Overview

FireEye is a leader in stopping the new generation of cyber-attacks, such as advanced malware, that easily bypass traditional signature-based defenses and compromise over 95 percent of enterprise networks. FireEye has invented a purpose-built, virtual machine-based platform that provides real-time threat protection to organizations across all major threat vectors and each stage of an attack life cycle.

Products

Contracts

GSA Schedule Contracts

GSA Schedule 70

GSA Schedule 70 GSA Schedule No. GS-35F-0119Y Term: December 20, 2011- December 19, 2021


SEWP Contracts

SEWP V

Contract Number: Group A Small: NNG15SC03B Group D Other Than Small: NNG15SC27B Term: May 1, 2015 - April 30, 2020


ESI BPA Contracts

Department of Defense ESI BPA Contract # N00104-12-A-ZF31

BPA # N00104-12-A-ZF31


State & Local Contracts

City of Seattle Contract

Contract #0000003265 Term: December 19, 2021

CMAS

Contract # CMAS 3-12-70-2247E Term: through March 31, 2022

Fairfax County IT Hardware, Software, & Services

Virginia- Fairfax County CONTRACT EXPIRATION: October 4, 2020 (with 5 option years)

NASPO ValuePoint

Term: through September 15, 2026

National Cooperative Purchasing Alliance (NCPA)

Term: through April 30, 2019

National Intergovernmental Purchasing Alliance (National IPA - TCPN)

Term: through May 31, 2019 (with 2 option renewal years)

North Carolina Mass Storage Contract

Contract Number: 204J Term: through March 31, 2018

Ohio State Contract- 534354

Contract # 534354 Term: December 19, 2021

Orange County National IPA Co-Op

Through May 31, 2019 (with 2 option years)

Pennsylvania Office of Administration

Contract Number: 4400004252, Contract Expiration: December 19, 2021

PEPPM

PEPPM PA - Central Susquehanna Intermediate Unit Term: Through December 31, 2018

PEPPM CA

PEPPM CA - Kern County Superintendent of Schools Term:Through December 31, 2018

State of New Mexico Contract

Contract Number: 80-000-18-00002 Contract Period: August 1, 2017 – August 1, 2021

Texas DIR-TSO-2660

Term: Through November 17, 2018

Texas DIR-TSO-3149

DIR-TSO-3149 Contract Period: June 22, 2015 - June 22, 2019(with 1 option year)

Texas DIR-TSO-3926

Expiration Term: June 28, 2022 (with 3 option years)

VASCUPP

Contract Number: UVA1482501 Term: May 2, 2014– December 19, 2021

VITA Contract

Term: through March 31, 2019

Wisconsin Department of Administration

Contract Number: 50ENT-016-FIREEYE-01 Term: through May 5, 2021


Education Contracts

Washington Learning Source Contract

Contract Number: WLS260 Contract Period: 7/23/13 - 7/22/19


Events

Archived Events

News

Latest News

MILPITAS, Calif.-- FireEye, Inc. (NASDAQ: FEYE), the intelligence-led security company, today ...
READ MORE >
MILPITAS, Calif. – June 3, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced the addition of 12 new technology partners to the FireEye® ...
READ MORE >
MILPITAS, Calif. – May 23, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader at stopping today’s advanced cyber attacks, today announced upcoming conference participation for the second quarter of ...
READ MORE >
MILPITAS, Calif. – May 19, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced the integration of iSIGHT Partners threat intelligence into ...
READ MORE >
MILPITAS, Calif. – May 5, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced FireEye® Security Orchestrator™ (FSO™) — the ...
READ MORE >
MILPITAS, Calif. – May 5, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced that Chairman of the Board and Chief Executive Officer David ...
READ MORE >
MILPITAS, Calif. – April 19, 2016 – FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today’s advanced cyber attacks, today announced the launch of Mandiant® Mergers & Acquisitions (M&A) ...
READ MORE >
Carahsoft Technology Corp., the trusted government IT solutions provider, announced today that it has been recognized as the Global Distributor of the Year for 2015 by FireEye, the leader in stopping ...
READ MORE >

Resources

SELECT Resource_ID, Title, Vendor, Vertical, Type, DateAdded, Path, Linktype, InvisibleBit, FeaturedEnd, FeaturedBit, Description, CustomLogo, LegacyLink, Form FROM Resources WHERE Vendor = ? AND InvisibleBit = 0 ORDER BY FeaturedBit DESC, Type ASC

Resource

FireEye intelligence analysts frequently observe two types of advanced threat actors targeting companies involved in healthcare services, pharmaceuticals production, and medical manufacturing:

Cyber attacks are on the rise, and it’s no secret that governmental organizations—both federal, state and local— have found themselves the target of numerous high-profile attacks. But with so much critical information at stake, what should agencies know about breaches, and how to defend aga...

A rash of recent high-profile data breaches among well-known companies has drawn attention to the critical role that corporate directors play in cyber security. Boards are increasingly involved in assessing the risk, improving the security profile of the companies they advise, and managing the ...

Cyber-attack volume has never been higher, and if your defenses can’t keep up, you dramatically increase your risk of a breach. Attackers have the intellectual resources, the computing power, and the backbone of the fastest digital delivery networks. They can iterate on your defenses at will, ...

Resources

Government networks and the critical infrastructure of elected officials around the world are under a constant state of attack. Even more so during the critical election periods. Threats continuously evolve as nation states, cyber criminals and hacktivists stress government cyber defenses to their b...

FireEye is helping agencies minimize the impact, downtime, and cost of a breach, and detecting or stopping Zero Day attacks in real-time.
Check out these resources that were available at FireEye's DoDIIS booth:M-Trends 2018How Government Agencies are Facing Cyber Security ChallengesHelixiSigh

Solutions Brief

fireeye-logo-R2.png
Solutions Brief
Today's threat landscape continues to evolve, making preventive measures less and less reliable for thwarting sophisticated attackers. The days of "smash-and-grab" attacks are over. Once inside the network, today's attackers are likely to remain active in the breached environment, conducting stealth...

The next generation of cyber attacks has changed radically and are targeted to get something valuable—sensitive, personal information, intellectual property, authentication credentials, and insider information. Each attack is multi-staged with steps to get in, to call back from the compromised net...

Video

Protect against signature-based and the latest unknown threats with an endpoint solution that gathers real-time intelligence from multiple sources.

Whitepaper

This paper offers a better and more current framework to understand both the next-generation threat landscape of advanced malware and the five key design principles needed to eliminate the devil’s bargain implicit in today’s dated and highly ineffective rule-, signature- and list-based defenses.