Waters Rankings 2015: Best Cyber-Security Provider ─ FireEye

FireEye wins the inaugural title.

manish-gupta-headshot-2
Manish Gupta

So it seems only right that, on the heels of our cyber-security issue this April, the Waters Rankings create a category for the best cyber-security provider. And while the competition was intense, FireEye, a Milpitas, Calif.-based cyber-security and malware protection firm founded in 2004, is the most deserving of the inaugural title.

It is fitting that the first winner of this category would be such a worthy candidate. The Department of Homeland Security has certified FireEye under the SAFETY Act, making it the first, and currently only, cyber-security vendor to hold the certification.

FireEye's suite of products is designed to address the gambit of cyber-security threats firms face. Clients are offered preventative measures to minimize attack surface areas; develop advanced detection capabilities; increase network, endpoint and event visibility; improve threat intelligence; and adapt to emerging threats and gain forensics for network and endpoint insight.

Despite having been around for more than a decade, FireEye continues to refine its products, a testament to its dedication to evolving with the threat landscape. The past year has been no different: New upgrades were made to the firm's Email Threat Prevention Platform and its Advanced Threat Intelligence. Improvements to blocking and containing email attacks were combined with actionable intelligence and valuable context to help increase responsiveness and decrease detection time.

"The enhancements were made because the vast majority of breaches start with spear phishing email, and by combining these two tools, we can offer our customers superior protection," says Manish Gupta, senior vice president for products at FireEye.

"As attacks change, defensive measures must evolve," Gupta explains. "The next generation of security architecture needs to be adaptive, nimble and have real long-term relevance. FireEye is approaching this with state-of-the-art products, highly skilled security experts, and real-time threat intelligence."

Only users who have a paid subscription or are part of a corporate subscription are able to print or copy content.

To access these options, along with all other subscription benefits, please contact info@waterstechnology.com or view our subscription options here: http://subscriptions.waterstechnology.com/subscribe

You are currently unable to copy this content. Please contact info@waterstechnology.com to find out more.

Most read articles loading...

You need to sign in to use this feature. If you don’t have a WatersTechnology account, please register for a trial.

Sign in
You are currently on corporate access.

To use this feature you will need an individual account. If you have one already please sign in.

Sign in.

Alternatively you can request an individual account here