Click here to close now.

Welcome!

News Feed Item

FireEye Adds Android Mobile App to Mobile Threat Prevention Platform

New Capabilities Give Enterprises and Employees Real-Time Protection From Evolving Mobile Threats

MILPITAS, CA -- (Marketwired) -- 04/29/14 -- FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today's advanced cyber attacks, today announced the expansion of the FireEye Mobile Threat Prevention (MTP) platform with the introduction of the FireEye Mobile Security™ app. With the expansion, organizations are able to protect devices on the Android™ platform with FireEye Multi-vector Virtual Execution™ engine technology and FireEye Dynamic Threat Intelligence™. Without relying on traditional signature-based tools, the enhancements to MTP add dynamic, malware-related security to mobile devices that complement existing Mobile Device Management tools. The new FireEye Mobile Security App will be generally available by the end of June 2014.

"Mobile security, like advanced persistent threat attacks, is a top security issue in enterprise today, yet it has largely relied on traditional defenses," said Manish Gupta, senior vice president of products, FireEye. "With almost half of the global workforce believed to be using their personal phone for work, the expanded Mobile Threat Prevention platform makes it easy for enterprises to guard their data from mobile threats using the advanced protection FireEye is known for."

Focused on the Android ecosystem, FireEye Mobile Threat Prevention provides administrators and employees visibility into the mobile threats currently on their networks and devices through a single dashboard and lightweight Android app. Using a hybrid-cloud model, the Android app performs signature-less analysis of user apps in the cloud while leaving sensitive employee information on-premise. With the new app and management tools, the FireEye Mobile Threat Prevention platform, is now designed to identify unknown mobile threats in real time using behavioral analysis, block malicious apps from running, and alert users and administrators of suspicious apps.

"As mobile growth in the enterprise continues, the real risks will push upward into the application security layer. Simply looking at the security of the device of choice is insufficient," wrote Tyler Shields, senior analyst, Forrester in the October 2013 Forrester Research report, "It's Time To Level Up Your Mobile Application Security Program."

Spanning devices and applications, the FireEye enhanced Mobile Threat Prevention platform capabilities now include:

  • Immediate access to FireEye Dynamic Threat Intelligence -- Evaluate apps against an encyclopedia of more than 2 million pre-analyzed apps from Google Play® and third-party app stores. This includes threat scores and behavioral details with on-demand threat assessments.
  • Simplified app threat management -- Granular visibility into compromised devices as well as multiple enforcement options, including blocking malicious apps from running.
  • A combination of semantic, dynamic, and behavioral analysis -- Comprehensive, on-demand threat assessments for newly launched or custom-built apps.

The FireEye Mobile Threat Prevention platform provides industry-leading mobile malware detection and prevention capabilities and a cloud-based app threat assessment solution. For more information on FireEye Mobile Threat Prevention, including how to become a beta customer of the new solution, please visit http://www.fireeye.com/MTP.

Forward-Looking Statements
This press release contains forward-looking statements, including statements related to general availability, expected capabilities, and expected benefits of FireEye Mobile Security Management, the FireEye Mobile Security app, and the enhanced FireEye Mobile Threat Prevention platform. These forward-looking statements involve risks and uncertainties, as well as assumptions which, if they do not fully materialize or prove incorrect, could cause FireEye's results to differ materially from those expressed or implied by such forward-looking statements. The risks and uncertainties that could cause FireEye's results to differ materially from those expressed or implied by such forward-looking statements include FireEye's limited operating history and limited experience with developing and releasing new products and services; disruptions or other business interruptions that affect the availability of network connection to the FireEye Mobile Threat Prevention platform; real or perceived defects, errors, or vulnerabilities in the FireEye platform; rapidly evolving technological developments in a market that is characterized by rapid changes in technology, customer requirements, industry standards, and frequent new product introductions and improvements; and general market, political, economic, and business conditions; as well as those risks and uncertainties included under the captions "Risk Factors" and "Management's Discussion and Analysis of Financial Condition and Results of Operations," in FireEye's Form S-1 filed with the Securities and Exchange Commission on April 22, 2014, which is available on the Investor Relations section of the company's website at investors.FireEye.com and on the SEC website at www.sec.gov. All forward-looking statements in this press release are based on information available to the company as of the date hereof, and FireEye does not assume any obligation to update the forward-looking statements provided to reflect events that occur or circumstances that exist after the date on which they were made. Any future product, feature, or related specification that may be referenced in this release are for information purposes only and are not commitments to deliver any technology or enhancement. FireEye reserves the right to modify future product or service plans at any time.

About FireEye, Inc.
FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 1,900 customers across more than 60 countries, including over 130 of the Fortune 500.

© 2014 FireEye, Inc. All rights reserved. FireEye, Mobile Threat Prevention, Mobile Security Management, Mobile Security, Multi-vector Virtual Execution, Dynamic Threat Intelligence, and Mobile Analysis are registered trademarks or trademarks of FireEye, Inc. in the United States and other countries. Android and Google Play are trademarks of Google Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.

Media Contact
Vitor De Souza
FireEye, Inc.
Email Contact
(415) 699-9838

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
"A lot of the enterprises that have been using our systems for many years are reaching out to the cloud - the public cloud, the private cloud and hybrid," stated Reuven Harrison, CTO and Co-Founder of Tufin, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
One of the hottest areas in cloud right now is DRaaS and related offerings. In his session at 16th Cloud Expo, Dale Levesque, Disaster Recovery Product Manager with Windstream's Cloud and Data Center Marketing team, will discuss the benefits of the cloud model, which far outweigh the traditional approach, and how enterprises need to ensure that their needs are properly being met.
The time is ripe for high speed resilient software defined storage solutions with unlimited scalability. ISS has been working with the leading open source projects and developed a commercial high performance solution that is able to grow forever without performance limitations. In his session at Cloud Expo, Alex Gorbachev, President of Intelligent Systems Services Inc., shared foundation principles of Ceph architecture, as well as the design to deliver this storage to traditional SAN storage co...
"Plutora provides release and testing environment capabilities to the enterprise," explained Dalibor Siroky, Director and Co-founder of Plutora, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
To many people, IoT is a buzzword whose value is not understood. Many people think IoT is all about wearables and home automation. In his session at @ThingsExpo, Mike Kavis, Vice President & Principal Cloud Architect at Cloud Technology Partners, discussed some incredible game-changing use cases and how they are transforming industries like agriculture, manufacturing, health care, and smart cities. He will discuss cool technologies like smart dust, robotics, smart labels, and much more. Prepare...
It is one thing to build single industrial IoT applications, but what will it take to build the Smart Cities and truly society-changing applications of the future? The technology won’t be the problem, it will be the number of parties that need to work together and be aligned in their motivation to succeed. In his session at @ThingsExpo, Jason Mondanaro, Director, Product Management at Metanga, discussed how you can plan to cooperate, partner, and form lasting all-star teams to change the world...
SYS-CON Events announced today that JFrog, maker of Artifactory, the popular Binary Repository Manager, will exhibit at SYS-CON's @DevOpsSummit Silicon Valley, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Based in California, Israel and France, founded by longtime field-experts, JFrog, creator of Artifactory and Bintray, has provided the market with the first Binary Repository solution and a software distribution social platform.
In his session at 16th Cloud Expo, Simone Brunozzi, VP and Chief Technologist of Cloud Services at VMware, reviewed the changes that the cloud computing industry has gone through over the last five years and shared insights into what the next five will bring. He also chronicled the challenges enterprise companies are facing as they move to the public cloud. He delved into the "Hybrid Cloud" space and explained why every CIO should consider ‘hybrid cloud' as part of their future strategy to achi...
"We got started as search consultants. On the services side of the business we have help organizations save time and save money when they hit issues that everyone more or less hits when their data grows," noted Otis Gospodnetić, Founder of Sematext, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
"We have a tagline - "Power in the API Economy." What that means is everything that is built in applications and connected applications is done through APIs," explained Roberto Medrano, Executive Vice President at Akana, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at DevOps Summit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Internet of Things is moving from being a hype to a reality. Experts estimate that internet connected cars will grow to 152 million, while over 100 million internet connected wireless light bulbs and lamps will be operational by 2020. These and many other intriguing statistics highlight the importance of Internet powered devices and how market penetration is going to multiply many times over in the next few years.
Internet of Things (IoT) will be a hybrid ecosystem of diverse devices and sensors collaborating with operational and enterprise systems to create the next big application. In their session at @ThingsExpo, Bramh Gupta, founder and CEO of robomq.io, and Fred Yatzeck, principal architect leading product development at robomq.io, discussed how choosing the right middleware and integration strategy from the get-go will enable IoT solution developers to adapt and grow with the industry, while at th...
The most often asked question post-DevOps introduction is: “How do I get started?” There’s plenty of information on why DevOps is valid and important, but many managers still struggle with simple basics for how to initiate a DevOps program in their business. They struggle with issues related to current organizational inertia, the lack of experience on Continuous Integration/Delivery, understanding where DevOps will affect revenue and budget, etc. In their session at DevOps Summit, JP Morgenthal...
Agile, which started in the development organization, has gradually expanded into other areas downstream - namely IT and Operations. Teams – then teams of teams – have streamlined processes, improved feedback loops and driven a much faster pace into IT departments which have had profound effects on the entire organization. In his session at DevOps Summit, Anders Wallgren, Chief Technology Officer of Electric Cloud, will discuss how DevOps and Continuous Delivery have emerged to help connect dev...