SlideShare una empresa de Scribd logo
1 de 2
Descargar para leer sin conexión
Case Study




Financial Services Company Chooses FireEye
After Competitive Comparison



                                                                                                                   Summary
     Company               S&P 500 Company

        Industry           Financial Services

   Description             Multinational financial services company

    Challenge              Provide protection against Web-based threats that elude traditional firewalls, antivirus and
                           intrusion prevention systems.

        Solution           FireEye Malware Protection System Appliance

        Benefits           Operationally-proven solution fills void in security portfolio to provide verified industry-leading
                           accuracy of detection and mitigation.




A member of the S&P 500 Index®, the company has almost 10,000 employees serving financial services markets
throughout North America, Latin America and Europe. Primarily focused on business customers, its broad portfolio of
products are commonplace components in the toolsets of the world’s leading financial institutions.

The inherent sensitivity of financial information imposes a significant responsibility on all parties entrusted with its
safekeeping. The company’s Chief Security Officer (CSO) elaborated, “The security of each client’s information is
fundamentally important to us. If there is even the merest hint of suspicion that customer details have been compro-
mised in any way, we risk erosion of the foundation of trust on which our company is built.”




“	 definitely feel that we’re getting extreme value for the money. The FireEye solution is filling a huge gap
 I
 that existed in our security architecture.”
 – 	S&P 500 Company Chief Security Officer



FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com
Case Study



Closing the IT Security Gap                                                    7000 appliance into their production environment for
                                                                               evaluation. Despite being installed inline, no discern-
The company had identified Web-based threats as a
                                                                               able impact on network latency was observed. For
likely major vector for data theft. With the perpetual
                                                                               comparison purposes, a competing Damballa prod-
escalation of Web-based threats and their increased
                                                                               uct also was placed into the diverse infrastructure to
sophistication this mandated the need to continually
                                                                               examine the same traffic. The two solutions were tested
evaluate the effectiveness of deployed security defenses.
                                                                               side-by-side for a period of six weeks.
The CSO described, “We had a very robust suite of
traditional tools, such as firewalls, intrusion prevention
                                                                               “We wanted to evaluate the solutions in a real world envi-
systems, antivirus and Web gateways. However, we
                                                                               ronment to see how they performed. We used fundamen-
knew there was a gap in our protection against zero-
                                                                               tal evaluation criteria, such as what was detected, how
day malware-based attacks. Our research showed that
                                                                               quickly things were detected, and the levels of accuracy
we needed a solution that wasn’t subjected to the
                                                                               to measure effectiveness. We looked closely at which
limitations of conventional signature-based analysis.”
                                                                               product legitimately found threats, versus generating false-
The company had a longstanding relationship with                               positives,” stated the company’s CSO.
Damballa Inc. The CSO recalled, “Having evaluated the
                                                                               The results proved to be overwhelming. “We irrefutably
Damballa product, we just didn’t feel confident that it
                                                                               saw a substantially higher caliber of results from the
gave us the level of protection that we were looking for.
                                                                               FireEye appliance over Damballa, and the statistics were
When we expanded our search, one name in particular
                                                                               very easy to substantiate. The FireEye solution found at
kept being mentioned as a leader in the field, and that
                                                                               least two to three times the number of legitimate threats
was FireEye.”
                                                                               than Damballa, even though Damballa generated far
He continued, “We had talked to Palo Alto Networks,                            greater volumes of alerts; in the vast majority of cases,
but didn’t feel comfortable with their approach: We                            these proved to be false-positives.”
are not a big believer in over-loading firewalls with tasks
they were not originally designed to perform because                           Accuracy
they provide sub-par results in those areas.”
                                                                               The detection capabilities of the FireEye Web MPS ap-
We examined the Secure Web Gateway product from                                pliance were so exacting that not a single false-positive
M86 and the IPS product from Sourcefire to round out                           was generated. The CSO commented, “This was fantastic
the evaluation process and found them inadequate to                            for us. We’re interested in quality, not quantity. There was
address our needs. Today’s Web-based threats evolve                            a huge gap between FireEye and Damballa: The in-
too quickly and are far too sophisticated to be detect-                        stances of threats found by the FireEye solution were real
ed by the approaches these companies offered.”                                 and because the FireEye appliance was deployed in-line,
                                                                               these attacks were blocked before entering the corpo-
                                                                               rate network to compromise the hosts. Our resources are
Real World Evaluation                                                          limited so having the level of detection accuracy and
Having decided that a FireEye solution would poten-                            being able to stop the attacks at the gate meant that we
tially meet all required criteria, the company deployed                        didn’t have to re-image the compromised system, which
a FireEye Web Malware Protection System (MPS) series                           was a huge operational cost savings for us.”



Key Components:
FireEye Web Malware Protection System



FireEye is the world leader in combating advanced malware, zero-day and targeted APT attacks that bypass
traditional defenses, such as Firewalls, IPS, AV, and Web gateways!
© 2011 FireEye, Inc. All rights reserved. FireEye, Inc. and all FireEye, Inc. products are either trademarks or registered trademarks of FireEye, Inc.
Other product and company names mentioned herein may be the trademarks of their respective owners. -- CS.SP50092011



FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com

Más contenido relacionado

Destacado (7)

ECE 313 WEEK 5 FINAL PROJECT
ECE 313 WEEK 5 FINAL PROJECTECE 313 WEEK 5 FINAL PROJECT
ECE 313 WEEK 5 FINAL PROJECT
 
56
5656
56
 
La tecnologia
La tecnologiaLa tecnologia
La tecnologia
 
대전오피 인천오피 분당오피 선릉역오피걸 무료성인자료
대전오피 인천오피 분당오피 선릉역오피걸 무료성인자료대전오피 인천오피 분당오피 선릉역오피걸 무료성인자료
대전오피 인천오피 분당오피 선릉역오피걸 무료성인자료
 
천안건마 역삼건마 《안양오피》 인천건마
천안건마 역삼건마 《안양오피》 인천건마천안건마 역삼건마 《안양오피》 인천건마
천안건마 역삼건마 《안양오피》 인천건마
 
Mid America Buying and Selling on eBay syllabus
Mid America Buying and Selling on eBay syllabusMid America Buying and Selling on eBay syllabus
Mid America Buying and Selling on eBay syllabus
 
Barreras no arancelarias 2
Barreras no arancelarias 2Barreras no arancelarias 2
Barreras no arancelarias 2
 

Más de FireEye, Inc.

Más de FireEye, Inc. (20)

Asia Pacific & The Security Gap: Don't Stand Still
Asia Pacific & The Security Gap: Don't Stand StillAsia Pacific & The Security Gap: Don't Stand Still
Asia Pacific & The Security Gap: Don't Stand Still
 
EMEA & The Security Gap: Don't Stand Still
EMEA & The Security Gap: Don't Stand StillEMEA & The Security Gap: Don't Stand Still
EMEA & The Security Gap: Don't Stand Still
 
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
 
M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点
 
[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis[Infographic] Healthcare Cyber Security: Threat Prognosis
[Infographic] Healthcare Cyber Security: Threat Prognosis
 
[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers
 
M-Trends 2015: 최일선에서 본 관점
M-Trends 2015: 최일선에서 본 관점 M-Trends 2015: 최일선에서 본 관점
M-Trends 2015: 최일선에서 본 관점
 
M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点M-Trends 2015 セキュリティ最前線からの視点
M-Trends 2015 セキュリティ最前線からの視点
 
M-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du frontM-Trends 2015 : Les nouvelles du front
M-Trends 2015 : Les nouvelles du front
 
5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses 5 Reasons Cyber Attackers Target Small and Medium Businesses
5 Reasons Cyber Attackers Target Small and Medium Businesses
 
Connected Cares: The Open Road For Hackers
Connected Cares: The Open Road For HackersConnected Cares: The Open Road For Hackers
Connected Cares: The Open Road For Hackers
 
M-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security GapM-Trends® 2013: Attack the Security Gap
M-Trends® 2013: Attack the Security Gap
 
M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat M-Trends® 2012: An Evolving Threat
M-Trends® 2012: An Evolving Threat
 
M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails M-Trends® 2011: When Prevention Fails
M-Trends® 2011: When Prevention Fails
 
M-Trends® 2010: The Advanced Persistent Threat
 M-Trends® 2010: The Advanced Persistent Threat M-Trends® 2010: The Advanced Persistent Threat
M-Trends® 2010: The Advanced Persistent Threat
 
SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey  SANS 2013 Report: Digital Forensics and Incident Response Survey
SANS 2013 Report: Digital Forensics and Incident Response Survey
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
2013 Incident Response Survey
2013 Incident Response Survey2013 Incident Response Survey
2013 Incident Response Survey
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of Compromise
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

S&P 500 Company Chooses FireEye to Combat Web-based Threats

  • 1. Case Study Financial Services Company Chooses FireEye After Competitive Comparison Summary Company S&P 500 Company Industry Financial Services Description Multinational financial services company Challenge Provide protection against Web-based threats that elude traditional firewalls, antivirus and intrusion prevention systems. Solution FireEye Malware Protection System Appliance Benefits Operationally-proven solution fills void in security portfolio to provide verified industry-leading accuracy of detection and mitigation. A member of the S&P 500 Index®, the company has almost 10,000 employees serving financial services markets throughout North America, Latin America and Europe. Primarily focused on business customers, its broad portfolio of products are commonplace components in the toolsets of the world’s leading financial institutions. The inherent sensitivity of financial information imposes a significant responsibility on all parties entrusted with its safekeeping. The company’s Chief Security Officer (CSO) elaborated, “The security of each client’s information is fundamentally important to us. If there is even the merest hint of suspicion that customer details have been compro- mised in any way, we risk erosion of the foundation of trust on which our company is built.” “ definitely feel that we’re getting extreme value for the money. The FireEye solution is filling a huge gap I that existed in our security architecture.” – S&P 500 Company Chief Security Officer FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com
  • 2. Case Study Closing the IT Security Gap 7000 appliance into their production environment for evaluation. Despite being installed inline, no discern- The company had identified Web-based threats as a able impact on network latency was observed. For likely major vector for data theft. With the perpetual comparison purposes, a competing Damballa prod- escalation of Web-based threats and their increased uct also was placed into the diverse infrastructure to sophistication this mandated the need to continually examine the same traffic. The two solutions were tested evaluate the effectiveness of deployed security defenses. side-by-side for a period of six weeks. The CSO described, “We had a very robust suite of traditional tools, such as firewalls, intrusion prevention “We wanted to evaluate the solutions in a real world envi- systems, antivirus and Web gateways. However, we ronment to see how they performed. We used fundamen- knew there was a gap in our protection against zero- tal evaluation criteria, such as what was detected, how day malware-based attacks. Our research showed that quickly things were detected, and the levels of accuracy we needed a solution that wasn’t subjected to the to measure effectiveness. We looked closely at which limitations of conventional signature-based analysis.” product legitimately found threats, versus generating false- The company had a longstanding relationship with positives,” stated the company’s CSO. Damballa Inc. The CSO recalled, “Having evaluated the The results proved to be overwhelming. “We irrefutably Damballa product, we just didn’t feel confident that it saw a substantially higher caliber of results from the gave us the level of protection that we were looking for. FireEye appliance over Damballa, and the statistics were When we expanded our search, one name in particular very easy to substantiate. The FireEye solution found at kept being mentioned as a leader in the field, and that least two to three times the number of legitimate threats was FireEye.” than Damballa, even though Damballa generated far He continued, “We had talked to Palo Alto Networks, greater volumes of alerts; in the vast majority of cases, but didn’t feel comfortable with their approach: We these proved to be false-positives.” are not a big believer in over-loading firewalls with tasks they were not originally designed to perform because Accuracy they provide sub-par results in those areas.” The detection capabilities of the FireEye Web MPS ap- We examined the Secure Web Gateway product from pliance were so exacting that not a single false-positive M86 and the IPS product from Sourcefire to round out was generated. The CSO commented, “This was fantastic the evaluation process and found them inadequate to for us. We’re interested in quality, not quantity. There was address our needs. Today’s Web-based threats evolve a huge gap between FireEye and Damballa: The in- too quickly and are far too sophisticated to be detect- stances of threats found by the FireEye solution were real ed by the approaches these companies offered.” and because the FireEye appliance was deployed in-line, these attacks were blocked before entering the corpo- rate network to compromise the hosts. Our resources are Real World Evaluation limited so having the level of detection accuracy and Having decided that a FireEye solution would poten- being able to stop the attacks at the gate meant that we tially meet all required criteria, the company deployed didn’t have to re-image the compromised system, which a FireEye Web Malware Protection System (MPS) series was a huge operational cost savings for us.” Key Components: FireEye Web Malware Protection System FireEye is the world leader in combating advanced malware, zero-day and targeted APT attacks that bypass traditional defenses, such as Firewalls, IPS, AV, and Web gateways! © 2011 FireEye, Inc. All rights reserved. FireEye, Inc. and all FireEye, Inc. products are either trademarks or registered trademarks of FireEye, Inc. Other product and company names mentioned herein may be the trademarks of their respective owners. -- CS.SP50092011 FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com