Jump to content

FireEye NX 10000

The FireEye NX 10000 identifies and blocks Web-based attacks that traditional and next-generation firewalls, IPS, AV, and Web gateways miss. Supporting multi-gigabit throughput, the high-performance turnkey appliance can be deployed in-line at Internet egress points to block Web exploits and multi-protocol callbacks to keep sensitive data and systems safe.

The FireEye NX 10000 unleashes the FireEye Multi-Vector Virtual Execution (MVX) engine, applying multi-gigabit performance to accurately confirm zero-day attacks, provide real-time protection, and capture dynamic callback destinations. The FireEye NX 10000 enables threat protection that scales with your next-generation networks to help enable the efficiencies gained from consolidation.

The Web is a primary threat vector that sophisticated attackers use to compromise key systems, perform reconnaissance on existing defenses, establish long-term control and access to networked systems, and exfiltrate data.

By dynamically analyzing zero-day attacks within the most sophisticated virtual machines in the world, the FireEye NX 10000 yields real-time malware threat intelligence to protect your network. This information is enhanced with the FireEye Dynamic Threat Intelligence (DTI) cloud, which shares anonymized data from participating organizations around the globe. The FireEye NX 10000 can also work with other tools such as SIEM systems to integrate with existing incident response mechanisms.

The FireEye NX 10000 protects against blended advanced threats that coordinate Web-based attacks, spear phishing, and zero-day exploits. When the FireEye NX 10000 is deployed along with the FireEye Email MPS and the FireEye Central Management System (CMS), customers gain real-time protection against malicious URLs - and insight to connect the dots of blended attacks. Together, the components of the FireEye threat protection platform empower advanced security awareness and smarter responses. Knowing when multiple targeted individuals receive the same malicious URL in spear phishing emails, for instance, enables a more proactive approach to incident response.

  • Consolidation of IT resources – Supports multi-gigabit performance to scale efficiently and reduce cost
  • Installs in 30 minutes – Deploys in-line (block/monitor-mode) or out-of-band (monitor-only) to catch threats that traditional gateway defenses miss
  • Protects against zero-day, advanced targeted attacks – Using the patented FireEye MVX engine, identifies and blocks attacks that use malicious images, PDFs, Flash, or ZIP/RAR/TNEF archives
  • Blocks outbound malware transmissions across multiple protocols – Thwarts data exfiltration, botnet activities, and advanced persistent threats communicating across HTTP, FTP, IRC, and many other protocols
  • Integrates with Email MPS to stop blended attacks – Works with FireEye Email MPS to shut down communications that contain malicious URLs used in spear-phishing attacks
  • Dynamically generates malware intelligence – Captures details such as callback coordinates and communication characteristics to protect locally through the FireEye DTI enterprise and globally through the FireEye DTI cloud
  • Supports YARA-based rules – Enables information security analysts to specify byte-level rules and quickly analyze Web objects for threats specific to the organization
  • Supports AV-Suite integration – Malicious objects identified by anti-virus software can be linked to the deeper forensic information provided by the Web MPS for more efficient incident response prioritization
  • Ends time-wasting false positive analysis – Directs administrators to the confirmed infections and compromised hosts that need remediation

Our Mission: Protect the World from Cyber Attacks

Over 1 Million Virtual Machines Sharing Globally

Our Mission: Protect the World from Cyber Attacks