FireEye Network Security (NX) solutions protect against known and unknown advanced attacks with the signature-less Multi-Vector Virtual Execution (MVX) engine, conventional intrusion prevention system (IPS) and intelligence-driven detection.
FireEye Network Security (NX) solutions protect against known and unknown advanced attacks with the signature-less Multi-Vector Virtual Execution (MVX) engine, conventional intrusion prevention system (IPS) and intelligence-driven detection.
Customer Reviews
Administrator in Primary/Secondary Education
Advanced user of FireEye Network Security and ForensicsThe FireEye Network Security appliance does the work that we sometimes forget to do. Lets face it, we wear like a kazillion different hats and the Firewall guys are never quick to want to stop a threat at the perimeter so in comes FireEye NX. They have an always growing library of integrations or modules that can be added to help in creating a complete, well rounded security solution and is a show stopper when it comes to eliminating today's most common network threats like ransomware or data extrusion.
I would like if there was a File analysis or upload feature built into the NX appliance. I know they have another product that handles that level of threat analysis more in depth but it would be extremely helpful to have within the same dashboard as the list of threats being performed against your domain or network
As "relaxed" as a K-12 educational environment can sometimes become, the FireEye NX appliance has lived up to its selling point in eliminating based threats or attacks from being carried out on a device that is connected to our network. It has also provided some visibility into the large, previously unseen, number of threats or files that generate connection attempts on our users' personal devices. The IDPS portion of the appliance is so invaluable to me. It gets checked daily and definitely does its job in stopping and reporting on a number of growing web based attacks or threats and has also helped mitigate a growing number of web based attacks being performed on what would otherwise be a legitimate port in the absence of a WAF to some degree by preventing the execution of an ever growing number of web sourced attacks or malicious connection attempts being seen on the web today.