Welcome!

News Feed Item

FireEye and Quantum Team to Streamline Adoption of Cybersecurity Forensics Solutions

New Partnership Enables Enterprises to Easily Conduct Cybersecurity Investigations and Improve Security Against Advanced Attacks

SAN JOSE, CA--(Marketwired - July 22, 2014) - Quantum Corp. (NYSE: QTM) today announced the integration of the FireEye Network Forensics Platform (PX) with Quantum's StorNext® scale-out storage. Combining high-speed packet indexing and search from FireEye (NASDAQ: FEYE) with scale-out storage from Quantum, the joint solution provides organizations with access to months of network traffic data to quickly conduct incident response in the event of a breach.

Threat groups are active in an organization's network for a median of 229 days, and conducting incident response can involve costly forensic analysis of disparate log files and network data to determine the extent of the breach. In certain instances, organizations without robust network forensics may never fully know what data left the network, how they were compromised, or whether they have fully removed the threat actor.

The joint FireEye-Quantum solution utilizes the FireEye Network Forensics Platform to capture, index and store connection and packet information at up to 30 million packets per second. Quantum's StorNext 5, the industry's fastest streaming file system, provides the high-performance, scale-out storage repository for forensic data generated by the FireEye platform along with policy-based tiering that enables organizations to match the cost of storage to their need for data access during forensic analysis.

This ability to capture network traffic data in real-time and preserve it for network forensics is critical to resolving a cyber attack. Examining full packet data allows investigators to understand attackers' tools, techniques and procedures, enabling them to improve their network defenses and assist others via threat intelligence sharing. According to the Ponemon Institute, incident response takes approximately four months, on average, to resolve an attack. In contrast, by allowing organizations to keep forensic data longer and examine it faster, the joint FireEye-Quantum solution is designed to give incident response teams the ability to resolve attacks in much less time -- as little as days or hours.

Supporting Quotes
Jon Oltsik, senior principal analyst, Enterprise Strategy Group
"As the sophistication of cyber attacks increases, the ability to analyze the intrusion, contain it, and quickly recover is more critical than ever. By combining their respective expertise with FireEye network forensics and StorNext storage workflows, FireEye and Quantum are offering customers an integrated cybersecurity solution for incident investigation, which can also reduce mean time to resolution and prevent future incidents."

Tim Sullivan, vice president, Enterprise Forensics, FireEye
"We know today the overwhelming majority of organizations have some malicious code in their networks. Given this, what's most important is the ability to understand how that malicious code behaved and if threat actors were able to remove any valuable information from a network. The joint solution from FireEye and Quantum provides customers with the storage, indexing and search capabilities to create a detailed forensics report so an incident response team can quickly determine the extent of a data breach to remediate and provide a detailed report to protect against future attacks. It also provides the reassurance that company boards are looking for and should be a core part of the modern security infrastructure."

Geoff Stedman, senior vice president, StorNext Solutions, Quantum
"Network forensics is becoming an increasingly important tool for cyber incident response, and effective network forensics workflows have two essential ingredients: high-speed packet indexing and highly scalable storage for preserving the network traffic data. Through our partnership with FireEye, a broader range of customers can now benefit from Quantum's expertise in information workflows and StorNext's unique combination of industry-leading performance and scale-out tiered storage."

Availability
The combined FireEye-Quantum solution is currently available.

Additional Resources

About Quantum
Quantum is a leading expert in scale-out storage, archive and data protection. Its StorNext 5 solutions power modern workflows, enabling high-performance, real-time collaboration and keeping content readily accessible for future use and re-monetization. More than 100,000 customers have trusted Quantum to address their most demanding content workflow needs, including top studios, major broadcasters and new, cutting-edge content creators. With Quantum, customers can Be Certain™ they have the end-to-end storage platform to manage assets from ingest through finishing, and into delivery and long-term preservation. See how at www.quantum.com/customerstories.

Quantum, the Quantum logo, Be Certain and StorNext are either registered trademarks or trademarks of Quantum Corporation and its affiliates in the United States and/or other countries. All other trademarks are the property of their respective owners.

"Safe Harbor" Statement: This press release contains "forward-looking" statements. All statements other than statements of historical fact are statements that could be deemed forward-looking statements. Specifically, but without limitation, statements relating to 1) customer benefits and value to customers from using the joint FireEye-Quantum solutions, including Quantum's StorNext solutions and 2) customer demand for and Quantum's future revenue from such solutions, are forward-looking statements within the meaning of the Safe Harbor. All forward-looking statements in this press release are based on information available to Quantum on the date hereof. These statements involve known and unknown risks, uncertainties and other factors that may cause Quantum's actual results to differ materially from those implied by the forward-looking statements. These risks include operational difficulties, unforeseen technical limitations, unexpected changes in market conditions and unanticipated changes in customers' needs or requirements, as well as the risks set forth in Quantum's periodic filings with the Securities and Exchange Commission, including, but not limited to, those risks and uncertainties listed in the section entitled "Risk Factors," in Quantum's Annual Report on Form 10-K filed with the Securities and Exchange Commission on June 6 2014, especially those risks listed in this section under the heading "Our operating results depend on a limited number of products and on new product introductions, which may not be successful, in which case our business, financial condition and operating results may be materially and adversely affected." Quantum expressly disclaims any obligation to update or alter its forward-looking statements, whether as a result of new information, future events or otherwise.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet a...
"We formed Formation several years ago to really address the need for bring complete modernization and software-defined storage to the more classic private cloud marketplace," stated Mark Lewis, Chairman and CEO of Formation Data Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Deploying applications in hybrid cloud environments is hard work. Your team spends most of the time maintaining your infrastructure, configuring dev/test and production environments, and deploying applications across environments – which can be both time consuming and error prone. But what if you could automate provisioning and deployment to deliver error free environments faster? What could you do with your free time?
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...
The best-practices for building IoT applications with Go Code that attendees can use to build their own IoT applications. In his session at @ThingsExpo, Indraneel Mitra, Senior Solutions Architect & Technology Evangelist at Cognizant, provided valuable information and resources for both novice and experienced developers on how to get started with IoT and Golang in a day. He also provided information on how to use Intel Arduino Kit, Go Robotics API and AWS IoT stack to build an application tha...
UpGuard has become a member of the Center for Internet Security (CIS), and will continue to help businesses expand visibility into their cyber risk by providing hardening benchmarks to all customers. By incorporating these benchmarks, UpGuard's CSTAR solution builds on its lead in providing the most complete assessment of both internal and external cyber risk. CIS benchmarks are a widely accepted set of hardening guidelines that have been publicly available for years. Numerous solutions exist t...
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...
Verizon Communications Inc. (NYSE, Nasdaq: VZ) and Yahoo! Inc. (Nasdaq: YHOO) have entered into a definitive agreement under which Verizon will acquire Yahoo's operating business for approximately $4.83 billion in cash, subject to customary closing adjustments. Yahoo informs, connects and entertains a global audience of more than 1 billion monthly active users** -- including 600 million monthly active mobile users*** through its search, communications and digital content products. Yahoo also co...
"Avere Systems is a hybrid cloud solution provider. We have customers that want to use cloud storage and we have customers that want to take advantage of cloud compute," explained Rebecca Thompson, VP of Marketing at Avere Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Choosing the right cloud for your workloads is a balancing act that can cost your organization time, money and aggravation - unless you get it right the first time. Economics, speed, performance, accessibility, administrative needs and security all play a vital role in dictating your approach to the cloud. Without knowing the right questions to ask, you could wind up paying for capacity you'll never need or underestimating the resources required to run your applications.
"We view the cloud not really as a specific technology but as a way of doing business and that way of doing business is transforming the way software, infrastructure and services are being delivered to business," explained Matthew Rosen, CEO and Director at Fusion, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.