Click here to close now.


News Feed Item

FireEye Adds Android Mobile App to Mobile Threat Prevention Platform

New Capabilities Give Enterprises and Employees Real-Time Protection From Evolving Mobile Threats

MILPITAS, CA -- (Marketwired) -- 04/29/14 -- FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today's advanced cyber attacks, today announced the expansion of the FireEye Mobile Threat Prevention (MTP) platform with the introduction of the FireEye Mobile Security™ app. With the expansion, organizations are able to protect devices on the Android™ platform with FireEye Multi-vector Virtual Execution™ engine technology and FireEye Dynamic Threat Intelligence™. Without relying on traditional signature-based tools, the enhancements to MTP add dynamic, malware-related security to mobile devices that complement existing Mobile Device Management tools. The new FireEye Mobile Security App will be generally available by the end of June 2014.

"Mobile security, like advanced persistent threat attacks, is a top security issue in enterprise today, yet it has largely relied on traditional defenses," said Manish Gupta, senior vice president of products, FireEye. "With almost half of the global workforce believed to be using their personal phone for work, the expanded Mobile Threat Prevention platform makes it easy for enterprises to guard their data from mobile threats using the advanced protection FireEye is known for."

Focused on the Android ecosystem, FireEye Mobile Threat Prevention provides administrators and employees visibility into the mobile threats currently on their networks and devices through a single dashboard and lightweight Android app. Using a hybrid-cloud model, the Android app performs signature-less analysis of user apps in the cloud while leaving sensitive employee information on-premise. With the new app and management tools, the FireEye Mobile Threat Prevention platform, is now designed to identify unknown mobile threats in real time using behavioral analysis, block malicious apps from running, and alert users and administrators of suspicious apps.

"As mobile growth in the enterprise continues, the real risks will push upward into the application security layer. Simply looking at the security of the device of choice is insufficient," wrote Tyler Shields, senior analyst, Forrester in the October 2013 Forrester Research report, "It's Time To Level Up Your Mobile Application Security Program."

Spanning devices and applications, the FireEye enhanced Mobile Threat Prevention platform capabilities now include:

  • Immediate access to FireEye Dynamic Threat Intelligence -- Evaluate apps against an encyclopedia of more than 2 million pre-analyzed apps from Google Play® and third-party app stores. This includes threat scores and behavioral details with on-demand threat assessments.
  • Simplified app threat management -- Granular visibility into compromised devices as well as multiple enforcement options, including blocking malicious apps from running.
  • A combination of semantic, dynamic, and behavioral analysis -- Comprehensive, on-demand threat assessments for newly launched or custom-built apps.

The FireEye Mobile Threat Prevention platform provides industry-leading mobile malware detection and prevention capabilities and a cloud-based app threat assessment solution. For more information on FireEye Mobile Threat Prevention, including how to become a beta customer of the new solution, please visit

Forward-Looking Statements
This press release contains forward-looking statements, including statements related to general availability, expected capabilities, and expected benefits of FireEye Mobile Security Management, the FireEye Mobile Security app, and the enhanced FireEye Mobile Threat Prevention platform. These forward-looking statements involve risks and uncertainties, as well as assumptions which, if they do not fully materialize or prove incorrect, could cause FireEye's results to differ materially from those expressed or implied by such forward-looking statements. The risks and uncertainties that could cause FireEye's results to differ materially from those expressed or implied by such forward-looking statements include FireEye's limited operating history and limited experience with developing and releasing new products and services; disruptions or other business interruptions that affect the availability of network connection to the FireEye Mobile Threat Prevention platform; real or perceived defects, errors, or vulnerabilities in the FireEye platform; rapidly evolving technological developments in a market that is characterized by rapid changes in technology, customer requirements, industry standards, and frequent new product introductions and improvements; and general market, political, economic, and business conditions; as well as those risks and uncertainties included under the captions "Risk Factors" and "Management's Discussion and Analysis of Financial Condition and Results of Operations," in FireEye's Form S-1 filed with the Securities and Exchange Commission on April 22, 2014, which is available on the Investor Relations section of the company's website at and on the SEC website at All forward-looking statements in this press release are based on information available to the company as of the date hereof, and FireEye does not assume any obligation to update the forward-looking statements provided to reflect events that occur or circumstances that exist after the date on which they were made. Any future product, feature, or related specification that may be referenced in this release are for information purposes only and are not commitments to deliver any technology or enhancement. FireEye reserves the right to modify future product or service plans at any time.

About FireEye, Inc.
FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 1,900 customers across more than 60 countries, including over 130 of the Fortune 500.

© 2014 FireEye, Inc. All rights reserved. FireEye, Mobile Threat Prevention, Mobile Security Management, Mobile Security, Multi-vector Virtual Execution, Dynamic Threat Intelligence, and Mobile Analysis are registered trademarks or trademarks of FireEye, Inc. in the United States and other countries. Android and Google Play are trademarks of Google Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.

Media Contact
Vitor De Souza
FireEye, Inc.
Email Contact
(415) 699-9838

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
As operational failure becomes more acceptable to discuss within the software industry, the necessity for holding constructive, actionable postmortems increases. But most of what we know about postmortems from "pop culture" isn't actually relevant for the software systems we work on and within. In his session at DevOps Summit, J. Paul Reed will look at postmortem pitfalls, techniques, and tools you'll be able to take back to your own environment so they will be able to lay the foundations for h...
Nowadays, a large number of sensors and devices are connected to the network. Leading-edge IoT technologies integrate various types of sensor data to create a new value for several business decision scenarios. The transparent cloud is a model of a new IoT emergence service platform. Many service providers store and access various types of sensor data in order to create and find out new business values by integrating such data.
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete en...
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Containers are all the rage among developers and web companies, but they also represent two very substantial benefits to larger organizations. First, they have the potential to dramatically accelerate the application lifecycle from software builds and testing to deployment and upgrades. Second they represent the first truly hybrid-approach to consuming infrastructure, allowing organizations to run the same workloads on any cloud, virtual machine or physical server. Together, they represent a ver...
SYS-CON Events announced today the Containers & Microservices Bootcamp, being held November 3-4, 2015, in conjunction with 17th Cloud Expo, @ThingsExpo, and @DevOpsSummit at the Santa Clara Convention Center in Santa Clara, CA. This is your chance to get started with the latest technology in the industry. Combined with real-world scenarios and use cases, the Containers and Microservices Bootcamp, led by Janakiram MSV, a Microsoft Regional Director, will include presentations as well as hands-on...
SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in high-performance, high-efficiency server, storage technology and green computing, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology is a premier provider of advanced server Building Block Solutions® for Data ...
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software and operations. For example, users can correlate code deploys to system performance to application error codes.
Achim Weiss is Chief Executive Officer and co-founder of ProfitBricks. In 1995, he broke off his studies to co-found the web hosting company "Schlund+Partner." The company "Schlund+Partner" later became the 1&1 web hosting product line. From 1995 to 2008, he was the technical director for several important projects: the largest web hosting platform in the world, the second largest DSL platform, a video on-demand delivery network, the largest eMail backend in Europe, and a universal billing syste...
Between the compelling mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a revolutionary model enabled by new technologies. Learn how busine...
Interested in leveraging automation technologies and a cloud architecture to make developers more productive? Learn how PaaS can benefit your organization to help you streamline your application development, allow you to use existing infrastructure and improve operational efficiencies. Begin charting your path to PaaS with OpenShift Enterprise.
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
WebRTC services have already permeated corporate communications in the form of videoconferencing solutions. However, WebRTC has the potential of going beyond and catalyzing a new class of services providing more than calls with capabilities such as mass-scale real-time media broadcasting, enriched and augmented video, person-to-machine and machine-to-machine communications. In his session at @ThingsExpo, Luis Lopez, CEO of Kurento, will introduce the technologies required for implementing thes...
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and containers together help companies achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, will review the current landscape of...