Welcome!

News Feed Item

FireEye Adds Android Mobile App to Mobile Threat Prevention Platform

New Capabilities Give Enterprises and Employees Real-Time Protection From Evolving Mobile Threats

MILPITAS, CA -- (Marketwired) -- 04/29/14 -- FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today's advanced cyber attacks, today announced the expansion of the FireEye Mobile Threat Prevention (MTP) platform with the introduction of the FireEye Mobile Security™ app. With the expansion, organizations are able to protect devices on the Android™ platform with FireEye Multi-vector Virtual Execution™ engine technology and FireEye Dynamic Threat Intelligence™. Without relying on traditional signature-based tools, the enhancements to MTP add dynamic, malware-related security to mobile devices that complement existing Mobile Device Management tools. The new FireEye Mobile Security App will be generally available by the end of June 2014.

"Mobile security, like advanced persistent threat attacks, is a top security issue in enterprise today, yet it has largely relied on traditional defenses," said Manish Gupta, senior vice president of products, FireEye. "With almost half of the global workforce believed to be using their personal phone for work, the expanded Mobile Threat Prevention platform makes it easy for enterprises to guard their data from mobile threats using the advanced protection FireEye is known for."

Focused on the Android ecosystem, FireEye Mobile Threat Prevention provides administrators and employees visibility into the mobile threats currently on their networks and devices through a single dashboard and lightweight Android app. Using a hybrid-cloud model, the Android app performs signature-less analysis of user apps in the cloud while leaving sensitive employee information on-premise. With the new app and management tools, the FireEye Mobile Threat Prevention platform, is now designed to identify unknown mobile threats in real time using behavioral analysis, block malicious apps from running, and alert users and administrators of suspicious apps.

"As mobile growth in the enterprise continues, the real risks will push upward into the application security layer. Simply looking at the security of the device of choice is insufficient," wrote Tyler Shields, senior analyst, Forrester in the October 2013 Forrester Research report, "It's Time To Level Up Your Mobile Application Security Program."

Spanning devices and applications, the FireEye enhanced Mobile Threat Prevention platform capabilities now include:

  • Immediate access to FireEye Dynamic Threat Intelligence -- Evaluate apps against an encyclopedia of more than 2 million pre-analyzed apps from Google Play® and third-party app stores. This includes threat scores and behavioral details with on-demand threat assessments.
  • Simplified app threat management -- Granular visibility into compromised devices as well as multiple enforcement options, including blocking malicious apps from running.
  • A combination of semantic, dynamic, and behavioral analysis -- Comprehensive, on-demand threat assessments for newly launched or custom-built apps.

The FireEye Mobile Threat Prevention platform provides industry-leading mobile malware detection and prevention capabilities and a cloud-based app threat assessment solution. For more information on FireEye Mobile Threat Prevention, including how to become a beta customer of the new solution, please visit http://www.fireeye.com/MTP.

Forward-Looking Statements
This press release contains forward-looking statements, including statements related to general availability, expected capabilities, and expected benefits of FireEye Mobile Security Management, the FireEye Mobile Security app, and the enhanced FireEye Mobile Threat Prevention platform. These forward-looking statements involve risks and uncertainties, as well as assumptions which, if they do not fully materialize or prove incorrect, could cause FireEye's results to differ materially from those expressed or implied by such forward-looking statements. The risks and uncertainties that could cause FireEye's results to differ materially from those expressed or implied by such forward-looking statements include FireEye's limited operating history and limited experience with developing and releasing new products and services; disruptions or other business interruptions that affect the availability of network connection to the FireEye Mobile Threat Prevention platform; real or perceived defects, errors, or vulnerabilities in the FireEye platform; rapidly evolving technological developments in a market that is characterized by rapid changes in technology, customer requirements, industry standards, and frequent new product introductions and improvements; and general market, political, economic, and business conditions; as well as those risks and uncertainties included under the captions "Risk Factors" and "Management's Discussion and Analysis of Financial Condition and Results of Operations," in FireEye's Form S-1 filed with the Securities and Exchange Commission on April 22, 2014, which is available on the Investor Relations section of the company's website at investors.FireEye.com and on the SEC website at www.sec.gov. All forward-looking statements in this press release are based on information available to the company as of the date hereof, and FireEye does not assume any obligation to update the forward-looking statements provided to reflect events that occur or circumstances that exist after the date on which they were made. Any future product, feature, or related specification that may be referenced in this release are for information purposes only and are not commitments to deliver any technology or enhancement. FireEye reserves the right to modify future product or service plans at any time.

About FireEye, Inc.
FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time. FireEye has over 1,900 customers across more than 60 countries, including over 130 of the Fortune 500.

© 2014 FireEye, Inc. All rights reserved. FireEye, Mobile Threat Prevention, Mobile Security Management, Mobile Security, Multi-vector Virtual Execution, Dynamic Threat Intelligence, and Mobile Analysis are registered trademarks or trademarks of FireEye, Inc. in the United States and other countries. Android and Google Play are trademarks of Google Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.

Media Contact
Vitor De Souza
FireEye, Inc.
Email Contact
(415) 699-9838

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Businesses and business units of all sizes can benefit from cloud computing, but many don't want the cost, performance and security concerns of public cloud nor the complexity of building their own private clouds. Today, some cloud vendors are using artificial intelligence (AI) to simplify cloud deployment and management. In his session at 20th Cloud Expo, Ajay Gulati, Co-founder and CEO of ZeroStack, will discuss how AI can simplify cloud operations. He will cover the following topics: why clou...
"We are a custom software development, engineering firm. We specialize in cloud applications from helping customers that have on-premise applications migrating to the cloud, to helping customers design brand new apps in the cloud. And we specialize in mobile apps," explained Peter Di Stefano, Vice President of Marketing at Impiger Technologies, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
@DevOpsSummit taking place June 6-8, 2017 at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @DevOpsSummit at Cloud Expo New York Call for Papers is now open.
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal...
"Qosmos has launched L7Viewer, a network traffic analysis tool, so it analyzes all the traffic between the virtual machine and the data center and the virtual machine and the external world," stated Sebastien Synold, Product Line Manager at Qosmos, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
President Obama recently announced the launch of a new national awareness campaign to "encourage more Americans to move beyond passwords – adding an extra layer of security like a fingerprint or codes sent to your cellphone." The shift from single passwords to multi-factor authentication couldn’t be timelier or more strategic. This session will focus on why passwords alone are no longer effective, and why the time to act is now. In his session at 19th Cloud Expo, Chris Webber, security strateg...
Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU's GDPR have Board Level implications. Managing sensitive data protection will likely result in acquisition criteria, demonstration requests and new requirements. Developers, as part of the pre-planning process and the associated supply chain, could benefit from updating their code libraries and design by incorporating changes. In...
In his session at Cloud Expo, Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, provideed economic scenarios that describe how the rapid adoption of software-defined everything including cloud services, SDDC and open networking will change GDP, industry growth, productivity and jobs. This session also included a drill down for several industries such as finance, social media, cloud service providers and pharmaceuticals.
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
"IoT is going to be a huge industry with a lot of value for end users, for industries, for consumers, for manufacturers. How can we use cloud to effectively manage IoT applications," stated Ian Khan, Innovation & Marketing Manager at Solgeniakhela, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
Successful digital transformation requires new organizational competencies and capabilities. Research tells us that the biggest impediment to successful transformation is human; consequently, the biggest enabler is a properly skilled and empowered workforce. In the digital age, new individual and collective competencies are required. In his session at 19th Cloud Expo, Bob Newhouse, CEO and founder of Agilitiv, drew together recent research and lessons learned from emerging and established compa...