Learn How a Virtual Networking Approach Can Strengthen the Security of Federal Networks REGISTER >
See the complete list of top threat intelligence companies.
FireEye offers a single platform that blends security technologies, threat intelligence and Mandiant consulting. Founded in 2004, FireEye has more than 5,800 customers across 67 countries, including more than 40 percent of the Forbes Global 2000.
FireEye iSIGHT Threat Intelligence adds context and priority to global threats before, during and after an attack. Data is gleaned from the adversarial underground, virtual network detection sensors and Mandiant IR investigations from the world's largest breaches. "Customers can choose from iSIGHT Intelligence Subscriptions, Cyber Threat Intelligence Services, and Forward Deployed Analysts to build their cyber intelligence capabilities," said Kyrk Storer, Senior Manager Communications, FireEye
iSIGHT Threat Intelligence uses no agents.
Markets and Use Cases
FireEye iSIGHT Intelligence has the largest market share in North America and is growing overseas, according to Storer. Industries such as financial services, government and IT are some of its strongest customers.
FireEye has more than 1,000 experts responding to incidents and researching attacks.
FIPS, Common Criteria, Department of Homeland Security Safety Act Certification.
FireEye iSIGHT Intelligence powers the FireEye Helix platform to enable organizations to simplify, integrate and automate their security operations. This intelligence-led approach makes it possible for customers to go from alert-to-fix in seconds.
This threat intelligence platform is delivered by API integration, intelligence portal and email delivery.
Subscriptions range from $100,000 to $500,000.
Free Security Resources
Detect and Investigate Malicious IP Activities in SIEM with Predictive Threat Intelligence
You already know how good Splunk is at correlating and analyzing operational data. But did you know that when you combine real-time, predictive threat intelligence with your IP logs, Splunk can actually alert you to perimeter attacks and accelerate the discovery and response to advanced online attacks?
- Continuously monitor and analyze over 4.3 billion IP addresses and affiliated IPs, URLs, files and mobile apps for highly accurate, actionable, real-time intelligence
- Identify IPs with a history of malicious behavior and predict which IPs pose a greater risk of a future attack
- Integration is fast, easy and will help your SIEM deliver greater depth and security insight into threats than you ever imagined possible