SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
Case Study




Preeminent Internet Corporation Protects IP and
Infrastructure With Global Deployment of FireEye

Key Components                            As an integral part of their everyday business lives, the
•	 FireEye Web Malware Protection         company’s employees are constantly visiting a vast number
   System security appliances
                                          of websites, spread throughout the world. This behavior
   (14 currently deployed)
                                          brings its own set of challenges.
•	 FireEye Central Management
   System (CMS)
                                          The Senior Manager of Security Operations explained, “Without intending
                                          to do so, our employees were continually infecting their own machines
                                          and introducing malicious code into our internal infrastructure. In order to
                                          combat this we needed a solution that worked at key gateway locations
                                          to evaluate the traffic and alert us to potential threats before they had
                                          the opportunity to do harm.”

                                          A global threat needs a global solution
                                          To provide the necessary protection the Security Manager and his
                                          colleagues researched a wide variety of possible options and ultimately
                                          elected to install multiple FireEye Web Malware Protection System
                                          appliances at strategic points across the company’s worldwide




  Company              Anonymous Internet Corporation

  Industry             Internet, Computer software

  Description          The company is one of the world’s best known Internet corporations. Its Web portal, search
                       engine, and related Web-based digital media portfolio are internationally renowned. The
                       company’s primary Web properties are among the world’s most popular websites.

  Challenge            Identify and deploy a security solution to address advanced threats unknowingly introduced
                       into its internal infrastructure by company staff. With offices distributed across the globe,
                       implementation and ongoing management activities needed to be efficient and reliable.

  Solution             14 FireEye Web Malware Protection System (MPS) appliances deployed throughout the
                       world at all major internal infrastructure egress points. Single-console operational capabilities
                       facilitated through use of the FireEye Central Management System (CMS).

  Benefits             All major gateways protected. FireEye Web MPS appliances integrated into existing security
                       portfolio to provide coverage for staff and infrastructure located throughout the world. Ease
                       of deployment, reliability and dependability of appliances minimize overhead, and the
                       centralized management console facilitates streamlined operational processes.
Case Study


“The FireEye Web MPS appliance is one of those components that never really gets all the credit it deserves
 because we have the confidence that it will do exactly what it was designed to do, and it does!”
 — Senior Manager of Security Operations




office network. In addition to the North American                          The deployment of any piece of sophisticated
headquarters campus, appliances have been                                  equipment has the potential to create significant
deployed in many countries, spanning the globe.                            overhead for the team responsible for managing
                                                                           the implementation. However, the FireEye Web MPS
FireEye is renowned for providing industry-leading
                                                                           appliances have proven themselves to be highly
protection against next generation threats for
                                                                           reliable. The company’s Manager commented, “In
many of the world’s highest profile companies. The
                                                                           the multiple years that we’ve had the appliances
portfolio of FireEye MPS appliances supplement
                                                                           we’ve rarely had any need to call the FireEye
traditional and next generation firewalls, IPS, AV, and
                                                                           support organization, but when we have, the quality
Web gateways protecting critical data and systems
                                                                           and speed of response have been extremely good.
against zero-day Web exploits and multi-protocol
callbacks across diverse protocols.                                        “We’re still in the process of rolling out FireEye
                                                                           appliances to achieve 100 percent coverage
Suspicious code modules are inspected by the
                                                                           of our internal infrastructure but we’ve already
multi-phase FireEye Virtual Execution (VX) engine to
                                                                           been able to dramatically reduce the number of
confirm and nullify zero-day malware and targeted
                                                                           malware infections. Every FireEye device that we’ve
attacks. Suspected malware is isolated and analyzed
                                                                           implemented immediately generates alerts, definitely
in a full-featured virtual execution environment to
                                                                           giving us concern for the integrity of the locations
establish the exact intent and to determine the
                                                                           that are not yet protected.”
appropriate course of action.
                                                                           “From a security perspective, having comprehensive
Distance is no object                                                      visibility across our network is absolutely imperative.
Implementing FireEye Web MPS appliances across                             Prior to this visibility we had no idea if we were under
the world has proven to be a very simple task. The                         threat and when we did find out, it was invariably
Security Operations Manager observed, “Everything                          too late,” reflected the Senior Manager of Security
has been really easy and predictable. You give the                         Operations. “We are all too aware of the seriousness
device an IP address and it just works!”                                   of getting hit by a malware attack. We know that the
                                                                           investment we’re making in FireEye appliances
Using the FireEye CMS, the company’s operations                            is money well spent!”
team can configure, manage, and upgrade the
distributed FireEye security appliances. The CMS
facilitates viewing of the status for the entire group
of appliances using an intuitive interface from
any location.




© 2012 FireEye, Inc. All rights reserved. FireEye is a trademark of FireEye, Inc. All other brands, products, or service names are or may
be trademarks or service marks of their respective owners. – CS.ANONHT.US-EN.032012



FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com

Mais conteúdo relacionado

Mais de FireEye, Inc.

[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by AttackersFireEye, Inc.
 
M-Trends 2015: 최일선에서 본 관점
M-Trends 2015: 최일선에서 본 관점 M-Trends 2015: 최일선에서 본 관점
M-Trends 2015: 최일선에서 본 관점 FireEye, Inc.
 
M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点FireEye, Inc.
 
M-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du frontM-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du frontFireEye, Inc.
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses FireEye, Inc.
 
Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersFireEye, Inc.
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapFireEye, Inc.
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat FireEye, Inc.
 
M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails FireEye, Inc.
 
M-Trends® 2010: The Advanced Persistent Threat
 M-Trends® 2010: The Advanced Persistent Threat M-Trends® 2010: The Advanced Persistent Threat
M-Trends® 2010: The Advanced Persistent ThreatFireEye, Inc.
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey FireEye, Inc.
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...FireEye, Inc.
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response SurveyFireEye, Inc.
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of CompromiseFireEye, Inc.
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber SecurityFireEye, Inc.
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye, Inc.
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsFireEye, Inc.
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye, Inc.
 
FireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye, Inc.
 

Mais de FireEye, Inc. (19)

[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers
 
M-Trends 2015: 최일선에서 본 관점
M-Trends 2015: 최일선에서 본 관점 M-Trends 2015: 최일선에서 본 관점
M-Trends 2015: 최일선에서 본 관점
 
M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点
 
M-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du frontM-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du front
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses
 
Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For Hackers
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security Gap
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat
 
M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails
 
M-Trends® 2010: The Advanced Persistent Threat
 M-Trends® 2010: The Advanced Persistent Threat M-Trends® 2010: The Advanced Persistent Threat
M-Trends® 2010: The Advanced Persistent Threat
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response Survey
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of Compromise
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
 
FireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye Advanced Threat Report
FireEye Advanced Threat Report
 

Preeminent Internet Corporation Protects IP and Infrastructure with FireEye

  • 1. Case Study Preeminent Internet Corporation Protects IP and Infrastructure With Global Deployment of FireEye Key Components As an integral part of their everyday business lives, the • FireEye Web Malware Protection company’s employees are constantly visiting a vast number System security appliances of websites, spread throughout the world. This behavior (14 currently deployed) brings its own set of challenges. • FireEye Central Management System (CMS) The Senior Manager of Security Operations explained, “Without intending to do so, our employees were continually infecting their own machines and introducing malicious code into our internal infrastructure. In order to combat this we needed a solution that worked at key gateway locations to evaluate the traffic and alert us to potential threats before they had the opportunity to do harm.” A global threat needs a global solution To provide the necessary protection the Security Manager and his colleagues researched a wide variety of possible options and ultimately elected to install multiple FireEye Web Malware Protection System appliances at strategic points across the company’s worldwide Company Anonymous Internet Corporation Industry Internet, Computer software Description The company is one of the world’s best known Internet corporations. Its Web portal, search engine, and related Web-based digital media portfolio are internationally renowned. The company’s primary Web properties are among the world’s most popular websites. Challenge Identify and deploy a security solution to address advanced threats unknowingly introduced into its internal infrastructure by company staff. With offices distributed across the globe, implementation and ongoing management activities needed to be efficient and reliable. Solution 14 FireEye Web Malware Protection System (MPS) appliances deployed throughout the world at all major internal infrastructure egress points. Single-console operational capabilities facilitated through use of the FireEye Central Management System (CMS). Benefits All major gateways protected. FireEye Web MPS appliances integrated into existing security portfolio to provide coverage for staff and infrastructure located throughout the world. Ease of deployment, reliability and dependability of appliances minimize overhead, and the centralized management console facilitates streamlined operational processes.
  • 2. Case Study “The FireEye Web MPS appliance is one of those components that never really gets all the credit it deserves because we have the confidence that it will do exactly what it was designed to do, and it does!” — Senior Manager of Security Operations office network. In addition to the North American The deployment of any piece of sophisticated headquarters campus, appliances have been equipment has the potential to create significant deployed in many countries, spanning the globe. overhead for the team responsible for managing the implementation. However, the FireEye Web MPS FireEye is renowned for providing industry-leading appliances have proven themselves to be highly protection against next generation threats for reliable. The company’s Manager commented, “In many of the world’s highest profile companies. The the multiple years that we’ve had the appliances portfolio of FireEye MPS appliances supplement we’ve rarely had any need to call the FireEye traditional and next generation firewalls, IPS, AV, and support organization, but when we have, the quality Web gateways protecting critical data and systems and speed of response have been extremely good. against zero-day Web exploits and multi-protocol callbacks across diverse protocols. “We’re still in the process of rolling out FireEye appliances to achieve 100 percent coverage Suspicious code modules are inspected by the of our internal infrastructure but we’ve already multi-phase FireEye Virtual Execution (VX) engine to been able to dramatically reduce the number of confirm and nullify zero-day malware and targeted malware infections. Every FireEye device that we’ve attacks. Suspected malware is isolated and analyzed implemented immediately generates alerts, definitely in a full-featured virtual execution environment to giving us concern for the integrity of the locations establish the exact intent and to determine the that are not yet protected.” appropriate course of action. “From a security perspective, having comprehensive Distance is no object visibility across our network is absolutely imperative. Implementing FireEye Web MPS appliances across Prior to this visibility we had no idea if we were under the world has proven to be a very simple task. The threat and when we did find out, it was invariably Security Operations Manager observed, “Everything too late,” reflected the Senior Manager of Security has been really easy and predictable. You give the Operations. “We are all too aware of the seriousness device an IP address and it just works!” of getting hit by a malware attack. We know that the investment we’re making in FireEye appliances Using the FireEye CMS, the company’s operations is money well spent!” team can configure, manage, and upgrade the distributed FireEye security appliances. The CMS facilitates viewing of the status for the entire group of appliances using an intuitive interface from any location. © 2012 FireEye, Inc. All rights reserved. FireEye is a trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners. – CS.ANONHT.US-EN.032012 FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com