SlideShare uma empresa Scribd logo
1 de 2
Baixar para ler offline
Case Study




U.C. Berkeley EECS Engages FireEye for
Advanced Malware Protection


                                                                                                                    Summary
     Company               University of California Berkeley

        Industry           Education

   Description             The University of California, Berkeley is internationally recognized for excellence and pioneering
                           achievements across many disciplines. The university has over 1,700 full-time faculty members
                           and 35,000 students. The Department of Electrical Engineering and Computer Science (EECS)
                           offers one of the strongest research and instructional programs anywhere in the world.


    Challenge              Identify and deploy solution to address shortcomings in existing security product portfolio, while
                           minimizing operational overhead and impact on users. To achieve the highest possible level of
                           threat detection and remediation precision.

        Solution           Deployment of FireEye Web Malware Protection System 4000 Series Appliance, FireEye Malware
                           Protection Cloud and FireEye Malware Analysis Appliance.

        Benefits           Highly accurate malware detection with nominal false positives, and real-time confirmation
                           of malicious activity, independent of known signature- and pattern-based threats. Easy imple-
                           mentation, requiring no changes to existing processes or infrastructure, and low operational
                           overhead.


Located adjacent to San Francisco Bay, University of California Berkeley is ranked as the world’s premier public university
according to a recent U.S. News & World Report. As the university’s largest single department, Electrical Engineering and
Computer Science (EECS) is home to more than 1,500 undergraduate and graduate students. The pace of innovation and
leading-edge research within the department combine to form a dynamic and stimulating environment for students, staff
and faculty. For the EECS information technology team, attaining a balance that continues to foster learning, creativity and
breakthrough thinking, without imposing unduly restrictive policies, is a constant challenge.



“	 ireEye keeps us ahead of the onslaught of continually escalating Web-based threats. I trust FireEye to give me
 F
 the definitive expert view on how to protect our very unique environment.”
 – 	Fred Archibald, Computing Infrastructure Manager, Department of Electrical Engineering and Computer Science,
 		 University of California, Berkeley



FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com
Case Study



                                                                               are shared with subscribers of the FireEye Malware
Achieving Results When Others Failed
                                                                               Protection Cloud: Being a member of the worldwide
Following a successful proof of concept evaluation,                            FireEye community gives us a truly global perspec-
a FireEye Web Malware Protection System (MPS)                                  tive on malware outbreaks.”
4000 Series appliance was deployed to help protect
the department. Fred Archibald, computing infra-                               Irrefutable Proof
structure manager for EECS, recalled, “We looked
                                                                               A consequence of working for a world-renowned
closely at several competing products, but the FireEye
                                                                               university is the inherent expertise of the user popula-
appliance was very compelling. It was extremely
                                                                               tion. Archibald explained, “Many of our users possess
easy to install, actually taking less than half an hour
                                                                               a highly detailed knowledge of computer science-
in total but more importantly it was immediately able
                                                                               related fields. This sometimes leads to requests for
to identify threats that had not been detected by
                                                                               tangible proof for the reasons a potentially malicious
the existing multiple layers of protection.”
                                                                               piece of code has been intercepted or isolated.
The FireEye Web Malware Protection System is spe-                              Unlike conventional defenses, the FireEye MPS actu-
cifically designed to be deployed alongside other                              ally confirms malicious activity and provides detailed
security gateways to identify zero-day threats that                            descriptions of what was found. In addition, we can
policy- and signature-based firewalls, Web gate-                               use the FireEye Malware Analysis Appliance to do a
ways, intrusion prevention and anti-virus systems, fail                        forensic investigation and this enables me to con-
to detect. A highly sophisticated virtual execution                            vince even the most skeptical of users that an at-
engine identifies both unknown and known malware.                              tack was real, and our remediation actions justified.”


Archibald observed, “Cyber criminals are making                                The FireEye Web Malware Protection System has a
substantial and ever-increasing investments in mal-                            well deserved reputation for its effectiveness and
ware, and new threats are constantly being intro-                              extremely low operational overhead. Archibald
duced: There is no way that even a really good suite                           concurred, “Four years on and FireEye continues to
of traditional security applications can cope. The                             deliver outstanding protection. It requires minimal
FireEye MPS is so effective because it doesn’t rely on                         routine management and delivers precision results
existing signatures or patterns. It searches in real-                          with negligible false positives. It does the job so well
time for any unusual or suspicious activities to deter-                        that I can focus on other tasks, feeling confident
mine if a behavior poses a legitimate threat. Once                             that we are protected.”
something malicious is detected, specific details



Key Components:
FireEye Web Malware Protection System 4000 Series
FireEye Malware Protection Cloud
FireEye Malware Analysis Appliance



FireEye is the world leader in combating advanced malware, zero-day and targeted APT attacks that bypass
traditional defenses, such as Firewalls, IPS, AV, and Web gateways!
© 2011 FireEye, Inc. All rights reserved. FireEye, Inc. and all FireEye, Inc. products are either trademarks or registered trademarks of FireEye, Inc.
Other product and company names mentioned herein may be the trademarks of their respective owners. -- CS.WMPS052011



FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com

Mais conteúdo relacionado

Mais de FireEye, Inc.

M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点FireEye, Inc.
 
M-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du frontM-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du frontFireEye, Inc.
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses FireEye, Inc.
 
Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersFireEye, Inc.
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapFireEye, Inc.
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat FireEye, Inc.
 
M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails FireEye, Inc.
 
M-Trends® 2010: The Advanced Persistent Threat
 M-Trends® 2010: The Advanced Persistent Threat M-Trends® 2010: The Advanced Persistent Threat
M-Trends® 2010: The Advanced Persistent ThreatFireEye, Inc.
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey FireEye, Inc.
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...FireEye, Inc.
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response SurveyFireEye, Inc.
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of CompromiseFireEye, Inc.
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber SecurityFireEye, Inc.
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye, Inc.
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsFireEye, Inc.
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye, Inc.
 
FireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye, Inc.
 

Mais de FireEye, Inc. (17)

M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点
 
M-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du frontM-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du front
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses
 
Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For Hackers
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security Gap
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat
 
M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails
 
M-Trends® 2010: The Advanced Persistent Threat
 M-Trends® 2010: The Advanced Persistent Threat M-Trends® 2010: The Advanced Persistent Threat
M-Trends® 2010: The Advanced Persistent Threat
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response Survey
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of Compromise
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
 
FireEye Advanced Threat Report
FireEye Advanced Threat ReportFireEye Advanced Threat Report
FireEye Advanced Threat Report
 

Último

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 

Último (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 

U.C. Berkeley Engages FireEye for Advanced Malware Protection

  • 1. Case Study U.C. Berkeley EECS Engages FireEye for Advanced Malware Protection Summary Company University of California Berkeley Industry Education Description The University of California, Berkeley is internationally recognized for excellence and pioneering achievements across many disciplines. The university has over 1,700 full-time faculty members and 35,000 students. The Department of Electrical Engineering and Computer Science (EECS) offers one of the strongest research and instructional programs anywhere in the world. Challenge Identify and deploy solution to address shortcomings in existing security product portfolio, while minimizing operational overhead and impact on users. To achieve the highest possible level of threat detection and remediation precision. Solution Deployment of FireEye Web Malware Protection System 4000 Series Appliance, FireEye Malware Protection Cloud and FireEye Malware Analysis Appliance. Benefits Highly accurate malware detection with nominal false positives, and real-time confirmation of malicious activity, independent of known signature- and pattern-based threats. Easy imple- mentation, requiring no changes to existing processes or infrastructure, and low operational overhead. Located adjacent to San Francisco Bay, University of California Berkeley is ranked as the world’s premier public university according to a recent U.S. News & World Report. As the university’s largest single department, Electrical Engineering and Computer Science (EECS) is home to more than 1,500 undergraduate and graduate students. The pace of innovation and leading-edge research within the department combine to form a dynamic and stimulating environment for students, staff and faculty. For the EECS information technology team, attaining a balance that continues to foster learning, creativity and breakthrough thinking, without imposing unduly restrictive policies, is a constant challenge. “ ireEye keeps us ahead of the onslaught of continually escalating Web-based threats. I trust FireEye to give me F the definitive expert view on how to protect our very unique environment.” – Fred Archibald, Computing Infrastructure Manager, Department of Electrical Engineering and Computer Science, University of California, Berkeley FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com
  • 2. Case Study are shared with subscribers of the FireEye Malware Achieving Results When Others Failed Protection Cloud: Being a member of the worldwide Following a successful proof of concept evaluation, FireEye community gives us a truly global perspec- a FireEye Web Malware Protection System (MPS) tive on malware outbreaks.” 4000 Series appliance was deployed to help protect the department. Fred Archibald, computing infra- Irrefutable Proof structure manager for EECS, recalled, “We looked A consequence of working for a world-renowned closely at several competing products, but the FireEye university is the inherent expertise of the user popula- appliance was very compelling. It was extremely tion. Archibald explained, “Many of our users possess easy to install, actually taking less than half an hour a highly detailed knowledge of computer science- in total but more importantly it was immediately able related fields. This sometimes leads to requests for to identify threats that had not been detected by tangible proof for the reasons a potentially malicious the existing multiple layers of protection.” piece of code has been intercepted or isolated. The FireEye Web Malware Protection System is spe- Unlike conventional defenses, the FireEye MPS actu- cifically designed to be deployed alongside other ally confirms malicious activity and provides detailed security gateways to identify zero-day threats that descriptions of what was found. In addition, we can policy- and signature-based firewalls, Web gate- use the FireEye Malware Analysis Appliance to do a ways, intrusion prevention and anti-virus systems, fail forensic investigation and this enables me to con- to detect. A highly sophisticated virtual execution vince even the most skeptical of users that an at- engine identifies both unknown and known malware. tack was real, and our remediation actions justified.” Archibald observed, “Cyber criminals are making The FireEye Web Malware Protection System has a substantial and ever-increasing investments in mal- well deserved reputation for its effectiveness and ware, and new threats are constantly being intro- extremely low operational overhead. Archibald duced: There is no way that even a really good suite concurred, “Four years on and FireEye continues to of traditional security applications can cope. The deliver outstanding protection. It requires minimal FireEye MPS is so effective because it doesn’t rely on routine management and delivers precision results existing signatures or patterns. It searches in real- with negligible false positives. It does the job so well time for any unusual or suspicious activities to deter- that I can focus on other tasks, feeling confident mine if a behavior poses a legitimate threat. Once that we are protected.” something malicious is detected, specific details Key Components: FireEye Web Malware Protection System 4000 Series FireEye Malware Protection Cloud FireEye Malware Analysis Appliance FireEye is the world leader in combating advanced malware, zero-day and targeted APT attacks that bypass traditional defenses, such as Firewalls, IPS, AV, and Web gateways! © 2011 FireEye, Inc. All rights reserved. FireEye, Inc. and all FireEye, Inc. products are either trademarks or registered trademarks of FireEye, Inc. Other product and company names mentioned herein may be the trademarks of their respective owners. -- CS.WMPS052011 FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com