SlideShare une entreprise Scribd logo
1  sur  2
Télécharger pour lire hors ligne
Case Study




Financial Services Company Chooses FireEye
After Competitive Comparison



                                                                                                                   Summary
     Company               S&P 500 Company

        Industry           Financial Services

   Description             Multinational financial services company

    Challenge              Provide protection against Web-based threats that elude traditional firewalls, antivirus and
                           intrusion prevention systems.

        Solution           FireEye Malware Protection System Appliance

        Benefits           Operationally-proven solution fills void in security portfolio to provide verified industry-leading
                           accuracy of detection and mitigation.




A member of the S&P 500 Index®, the company has almost 10,000 employees serving financial services markets
throughout North America, Latin America and Europe. Primarily focused on business customers, its broad portfolio of
products are commonplace components in the toolsets of the world’s leading financial institutions.

The inherent sensitivity of financial information imposes a significant responsibility on all parties entrusted with its
safekeeping. The company’s Chief Security Officer (CSO) elaborated, “The security of each client’s information is
fundamentally important to us. If there is even the merest hint of suspicion that customer details have been compro-
mised in any way, we risk erosion of the foundation of trust on which our company is built.”




“	 definitely feel that we’re getting extreme value for the money. The FireEye solution is filling a huge gap
 I
 that existed in our security architecture.”
 – 	S&P 500 Company Chief Security Officer



FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com
Case Study



Closing the IT Security Gap                                                    7000 appliance into their production environment for
                                                                               evaluation. Despite being installed inline, no discern-
The company had identified Web-based threats as a
                                                                               able impact on network latency was observed. For
likely major vector for data theft. With the perpetual
                                                                               comparison purposes, a competing Damballa prod-
escalation of Web-based threats and their increased
                                                                               uct also was placed into the diverse infrastructure to
sophistication this mandated the need to continually
                                                                               examine the same traffic. The two solutions were tested
evaluate the effectiveness of deployed security defenses.
                                                                               side-by-side for a period of six weeks.
The CSO described, “We had a very robust suite of
traditional tools, such as firewalls, intrusion prevention
                                                                               “We wanted to evaluate the solutions in a real world envi-
systems, antivirus and Web gateways. However, we
                                                                               ronment to see how they performed. We used fundamen-
knew there was a gap in our protection against zero-
                                                                               tal evaluation criteria, such as what was detected, how
day malware-based attacks. Our research showed that
                                                                               quickly things were detected, and the levels of accuracy
we needed a solution that wasn’t subjected to the
                                                                               to measure effectiveness. We looked closely at which
limitations of conventional signature-based analysis.”
                                                                               product legitimately found threats, versus generating false-
The company had a longstanding relationship with                               positives,” stated the company’s CSO.
Damballa Inc. The CSO recalled, “Having evaluated the
                                                                               The results proved to be overwhelming. “We irrefutably
Damballa product, we just didn’t feel confident that it
                                                                               saw a substantially higher caliber of results from the
gave us the level of protection that we were looking for.
                                                                               FireEye appliance over Damballa, and the statistics were
When we expanded our search, one name in particular
                                                                               very easy to substantiate. The FireEye solution found at
kept being mentioned as a leader in the field, and that
                                                                               least two to three times the number of legitimate threats
was FireEye.”
                                                                               than Damballa, even though Damballa generated far
He continued, “We had talked to Palo Alto Networks,                            greater volumes of alerts; in the vast majority of cases,
but didn’t feel comfortable with their approach: We                            these proved to be false-positives.”
are not a big believer in over-loading firewalls with tasks
they were not originally designed to perform because                           Accuracy
they provide sub-par results in those areas.”
                                                                               The detection capabilities of the FireEye Web MPS ap-
We examined the Secure Web Gateway product from                                pliance were so exacting that not a single false-positive
M86 and the IPS product from Sourcefire to round out                           was generated. The CSO commented, “This was fantastic
the evaluation process and found them inadequate to                            for us. We’re interested in quality, not quantity. There was
address our needs. Today’s Web-based threats evolve                            a huge gap between FireEye and Damballa: The in-
too quickly and are far too sophisticated to be detect-                        stances of threats found by the FireEye solution were real
ed by the approaches these companies offered.”                                 and because the FireEye appliance was deployed in-line,
                                                                               these attacks were blocked before entering the corpo-
                                                                               rate network to compromise the hosts. Our resources are
Real World Evaluation                                                          limited so having the level of detection accuracy and
Having decided that a FireEye solution would poten-                            being able to stop the attacks at the gate meant that we
tially meet all required criteria, the company deployed                        didn’t have to re-image the compromised system, which
a FireEye Web Malware Protection System (MPS) series                           was a huge operational cost savings for us.”



Key Components:
FireEye Web Malware Protection System



FireEye is the world leader in combating advanced malware, zero-day and targeted APT attacks that bypass
traditional defenses, such as Firewalls, IPS, AV, and Web gateways!
© 2011 FireEye, Inc. All rights reserved. FireEye, Inc. and all FireEye, Inc. products are either trademarks or registered trademarks of FireEye, Inc.
Other product and company names mentioned herein may be the trademarks of their respective owners. -- CS.SP50092011



FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com

Contenu connexe

En vedette (7)

ECE 313 WEEK 5 FINAL PROJECT
ECE 313 WEEK 5 FINAL PROJECTECE 313 WEEK 5 FINAL PROJECT
ECE 313 WEEK 5 FINAL PROJECT
 
56
5656
56
 
La tecnologia
La tecnologiaLa tecnologia
La tecnologia
 
대전오피 인천오피 분당오피 선릉역오피걸 무료성인자료
대전오피 인천오피 분당오피 선릉역오피걸 무료성인자료대전오피 인천오피 분당오피 선릉역오피걸 무료성인자료
대전오피 인천오피 분당오피 선릉역오피걸 무료성인자료
 
천안건마 역삼건마 《안양오피》 인천건마
천안건마 역삼건마 《안양오피》 인천건마천안건마 역삼건마 《안양오피》 인천건마
천안건마 역삼건마 《안양오피》 인천건마
 
Mid America Buying and Selling on eBay syllabus
Mid America Buying and Selling on eBay syllabusMid America Buying and Selling on eBay syllabus
Mid America Buying and Selling on eBay syllabus
 
Barreras no arancelarias 2
Barreras no arancelarias 2Barreras no arancelarias 2
Barreras no arancelarias 2
 

Plus de FireEye, Inc.

Plus de FireEye, Inc. (20)

Asia Pacific & The Security Gap: Don't Stand Still
Asia Pacific & The Security Gap: Don't Stand StillAsia Pacific & The Security Gap: Don't Stand Still
Asia Pacific & The Security Gap: Don't Stand Still
 
EMEA & The Security Gap: Don't Stand Still
EMEA & The Security Gap: Don't Stand StillEMEA & The Security Gap: Don't Stand Still
EMEA & The Security Gap: Don't Stand Still
 
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
 
M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点
 
[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis
 
[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers
 
M-Trends 2015: 최일선에서 본 관점
M-Trends 2015: 최일선에서 본 관점 M-Trends 2015: 최일선에서 본 관점
M-Trends 2015: 최일선에서 본 관점
 
M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点
 
M-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du frontM-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du front
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses
 
Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For Hackers
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security Gap
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat
 
M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails
 
M-Trends® 2010: The Advanced Persistent Threat
 M-Trends® 2010: The Advanced Persistent Threat M-Trends® 2010: The Advanced Persistent Threat
M-Trends® 2010: The Advanced Persistent Threat
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response Survey
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of Compromise
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

S&P 500 Company Chooses FireEye to Combat Web-based Threats

  • 1. Case Study Financial Services Company Chooses FireEye After Competitive Comparison Summary Company S&P 500 Company Industry Financial Services Description Multinational financial services company Challenge Provide protection against Web-based threats that elude traditional firewalls, antivirus and intrusion prevention systems. Solution FireEye Malware Protection System Appliance Benefits Operationally-proven solution fills void in security portfolio to provide verified industry-leading accuracy of detection and mitigation. A member of the S&P 500 Index®, the company has almost 10,000 employees serving financial services markets throughout North America, Latin America and Europe. Primarily focused on business customers, its broad portfolio of products are commonplace components in the toolsets of the world’s leading financial institutions. The inherent sensitivity of financial information imposes a significant responsibility on all parties entrusted with its safekeeping. The company’s Chief Security Officer (CSO) elaborated, “The security of each client’s information is fundamentally important to us. If there is even the merest hint of suspicion that customer details have been compro- mised in any way, we risk erosion of the foundation of trust on which our company is built.” “ definitely feel that we’re getting extreme value for the money. The FireEye solution is filling a huge gap I that existed in our security architecture.” – S&P 500 Company Chief Security Officer FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com
  • 2. Case Study Closing the IT Security Gap 7000 appliance into their production environment for evaluation. Despite being installed inline, no discern- The company had identified Web-based threats as a able impact on network latency was observed. For likely major vector for data theft. With the perpetual comparison purposes, a competing Damballa prod- escalation of Web-based threats and their increased uct also was placed into the diverse infrastructure to sophistication this mandated the need to continually examine the same traffic. The two solutions were tested evaluate the effectiveness of deployed security defenses. side-by-side for a period of six weeks. The CSO described, “We had a very robust suite of traditional tools, such as firewalls, intrusion prevention “We wanted to evaluate the solutions in a real world envi- systems, antivirus and Web gateways. However, we ronment to see how they performed. We used fundamen- knew there was a gap in our protection against zero- tal evaluation criteria, such as what was detected, how day malware-based attacks. Our research showed that quickly things were detected, and the levels of accuracy we needed a solution that wasn’t subjected to the to measure effectiveness. We looked closely at which limitations of conventional signature-based analysis.” product legitimately found threats, versus generating false- The company had a longstanding relationship with positives,” stated the company’s CSO. Damballa Inc. The CSO recalled, “Having evaluated the The results proved to be overwhelming. “We irrefutably Damballa product, we just didn’t feel confident that it saw a substantially higher caliber of results from the gave us the level of protection that we were looking for. FireEye appliance over Damballa, and the statistics were When we expanded our search, one name in particular very easy to substantiate. The FireEye solution found at kept being mentioned as a leader in the field, and that least two to three times the number of legitimate threats was FireEye.” than Damballa, even though Damballa generated far He continued, “We had talked to Palo Alto Networks, greater volumes of alerts; in the vast majority of cases, but didn’t feel comfortable with their approach: We these proved to be false-positives.” are not a big believer in over-loading firewalls with tasks they were not originally designed to perform because Accuracy they provide sub-par results in those areas.” The detection capabilities of the FireEye Web MPS ap- We examined the Secure Web Gateway product from pliance were so exacting that not a single false-positive M86 and the IPS product from Sourcefire to round out was generated. The CSO commented, “This was fantastic the evaluation process and found them inadequate to for us. We’re interested in quality, not quantity. There was address our needs. Today’s Web-based threats evolve a huge gap between FireEye and Damballa: The in- too quickly and are far too sophisticated to be detect- stances of threats found by the FireEye solution were real ed by the approaches these companies offered.” and because the FireEye appliance was deployed in-line, these attacks were blocked before entering the corpo- rate network to compromise the hosts. Our resources are Real World Evaluation limited so having the level of detection accuracy and Having decided that a FireEye solution would poten- being able to stop the attacks at the gate meant that we tially meet all required criteria, the company deployed didn’t have to re-image the compromised system, which a FireEye Web Malware Protection System (MPS) series was a huge operational cost savings for us.” Key Components: FireEye Web Malware Protection System FireEye is the world leader in combating advanced malware, zero-day and targeted APT attacks that bypass traditional defenses, such as Firewalls, IPS, AV, and Web gateways! © 2011 FireEye, Inc. All rights reserved. FireEye, Inc. and all FireEye, Inc. products are either trademarks or registered trademarks of FireEye, Inc. Other product and company names mentioned herein may be the trademarks of their respective owners. -- CS.SP50092011 FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com