The Latest FireEye News
Product and Solution Information, Press Releases, Announcements
|Study From FireEye and Mandiant Reveals Legacy Cybersecurity Products Failed to Protect 97% of Organizations Using Them|
|Posted: Tue May 20, 2014 03:03:18 PM|
Analysis of Real-World Deployments Uncovers Critical Flaws in Most Cyber Defense Architectures Not Using FireEye Solutions.
Milpitas, CA -- May 20, 2014 -- FireEye, Inc. (NASDAQ: FEYE), the leader in stopping today's advanced cyber attacks, today released the report “Cybersecurity’s Maginot Line: A Real-world Assessment of the Defense-in-Depth Model.” A first-of-its-kind study, the report examines attack data captured by FireEye security appliances from 1,217 organizations around the world. These organizations were testing, but were not yet protected by, the FireEye platform from October 2013 to March 2014. Offering a unique glimpse into how well existing security products perform in real-world environments, the study concludes that signature-based firewalls, intrusion prevention systems (IPS), Web gateways, sandboxes, and anti-virus (AV) solutions – and various combinations of those tools – fail to fully block attacks in 97 percent of organizations that deploy them.
“The harsh reality of today’s advanced threats and the threat actors behind them is that their attacks are increasingly unique in nature and morph quickly, meaning they can only be identified and stopped as they appear in the wild,” said David DeWalt, chairman of the board and CEO, FireEye. “Our results with businesses trialing our products around the world show there is a clear need for solutions purpose-built to detect and protect against advanced attacks. And, as attackers find more ways to hide in the real world, our ability to see the multiple threat vectors they use will help keep our customers one step ahead.”
Key findings from “Maginot Line” include:
The report details the scale of advanced targeted attacks and how effective they are against entrenched cyber defenses. 348 trial participants also took part in a survey, offering a comprehensive picture of their security architecture and a vendor-to-vendor comparison of each layer of the typical cybersecurity architecture.
In addition, “Maginot Line” offers in-depth analysis from FireEye Labs, explaining why attackers are so easily outmaneuvering traditional security solutions, how their processes work, and what they are after. It provides further advice from FireEye analysts on aligning cybersecurity budgets with today’s real-world threats.