Merger adds security intelligence, endpoint forensics, and services to FireEye market momentum As an industry veteran, I’ve witnessed my share of IT transformations. Yup, I’m old enough to remember the transitions from mainframes to mini-computers, to client/server computing, to Internet computing, etc. Each of these IT tectonic shifts also led to changes in the balance of power within the industry. IBM owned business computing in the 1970s with its 370 mainframe but the transition to client/server gave rise to a number of new stars like HP, Microsoft, Oracle, and Sun.The current security industry is going through a similar transition. Security “mainframe” products like network firewalls and endpoint antivirus software are giving way to new types of products and services that combine real-time security intelligence, endpoint/network defenses, and security analytics/forensics. Why? Enterprises simply can’t continue to rely on security technologies that are becoming less-and-less effective and easily circumvented by an army of hacktivists, cyber crooks, and nation states.While this security industry paradigm shift is well understood, few companies have capitalized as much as FireEye. Over the past few years, the company had the right design, product, and aggressive go-to-market strategy to crash the enterprise security party and proceed to a wildly-successful IPO. Now, just as security royalty and Sand Hill Rd. upstarts are planning their FireEye incursions, the company struck again with its bold acquisition of the security “big bang theory” firm, Mandiant.Why is this a potential game-changer? FireEye continues to drive a new model for malware detection but it is missing some critical pieces like endpoint coverage and forensic/analytics capabilities. In the past, FireEye depended upon partners like Bit9, Blue Coat (Solera), and Guidance Software in these areas but this wasn’t going to help the company fully capitalize on the ongoing security market transition over the long-term. With Mandiant in hand, FireEye becomes a much more formidable company as it gains:• An endpoint platform. While Mandiant is known for forensic clean-up work, it also sells sophisticated software for endpoint malware detection and forensics. Network/endpoint visibility and coverage is exactly what the market is asking for. • Additional security intelligence. FireEye was already pretty solid here but it doesn’t hurt to throw in additional security intelligence from a market leader. FireEye can now jump into the burgeoning market for stand-alone security intelligence – especially in government, financial services, and technology markets.• Professional services. Mandiant has a reputation for its post-breach firefighting but this is just a fraction of what this talented team can do. Given the pervasive security skills shortage, FireEye shouldn’t have any trouble finding work and growing its services business over time.FireEye just moved beyond product to an anti-malware architecture for prevention, detection, and response. It also has the security intelligence and professional/managed services to establish CISO relationships, become a key security partner, and grab lucrative enterprise deals.FireEye is also betting that it can capitalize on Mandiant’s relationships with government agencies and federal integrators to grab its share of future cybersecurity spending inside the Beltway. On the flip side, FireEye hopes to give Mandiant something it never had – an enterprise-savvy sales and marketing team who can translate Mandiant federal security geek-speak into CISO value.So what happens next? Industry players like Cisco, IBM, McAfee, Palo Alto Networks, and Trend Micro will keep an eye on FireEye/Mandiant while claiming that they already have the pieces in place to compete. Bit9 and perhaps Guidance may be acquired and Sand Hill Rd. will likely aggressively push a portfolio of companies at Check Point, Juniper, and Symantec. In the meantime, FireEye will be well positioned for information security market transitions and immediate enterprise requirements. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe