You are on page 1of 10

WHITE PAPER

White Paper

WWW.FIREEYE.COM

Executivesummary
ThiswhitepaperpresentstheadvancedsecuritysolutionsdesignedbyFireEyetoprotect
organizationslikeyoursfromthenewgenerationofcyberattacks.FireEyehasthousandsof
customersfrommorethan40countries,includingmorethan20%oftheFortune500.[i]
TraditionaldefensesmainlyfocusonknowncyberthreatswhileFireEyecanproviderealtime,
dramaticthreatprotectionsagainstunknownthreats.Thepurposeofthiswhitepaperisto
introduceanewapproachtoprotectyourbusinessaswellasvaluegain.
Cybersecurityhasbecomethebiggestconcernforwebbasedcompaniesinrecentyears.Cyber
attackershavebeenworkingintenselytobreakintosystems,lookingforprivatedataand
information.Breachesofinformationsystemcanbethetriggerfordestroyingacompanys
reputation.Forlongtermdevelopment,cybersecurityissuescannotbeignored.Manybig
companiesarewillingtospendmillionsofdollarsoncybersecuritybecausethisnecessarycost
isnegligiblecomparingwiththetremendouslossafteronecyberattack.Forthepasttenyears,
FireEyehasguardeditscustomersagainstnewbreedscyberattackandhasprovidedunique
customizedservicestothecompanieswhohighlyrelyontheircybersecurity.Withitsadvanced
securitysolutionsandtopsecurityexperts,FireEyehasreceivedvaluablepositivefeedbackfrom
itscustomersandwinannuallytheprestigioustechnologyinnovationawards.[ii]
FireEyeprovidescomprehensiveservicesoncybersecurity.Itcanshieldyourdatacenter,stop
attacksviamobiledevices,getfastmalwareanalysis,blockmaliciousfileorprovidelocal
authentication.
FireEyePlatformBenefits:
FireEyeMultiVectorVirtualExecution(MVX)enginecandetectmaliciouscodewith
differentpotentialenvironmentalvariable
Hardenedproprietaryhypervisorcanexecuteautomatedmalwareanalysis
Multiflowanalysiscanfindmaliciouscodemissedbybasicfileinspection
FireEyeSystemHealthMonitoringReportcanscoreyoursecuritystatus
RealTimeProtectioncansharesuspiciousattacksonrealtimebasisbyusingthe
powerfulFireEyeDTIcloud.[iii]
Youcanenjoytheeasytouseintegratedservicesofdetection,analysis,monitoringandsolution
providedbyFireEyetoguardyournetworkanddata.FireEyeishighlyadaptable,soitis
convenienttoinstallwithoutaffectingyourcurrentsystem.Itsdetectionrateis99.14%whichis
muchhigherthantheaveragedetectionrateincybersecurityindustry.Besides,youcanusethe
FireEyeSystemHealthMonitoringReporttoimproveyoursystemsperformanceandmakeyour
securitysystemmorerobusttodefendagainstfutureattacks.
TheexistingAntivirussoftwarehasanaveragedetectionrateoflessthan5%ofnewvirus,
whicharevulnerableandoutdated.Todefendyourorganizationsreputationandsecureyour
data,youwillneedanupdatingsecuritysystem.FireEyeisdoingresearchonnewtechnologies
tofightagainstcyberattacksandcommittedtoserveourcustomersbestinterestmore
professionallyandefficiently.

Introduction
CyberSecurity:Challenges/Problems
Howmuchdoesyourdatacost?
Businessesstoreendlessamountsofdatarangingfrominternalorganizationsdatatocustomer
information.Small,medium,andbigcompaniesfacethesamecyberattacksandthreats.[iv]
Whatisacyberattack?
Acyberattackisdeliberateexploitationofcomputersystems,technologydependent
enterprisesandnetworks.Cyberattacksusemaliciouscodetoaltercomputercode,logic
ordata,resultingindisruptiveconsequencesthatcancompromisedataandleadto
cybercrimes,suchasinformationandidentitytheft.[v]
Cyberattacksarenotonlydamagingthereputationofthecompany,buttheyarealsocostly.The
statisticshowstheamountofdamagescausedbycybercrimereportedfrom2001to2013.In
2001,theannualtotallossofcomplaintsreportedapproximately17.8millionU.S.dollarsand
grewto781.84millionU.S.dollarsin2013,asshowninFigure1.[vi]

Therearetwocategoriesofcybercrime:onethattargetscomputersornetworkdirectlysuchas
attacks,malware,andviruses;anotheroneusessocialengineeringtoperformfraudandidentity
theft.[vii]AsofJune2014,23%ofannualizedcostscausedbycyberattacksweredueto
maliciouscodeand18%ofthosecostswerecausedbydenialofservice,asshowninFigure2.
[viii]


MarketDriver
Inrecentyears,breachesofinformationsystemshavebecomeincreasinglycommon,causing
widespreadconcernoverthesafetyofprivatecompanydataandpersonalinformationof
customers.Theimmenseamountofdataproducedandstoredbybusinessesaroundtheworldisa
goldmineforhackers.Asbusinessescontinuetoimplementnewtechnologytoimprovetheir
operations,cyberattackerswillincreasetheirattemptstoinfiltratethesystemsofbusinessesto
gainaccesstothatdata.
Duringtheholidayseasonof2013,Targetwashitbyamajorcyberattackthatcompromised40
milliondebitandcreditcardsinadditionto70millionnames,addresses,emails,andphone
numbers.AttackerswereabletostealthisinformationbyinstallingmalwareintoTargets
securityandpaymentssystem,enablingthemtocapturecreditanddebitcardnumberwhen
scannedattheregister.Targetspent$61millionrespondingtothebreachandsawsalesinthe
followingholidayseasondropby46percent[ix].
FollowingthecrisisfacedbyTarget,JPMorganChase&Co.scomputerserverswerebreached
inwhatwouldbethelargestcyberattackonabankinhistory.Approximately76million
householdsand7millionsmallbusinesseswereaffectedbythebreach.Hackerswereableto
gainaccesstonames,addresses,phonenumbers,andemailsofcustomers.Inresponsetothe
attack,JPMorganisspending$250milliononcybersecurity[x].
InadditiontotheTargetandJPMorganChase&Co.,hackerswereabletobreachthe
informationsystemsofNeimanMarcus,HomeDepot,andMichaels,compromisingthecredit

anddebitcardsofmillionsofcustomers.Asaresultofthesebreaches,customersareconcerned
thattheirpersonalinformationisatriskandarequestioningwhetherornotcompanieshave
takenthenecessaryprecautionstoprotecttheirsystemsfromcyberattacks[ix]
AccordingIBM,therewere1.5millionmonitoredcyberattacksin2013alone.Withthe
increasinguseofcloudcomputing,wirelessnetworks,andmobiledevicestomovedata,these
attackswillonlyincrease[xi].IBMexpectsa12%yeartoyearincreaseinsecurityeventsandin
Ciscos2014annualsecurityreport,CiscosIntelliShieldshoweda14%increaseinthreat
alertsfrom2012to2013[xii].
Inordertoprotectthemselvesfromfutureattacks,businessesneedtoinvestineffective,
thorough,andstrongsecuritymeasures.Ifleftwithoutadequateprotection,theinformation
systemsofbusinessescanbebreachedbyattackers,compromisingsensitivebusiness
informationandcustomerinformation.Suchattackscanleavebusinessesatamajorloss.
Solutions
Whyisitimportanttoprotectyournetworkanddata?

Todefendyourcompany'sreputation
Tomaintainpublictrustandconfidenceinyourcompany
Toprotectyoufromlegalliability
Tosecureyourcustomers'sensitivedata

WhatFireEyecandoforyou
FireEyehastopsecurityexpertswiththemostadvancedtechnologyandlatestknowledge
working24/7tomonitoringyoursystemsandnetworks.Withthiscombination,youhavethe
besttoolstoidentify,prevent,examine,andfindasolutionoftheattacksquicklycomparedto
thetraditionalapproaches.[xiii]
DataCenterSecurity
o Yourdatacentersstoretremendousofsensitiveinformationaboutyour
organizationandcustomers.Astheamountofdataincrease,thethreatsagainst
themalsoincrease.
o Whyourdatacentersecuritysolutions:
Shielddatacentersfromadvancedpersistentthreatsandsophisticated
malwarefoundincontentstores,webandapplicationservers,and
commonfileshares[xiv]
Stopattacksenteringcentersviamobiledevicesandportablestorage[xiv]
Receiveontargetanalysistopinpointpossiblegapsthatneedaddressing
[xiv]

Protectyourkeyassetsandpreventattackswithproductsandservicesthat
worktogether[xiv]
Preventattackswithanadaptivecybersecuritystrategy[xiv]

Safeguardyourorganizationfromattacksthatusewebserversandother
datacenterinfrastructuretohostmalware[xiv]
Detectthreatsquicklytoreducelagtimebeforeresolution[xiv]
Getreliable,fastmalwareanalysiswithourpatentedMultiVectorVirtual
Executionengine[xiv]
Providecontinuous,dynamic,nondisruptiveresolutiontoincidents[xiv]
TheFireEyeNetworkSecurityNXseriesenableorganizationstoprevent,detect,and
respondtoexploitattempts,webdownloads,andadvancedmalwarethatroutinelybypass
conventionaldefenses[xv]
o Achieveadetectionrateof99.14%byDeltaTesting[xvi]
o Monitor,detect,andblockmaliciousfiles,webandemailthreats[xv]
o Performdailyanalysesandreportsbacktoyourhostservers[xv]
o Respondquicklytopreventattacks,fraud,andidentitytheft[xv]

PreventingaCyberAttack:CustomerExamples
Since2004,FireEyehasprovidedcybersecuritysolutionstodozensofbanks.Inthissection,
wearegoingtodiscussindetailabouthowwehelpedtheCitizensBankofTexas,Finansbank
andtheBankofThailandpreventCyberSecurityAttacks.
CitizensBankofTexas
CitizensBankofTexasisthethirdlargestindependentbankinTeaswithover150employees
andover$550millioninassets.[xvii]Thechallengesthatthebankfacedwerethat
Maintainitscommitmenttoprotectingsensitiveclientdataagainstincreasingly
sophisticatedWebbasedattacks
Identifyaproactiveandpreventativeapproachtohandlingthreatsthataddresses
shortcomingsinexistingsecurityportfolio
ProtectagainstattackslaunchedfromWebbrowsingandmaliciousURLsinemail
messages
Avoidimpacttoemployeeproductivitycausedbyhavingtotakedesktopdevicesoffline
toresolvesecurityissues

AfteraccessingtheCitizensBankofTexaschallenges,implementingtheFireEyeWebMalware
ProtectionsystemwouldbethebestsolutiontofixtheCitizensBankofTexaschallenges.The
benefitsthattheFireEyeWebMalwareProtectionsystemprovidedarethatitproactivelydetects
maliciousthreatswithouttheneedtotakeemployeesoffline.Inaddition,thesolutionwould
detectwebbasedandemailweaknessbeforetheattackcouldhappen.
HerewasthefeedbackthatwereceivedfromtheCitizenBankafterweimplementedour
solution..AccordingtoWadeJones,CIOofCitizensBankofTexas,FireEyesSolutionwas
immediatelyevidentandwefeltthatFireEyeWebMalwareProtectionSystemrepresentedthe
finalpieceinthepuzzletolockdownourinfrastructure[xvii].Additionally,JonestoldFireEye

thatthesolutiondetectedembeddedmalwareandimmediatelystartedblockingapproximately
200callbacks.Ifanyofthesereachedtheirintendedtargettheycouldhaveseverely
compromisedthebankssystem.[xvii]
Finansbank
FinansbankisaTurkishBankthathasabroadarrayofsubsidiariessuchasassetmanagement,
informationtechnologyandfinancialapplications.Thechallengesthatthisbankfacedwerethat
DetectandmitigateWebbasedthreatsthathavebypassedexistingtraditionalsecurity
measures
AccommodateFinansbanksdiverse,distributedinfrastructureandsupportdetailed
offlineanalysisofmalwarecomponents
Aftercarefulconsiderationofthebankschallenges,wedecidedtoinstalltheNetworkSecurity
appliance.ThissolutionbenefitedFinansbankbyfullyprotectingtheircomplexnetwork
environmentagainstattacksandtheabilitytoarchivesuspectedmalwareattacks.TheNetwork
SecurityapplianceeasilyintegratedwithFinansbanksexistingsecurityinformationevent
managementsystem.[xviii]
ThefeedbackthatwereceivedwasfromMertSarica,Seniorpenetrationtester.Hesaidthat
Afterallofourtestingwasconductedwefeltconfidentthatthiswastherightapproachto
safeguardthebankfromadvancedmalware,zerodayandtargetedattacks.[xviii]MertSarica
thenwentalongtosaythatSecurityanddataintegrityaremissioncriticalimperativesfor
Finansbank;havingFireEyeinourinfrastructurejustmakesusmoresecureperiod.[xviii]
BankofThailand
TheBankofThailandisThailandsnationalbank.Thisbankisinchargeofformulatingthe
monetarypolicyandthemoneysupplyfortheircountry.ThechallengesthattheBankof
Thailandfacedwere

Stayingaheadofissuesthatcouldendangerthebanksmission
Identifyingandblockingunknowncyberthreatsthataremissedbytraditionaldefenses
Preventingthepotentialcompromiseofcriticaloperationsanddata
SincetheBankofThailandwashadsuchabiginfrastructurewehadtoimplement4ofour
FireEyesolutions.Thesolutionsincluded,FireEyeNetworkThreatPreventionPlatform,FireEye
EmailThreatPreventionPlatform,FireEyeCentralManagementandFireEyeThreat
Intelligence.ThesesolutionsbenefitedthebankofThailandbydetectingandpreventingcyber
threatseasierandbeingabletomonitortheentiresystem.[xix]
OnceallofoursolutionswereimplementedandtestedhereiswhattheirSeniorDirectorofthe
InformationTechnologydepartmentsaidaboutoursolutions
Bestpracticeisnolongergoodenoughwhenitcomestocybersecurity.Theworldhas
changeddramatically.Therealityofwhatwefaceisaworldwithanextraordinaryarray

ofnewsecuritychallenges.Fromproofofvaluetoimplementation,BankofThailand
choseFireEyetechnologytomanageadvancedprotection.[xix]

Conclusion
FireEyehasbeenprotecting5oftop6UStelecomcompanies,5ofthetop10financial
institutions,7oftop10energycompanies,7oftop10hightechcompaniesand5oftop10
aerospace/defensecontractors.[xx]Apowerfulcybersecuritysystemcanincreasevaluetoyour
organization.Asyoumaynotice,Banksalwayshavehighexpectationsontheircybersecurity
systems.Inthecasesabove,FireEyehassatisfiedthoserequirementsandkeepagood
relationshipwithourcustomersfromvariousbackgrounds.Ithasbeentenyearsforustoseek
newtechnologiesandkeepleadingcybersecurityindustry.FireEyeishonoredtohelpyou
improveyourcybersecuritysystemandpromisestoprovideyouretheworldclassserviceswith
ourtopcybersecurityteam.YourbusinesswillbenefitfromusingourWebMalwareProtection
systemthatcanprotectyoursystemfrommaliciousattacksandfixproblemsquickly.
Wecanofferyouathreemonthnewcustomerexperiencepackageforfree.AndFireEyeis
confidenttoassistyoutobecomeoneofthetopsuccessfulcompaniesintheworld.Thefirststep
forsuccessistomakeusyoutopchoice.Youcanalsodesignyourownservicewithus.
Visitwww.Fireeye.comtoviewmoredetailsaboutourproducts.Wearelookingforwardto
hearingfromyouandbeingapartofyoursuccess.

References
i. JonClay(TrendMicro).BigDataAnalyticsandtheSmartProtectionNetwork.August
2012.
ii. FireEyeWinsCRNEnterpriseAppAwardforSecurity.2014,December8,from
http://finance.yahoo.com/news/fireeyewinscrnenterpriseapp130000763.html
iii. THEFIREEYEADVANTAGE:ANewSecurityApproachforTodaysAdvanced
Attacks.from<http://www2.fireeye.com/rs/fireye/images/fireeyedebunkingthemythof
sandboxsecurity.pdf>
iv. HomelandSecurity.(2014,September29).RetrievedJanuary27,2015,from
<http://www.dhs.gov/nationalcybersecurityawarenessmonth2014weekfour>
v. WhatisaCyberattack?DefinitionfromTechopedia.RetrievedJanuary29,2015,from
<http://www.techopedia.com/definition/24748/cyberattack>
vi. Cybercrime:ReporteddamagetotheIC320012013|Statistic.(n.d.).RetrievedJanuary
29,2015,from<http://www.statista.com/statistics/267132/totaldamagecausedbyby
cybercrimeintheus/>
vii. CyberCrimeStatisticsandMarketData|Statista.(n.d.).RetrievedJanuary29,2015,
from<http://www.statista.com/markets/424/topic/1065/cybercrime/>
viii.
PercentageofannualizedcybercrimecostforU.S.companies2014|Statistic.
(2014,June30).RetrievedJanuary29,2015,from
<http://www.statista.com/statistics/193431/annualcybercrimecostforuscompanies
byattacktype/>
ix. Riley,Michael,BenElgin,DuneLawrence,andCarolMatlack."TargetMissed
WarningsinEpicHackofCreditCardData."Bloomberg.com.Bloomberg,13Mar.2014.
Web.26Jan.2015.<http://www.bloomberg.com/bw/articles/20140313/targetmissed
alarmsinepichackofcreditcarddata>
x. Veiga,Alex."JPMorganBreachIs'CrisisPoint'ForBanks."TheHuffingtonPost.
TheHuffingtonPost.com,3Oct.2014.Web.26Jan.2015.
<http://www.huffingtonpost.com/2014/10/03/jpmorganbreachfears_n_5924920.html>.
xi. "IBMStatisticsonDataBreachEpidemic."IBM.N.p.,Apr.2014.Web.27Jan.2015.
<http://www935.ibm.com/services/us/en/itservices/securityservices/databreach/>.

xii. Cisco2014AnnualSecurityReport(n.d.):2122.Cisco.Web.27Jan.2015.
<http://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdf>.
xiii.
FireEyeAsAService.(2014,January1).RetrievedJanuary29,2015,from
<https://www.fireeye.com/content/dam/fireeyewww/global/en/products/pdfs/fireeyeas
aservice.pdf>
xiv.
DataCenterSecurity|FireEye.(2014).RetrievedJanuary29,2015,from
<https://www.fireeye.com/solutions/datacenter.html>
xv. FireEyeNetworkThreatPreventionPlatform.(2014).RetrievedJanuary29,2015,from
<https://www.fireeye.com/content/dam/fireeyewww/global/en/products/pdfs/fireeye
networkthreatpreventionplatform.pdf>
xvi.
DeltaTesting.RetrievedJanuary29,2015,from<
https://www.fireeye.com/content/dam/fireeyewww/global/en/products/pdfs/rptdelta
testing.pdf>
xvii.
FireEye.(2014).CitizensNationalBankofTexasIncreasesAdvancedCyber
AttackProtectionwithFireEye[PDFfile].Retrievedfrom
<https://www.fireeye.com/content/dam/fireeyewww/global/en/customers/pdfs/fireeye
citizensnationalbankcasestudy.pdf>
xviii.
FireEye.(2014).LeadingTurkishFinancialServicesProvider,Finansbank,
SafeguardsItsGrowingGlobalPresencewithFireEyeNetworkSecurity(NX)[PDFfile].
Retrievedfrom<https://www.fireeye.com/content/dam/fireeye
www/global/en/customers/pdfs/csturkiyefinansbank.pdf>
xix.
FireEye.(2014).BankofThailandChoosesFireEyeTechnologytoManage
AdvancedProtection[PDFfile].Retrievedfrom
<https://www.fireeye.com/content/dam/fireeyewww/global/en/customers/pdfs/fireeye
bankofthailand.pdf>
xx. ProtectingYourData,IntellectualProperty,andBrandfromCyberAttacks.Retrieved
January29,2015,from<https://www2.fireeye.com/protectyourdatafromcyber
attacks.html?x=FE_WEB_IC>

You might also like