Search DubaiPRNetwork.com

Home >> Technology

FireEye Secure Email Gateway Protects Against Threats Others Miss

Wednesday, March 6, 2019/ Editor -  

Share

Home >> Technology
New secure email gateway from FireEye delivers robust inbound and outbound email scanning to defend against the evolving threat landscape 
 
United Arab Emirates -  March 6, 2019:  FireEye, Inc. (NASDAQ: FEYE), the intelligence-led security company, today announced that FireEye® Email Security now provides full secure email gateway (SEG) functionality – blocking inbound and outbound malware, phishing URLs, impersonation techniques and spam.
 
According to FireEye’s latest Email Threat Report, 90 percent of email attacks were malware-less, with phishing attacks serving as the greatest offender, making up 81 percent of this subset.
 
FireEye Email Security continues to detect an average of over 14,000 emails with malicious attachments or URLs per customer per month that get past other solutions. With email continuing to be the most commonly used channel for both opportunistic and targeted attacks, organizations can’t afford to overlook these vulnerabilities.
 
First to Observe, Block and Adapt
 
FireEye Email Security delivers leading detection and protection capabilities for email-based threats within one singular solution. By consolidating the email security stack with FireEye, organizations can also minimize the impact email-borne threats have on their network and employees, while often benefiting from cost savings.
 
“It’s easy for organizations to become overly reliant upon blocking-based protection, until they realize what’s been slipping through. We see this time and time again in our incident response engagements when other security solutions failed to block email threats,” said Ken Bagnall, Vice President of Email Security at FireEye.
 
“Our full secure email gateway protects organizations from inbound email attacks as well as outbound email exfiltration. This advanced level of protection is critical in defending against today’s evolving threat landscape, as spear-phishing, ransomware and impersonation attacks continue to rise.”
 
“We wanted to consolidate our email security vendors into a more efficient and effective footprint,” said Kostas Georgakopoulos, Chief Information Security Officer at Procter & Gamble. “FireEye walked us through its catalog of tools for blocking suspicious email traffic. During the review, FireEye Email Security – Cloud Edition detected malicious email that our current systems had missed. This demonstrated the value FireEye delivers and solidified our decision to switch our email protection.” 
 
Protection Beyond the Traditional Secure Email Gateway 
 
In addition to standard secure email gateway capabilities such as antivirus, anti-spam, and signature-based anti-malware, FireEye Email Security is designed to better protect customers with:
 
• Threat Intelligence Gathered from the Frontlines: FireEye’s first-hand knowledge of attacks and attackers gained from its incident response engagements and network of security researchers is used to continually improve FireEye Email Security by adapting detection and analysis engines to new attack techniques and developing new product features. This sets FireEye far apart from its competitors that don’t see what attacker techniques and tools are actually being used to bypass security solutions. 
 
• Impersonation Protection: Executive names are increasingly used as display names in fraudulent emails, fooling employees into taking action. FireEye Email Security addresses both display name and header spoofing using actionable tools, such as Deep Relationship Analysis to identify anomalous email traffic, while email-specific threat intelligence, or Smart DNS, serve as the basis for the broad tool set that leads to quicker detection.
 
• Advanced Threat Protection: FireEye Email Security can detect and block inbound and outbound advanced threats other solutions miss, helping organizations protect their brand, and focus resources on responding to the alerts that matter.
 
• Custom YARA Rules: Organizations can introduce their own rules to manage and enhance detections, stop the latest threats and identify ongoing campaigns.

Previous in Technology

Next in Technology


Home >> Technology Section

Latest Press Release

Picnic Indoors This Summer with Marks & Spencer

A charitable initiative from the ADNOC Sas Al Nakhl School brings together AED 8 ...

Schneider Electric Launches First Smart Factory in Mexico Implementing Innovativ ...

Don't Run Risk of Damaging Your Vision With Poor Food Choices, Doctors at Moorfi ...

Salvatore Ferragamo Timepieces – Summer 2019 Collection

Ahmed Mahboob Musabih welcomes DGEP Coordinator General

Team Abu Dhabi Clinch World Endurance Crown in Poland

Purificacion Garcia Introduces the Women's FW19 Collection

Turkish Airlines keeps providing privileged flight experience for its guests wit ...

du LaLiga HPC Crowned Champions of IberCup in Spain

New National Poll Reveals Continuously High Levels of Trust and Support for UAE ...

The Perfect Shave Kit for your Summer Travels

Pottery Barn Kids launches new ‘Back-to-School' collection'

MENA M&A transactions US$112 billion in first half of 2019

Toric Hémisphères Rétrograde Slate The traveller's watch featuring a new guilloc ...

Kitchen Hacks: 8 Clever Ways to Smart Storing

Dubai Festival City Mall Partners With Spotify To Launch Music Library in Indust ...

Sports Collection - Autumn Winter 2019

Ras Al Khaimah and Singapore to Discuss the Bilateral Cooperation'

Ralph Lauren at The Championships, Wimbledon – Sunday 14th July