FireEye today announced the availability of the FireEye Central Management System (CMS), and the FireEye 4200 2.0 appliance that addresses the exploding threat of remotely controlled malicious software or crimeware including botnets, zombies and zero-day threats. Leveraging FireEye’s innovative virtualization technology, the appliances protect both servers and desktops against targeted, intrusive malware while streamlining management of the solution. Unlike traditional security technologies, the FireEye CMS and 4200 2.0 protect against network-borne exploits, both known and unknown, and ensure that only compliant, up-to-date machines are granted network access.
The 2.0 release of FireEye’s Network Malware Control System secures FireEye’s lead in crimeware threat protection by protecting servers and desktops from stealthy malware that seeks to compromise an organization’s computing environment. The new release features centralized management of FireEye 4200 appliances, and server platform protection against targeted crimeware attacks, such as phishing and botnets.
With the FireEye Attack Confirmation Technology (FACT) engine, the FireEye 4200 2.0 uses patent-pending virtualization technology to continually assess suspect network traffic and block actual threats with minimal interruption to network access. Employing an infinite supply of instrumented virtual victim machines — dynamically built on-the-fly to scan real-time traffic flows for previously undetectable malware — FireEye’s FACT engine verifies crimeware attacks by analyzing suspicious traffic flows as it compromises a virtual victim machine. This allows FireEye to conclusively confirm attacks prior to taking any quarantine actions or denying access to the network. With the FireEye 4200 2.0, enterprises are able to fight attacks that circumvent traditional signature-based security products and fly under the radar with typical anomaly/heuristic detection solutions.