, virtual machine-based platform that provides real-time threat protection to organizations across all major threat vectors and each stage of an attack life cycle.

Products

Contracts

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021


SEWP Contracts

SEWP V

Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020


ESI BPA Contracts

Department of Defense ESI BPA Contract # N00104-12-A-ZF31

BPA # N00104-12-A-ZF31


State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021

CMAS

Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

NASPO ValuePoint

Term: through September 15, 2026

National Cooperative Purchasing Alliance (NCPA)

Term: through April 30, 2019

National Intergovernmental Purchasing Alliance (National IPA - TCPN)

Term: through May 31, 2018 (with 2 option renewal years)

North Carolina Mass Storage Contract

Contract Number: 204J Term: through March 31, 2018

Ohio State Contract- 534354

Contract # 534354 Term: December 19, 2021

Orange County National IPA Co-Op

Through May 31, 2020 (with 2 option years)

Pennsylvania Office of Administration

Contract Number: 4400004252, Contract Expiration: December 19, 2021

PEPPM

PEPPM PA - Central Susquehanna Intermediate Unit Term: Through December 31, 2018

PEPPM CA

PEPPM CA - Kern County Superintendent of Schools Term:Through December 31, 2018

State of New Mexico Contract

Contract Number: 80-000-18-00002 Contract Period: August 1, 2017 – August 1, 2021

Texas DIR-TSO-2660

Term: Through November 17, 2018

Texas DIR-TSO-3149

DIR-TSO-3149 Contract Period: June 22, 2015 - June 22, 2018 (with 1 option year)

Texas DIR-TSO-3926

Expiration Term: June 29, 2018 (with 3 option years)

VASCUPP

Contract Number: UVA1482501 Term: May 2, 2014– December 19, 2021

VITA Contract

Term: through March 31, 2018

Wisconsin Department of Administration

Contract Number: 50ENT-016-FIREEYE-01 Term: through May 5, 2021


Education Contracts

Washington Learning Source Contract

Contract Number: WLS260 Contract Period: 7/23/13 - 7/22/19


Events

Upcoming Events

April 25, 2018 at 8:00 AM ET

Archived Events

News

Latest News

MILPITAS, Calif.-- FireEye, Inc. (NASDAQ: FEYE), the intelligence-led security company, today ...
READ MORE >
MILPITAS, Calif. – June 3, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced the addition of 12 new technology partners to the FireEye® ...
READ MORE >
MILPITAS, Calif. – May 23, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader at stopping today’s advanced cyber attacks, today announced upcoming conference participation for the second quarter of ...
READ MORE >
MILPITAS, Calif. – May 19, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced the integration of iSIGHT Partners threat intelligence into ...
READ MORE >
MILPITAS, Calif. – May 5, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced FireEye® Security Orchestrator™ (FSO™) — the ...
READ MORE >
MILPITAS, Calif. – May 5, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced that Chairman of the Board and Chief Executive Officer David ...
READ MORE >
MILPITAS, Calif. – April 19, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced the launch of Mandiant® Mergers & Acquisitions (M&A) ...
READ MORE >
Carahsoft Technology Corp., the trusted government IT solutions provider, announced today that it has been recognized as the Global Distributor of the Year for 2015 by FireEye, the leader in stopping ...
READ MORE >

Resources

Whitepaper

Just how (in)effective are today’s defensein- depth deployments? Unfortunately, industry testing bodies offer little help for organizations looking to assess their defenses. Controlled laboratory settings rely on samples of known threats and assumptions about cyber attacks, which may be out...

This whitepaper examines the changing threat landscape, how the nature of security threats has evolved, and the potential financial impact across vertical markets and organizations of all sizes. This paper will explain why advanced target attacks have been extremely effective at breaking through tra...

For our M-Trends® 2017 report, we took a look at the incidents we investigated last year and provided a global and regional (the Americas, Asia Pacific (APAC) and Europe, Middle East, Africa (EMEA)) analysis focused on attack trends and defensive and emerging trends.

Today, email-based threats represent significant and persistent risks for government agencies, and those dangers are only exacerbated by the move to cloud delivery models. This paper shows how government agencies can capitalize on the benefits of the cloud, while addressing their critical security...

There's been a rapid and dramatic shift from broad, scattershot attacks to advanced targeted attacks that have had serious consequences for victim organizations. Some of the most famous advanced targeted attacks, such as the attack on RSA, on HBGary Federal, and Operation Aurora all used spear phish...

On behalf of FireEye, IANS conducted a Return on Security (ROS) analysis of FireEye's Web Malware Protection System (MPS). To facilitate this study, IANS interviewed personnel from four FireEye customers, all of whom have direct responsibility for malware reduction and infection management, and who ...

The threat landscape has changed dramatically since the 1980s. When AV and anti-malware solutions, intrusion detection systems (IDS), intrusion prevention systems (IPS) and cloud-based solutions were introduced, they all relied on a static view of threats - signatures, pattern files and written poli...

Knowing how to protect critical information, data, and infrastructure in today’s landscape can be tricky— especially as the threat landscape becomes increasingly complex with state-sponsored cyber espionage and attacks. The best line of defense often comes from advance threat protection ...