New products, services, and partners unveiled in Washington D.C. position FireEye as an enterprise cybersecurity vendor Some tech companies are always associated with their first acts. Dell just acquired my first employer, EMC Corporation, in order to expand its enterprise portfolio yet the company will always be linked with personal computers and its founder’s dorm room. F5 has become a nexus that brings together networks and applications but will always retain the moniker of a load balancing company. Bit9 has established itself as a major next-generation endpoint player yet some people can only think of its original focus on white listing.In my opinion, FireEye shares a similar limited reputation as many security professionals equate the company with a single cybersecurity technology, network “sandboxing,” in spite of its acquisitions, progress, and diversification. This perception seems especially true on Wall Street where financial analysts continue to judge FireEye based upon the number of competitive vendors who offer network sandboxes of their own. After attending the FireEye Cyber Defense Summit 2015 this week, it’s clear to me that FireEye has evolved way beyond its stereotypical market image. FireEye displayed a wide array of products and services in Washington D.C. including:1. An integrated enterprise architecture. Before 2010, enterprise threat defense was all about best-of-breed products but now it’s about comprehensive solutions that integrate best-of-breed products into a common architecture. FireEye now offers this type of architecture combining network, endpoint, and cloud-based elements. Aside from cybersecurity functionality, FireEye also announced a number of improvements related to scale, performance, 3rd party integration, and manageability. This is exactly what you do when your enterprise customers’ are using your products and services for managing cybersecurity across tens of thousands of IT assets deployed across facilities around the world. 2. A foundation of threat intelligence. Between its products and IR services, FireEye collects quite a bit of threat intelligence data. FireEye integrates this data with its products for threat prevention and also offers it as a threat intelligence portal for security analytics and threat intelligence sharing. Yes, other vendors offer threat intelligence as well but FireEye believes that its ace-in-the-hole is its ability to correlate pedestrian threat intelligence around IoCs (i.e. IP addresses, domains, URLs, etc.) to specific cyber adversary groups. By doing so, FireEye says it has a better understanding than others about the TTPs used by different groups and the steps they take as part of their cyber-attacks. This is exactly what’s needed to turn raw data into actionable threat intelligence at enterprise organizations. Oh and speaking of threat intelligence, FireEye also announced a new partnership with VISA to provide products and services that combine the two companies’ threat intelligence for retailers and banks. I’ll be keeping my eye on this one. 3. Managed services for the masses. According to ESG research, 28% of organizations admit to having a problematic shortage of IT security skills (Note: I am an ESG employee). So for every organization that has the skill and staff for threat management best practices, there are lots of others who can’t possibly achieve this goal. Recognizing this situation, FireEye put together a threat management service offering last year and seems to be capitalizing on the opportunity as it is winning deals and growing managed services revenue. It is worth noting also that this type of service offering is an especially attractive for the EMEA market where organizations tend to be somewhat smaller than in North America. 4. Enterprise-class professional services. Mandiant is still the go-to firm for incident response but FireEye’s professional services extend beyond putting out fires. Many CISOs need help assessing cybersecurity needs and designing threat intelligence defenses offering security efficacy and operational efficiency. FireEye is picking up incremental business with these types of services working with extremely large customers. I know FireEye pretty well but even I was surprised by the R&D effort going on at the company. Clearly, FireEye understands that network sandboxes alone are no match for sophisticated cybercriminals and well-resourced nation states so it is investing heavily to give its customers a fighting chance against the badest of the bad guys.Yeah I know, FireEye isn’t the only company offering threat management products and services, some competitors do offer strong alternatives, and of course the company has to continue to execute on product development and go-to-market strategy. That said, there are only a handful of cybersecurity companies in the world who truly understand the offensive capabilities of cyber-adversaries and are focused on building a defense-in-depth architectural countermeasures that can protect enterprises at scale. Calling FireEye a sandboxing company is like calling Ernest Hemingway a writer. Neither label does its subject justice. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe