View

Sorting

Products found: 2

logo
Offer a reference bonus
1.00

FireEye FX

File content security, which would cover online file shares, portable file storage and services such as SharePoint, is a significant concern for your networks. Advanced cyber attackers can breach file content security and then launch advanced attacks capable of compromising key systems in an organization. FireEye File Content Security (FX Series) products help prevent, detect and respond to cyber attacks by scanning file content for signs of malicious threats. These threats might be brought into an organization from outside sources, such as online file sharing services and portable file storage devices. Benefits of File Content Security Prevent file share-based cyber attacks Block malware discovered in network file storage and content sharing systems Detect advanced malware Scan CIFS and NFS-compatible file shares, on-demand or on a schedule, without affecting server performance Leverage WebDAV protocol to proactively scan SharePoint document management systems Identify known and unknown latent malware that bypasses conventional antivirus products Respond to incidents faster Scan selected or all files, hard drives and trusted and untrusted file domains Analyze a broad set of file types, such as PDF, MS-Office, vCards, ZIP/RAR/TNEF, Quicktime, MP3, Real Player, JPG, PNG Integrate with other FireEye cyber security products, sharing and applying intelligence
... Learn more
-
ROI-
-
8
11
logo
Offer a reference bonus
1.40

FireEye NX

By leveraging FireEye’s unique technologies and threat intelligence, FireEye Network Security detects what other security solutions miss, providing holistic security from the perimeter to the network core. Ideal for next-generation networks that need flexible and scalable deployment options, FireEye Network Security offerings provide strong security for a myriad of environments and customer needs. FireEye Network Security is designed for high-performance, pervasive and consistent protection against threats across your organization with integrated security workflow and actionable contextual intelligence. It enables you to:
  • Accurately detect and immediately stop attacks that evade other security devices, including file-based sandboxes
  • Understand and prioritize critical alerts with reliable execution evidence and contextual insights
  • Proactively defend and investigate threats with tactical intelligence from FireEye or a third party using the Structured Threat Information eXpression (STIX) format as well as contextual and strategic threat intelligence
  • Deploy Network Security with integrated all-in-one hardware appliances or with a scalable and flexible on-premise or cloud-based distributed model
  • Future-proof your investment with an extensible, modular architecture
  • Provide your Microsoft Windows and Apple OS X users with the same level of threat protection
  • Achieve quick protection with machine-, attacker- and victim-based intelligence applied as updates to your defenses every 60 minutes
  • Shorten the solution payback period by eliminating the operational cost of triaging alerts manually
  • Integrate and automate your security workflow to easily prioritize, investigate and respond to alerts across different threat vectors
... Learn more
-
ROI-
-
12
20

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.