Know your gear
The FireEye EX series is a group of threat prevention platforms that protects against spear- phishing email attacks that bypass anti-spam and reputation-based technologies. Spear- phishing attacks have soared in popularity with the availability of user-specific information on social networks and other Internet resources. With all of the personal information available online, a criminal can socially engineer almost any user into clicking a URL, or opening an attachment with a zero-day exploit, and the cybercriminal quickly gets control of a privileged system and user accounts.
To quarantine the spear-phishing emails used in advanced targeted attacks, the EX analyzes every attachment using a signature-less, Multi-Vector Virtual Execution (MVX) engine that can safely and accurately identify zero-day attacks. It goes beyond signature and reputation-based systems by detonating each attachment against a cross-matrix of operating systems and applications, including multiple Web browsers and plug-ins like Adobe Reader and Flash. Administrators can quarantine emails with malicious content for further analysis or deletion.
In this manner, organizations not only get real-time protection against malicious URLs, but also the ability to connect the dots of a blended attack. For instance, identifying other targeted individuals who were sent spear-phishing emails containing the same malicious URLs is the type of actionable intelligence necessary to protect organizations against advanced targeted attacks.
To quarantine the spear-phishing emails used in advanced targeted attacks, the EX analyzes every attachment using a signature-less, Multi-Vector Virtual Execution (MVX) engine that can safely and accurately identify zero-day attacks. It goes beyond signature and reputation-based systems by detonating each attachment against a cross-matrix of operating systems and applications, including multiple Web browsers and plug-ins like Adobe Reader and Flash. Administrators can quarantine emails with malicious content for further analysis or deletion.
In this manner, organizations not only get real-time protection against malicious URLs, but also the ability to connect the dots of a blended attack. For instance, identifying other targeted individuals who were sent spear-phishing emails containing the same malicious URLs is the type of actionable intelligence necessary to protect organizations against advanced targeted attacks.