From Wikipedia, the free encyclopedia
  (Redirected from FireEye, Inc)
Jump to: navigation, search
For the bird genus, see Fire-eye.
FireEye, Inc.
Public company
Industry Computer security
Founded 2004
Founder Ashar Aziz
Headquarters Milpitas, California, United States
Key people
Dave DeWalt (CEO and Chairman of the Board), Ashar Aziz (Founder, Vice Chairman of the Board, CTO, and Chief Strategy Officer)
Products Network security products
Number of employees
2,500 (2014)
Slogan Next Generation Threat Protection

FireEye, Inc. is a publicly listed US network security company that provides automated threat forensics and dynamic malware protection against advanced cyber threats, such as advanced persistent threats and spear phishing. Founded in 2004, the company is headquartered in Milpitas, California. Threat prevention platforms include Network, Email, Endpoint, Mobile, Content, Analytics, and Forensics. FireEye has more than 4,000 customers across 67 countries, including more than 650 of the Forbes Global 2000. FireEye is the first cyber security company awarded certification by the Department of Homeland Security.[1] USAToday says FireEye "has been called in to investigate high-profile attacks against Target, JP Morgan Chase, Sony Pictures, Anthem and others".[2] Yahoo Finance says FireEye is again fastest growing cyber security firm, according to Deloitte. [3]


Dave DeWalt, CEO and Chairman of the Board of FireEye in South Korea, in June 2013

In 2004, Ashar Aziz, a Pakistani American, founded FireEye with venture capital provided by Sequoia Capital.[4] Aziz, formerly of Sun Microsystems, is the original inventor of the core set of technologies behind the company's main product line, the FireEye Malware Protection System.[5] In 2006, FireEye launched its first product—a switch-based network access control appliance.[6]

Major investors include Sequoia Capital, Norwest Venture Partners, Icon Ventures, SVB Capital,[7] DAG Ventures, Juniper Networks, and In-Q-Tel.[8]


In June 2012, former CEO and President of McAfee, Dave DeWalt, joined FireEye as chairman.[9] DeWalt was appointed CEO in November 2012.[9][10]

On December 30, 2013, FireEye acquired Mandiant in a stock and cash deal worth in excess of $1 billion.[11]

On May 8, 2014, FireEye acquired company nPulse Technologies[12] for approximately $60 million. nPulse is intended to build on FireEye's ability to detect intrusions in a company's network by making it easier to track the intrusion and better understand its effect on the network.[13]

In May 2015, the company raised its revenue forecast for the year to be between $615 million and $635 million.[14]

Products and services[edit]

Central Management System[edit]

The Central Management System (CMS) consolidates the management, reporting, and data sharing of Web MPS, Email MPS, File MPS, and Malware Analysis System (MAS) into a single network-based appliance by acting as a distribution hub for malware security intelligence.

Dynamic Threat Intelligence[edit]

The FireEye Cloud crowd-sources Dynamic Threat Intelligence (DTI) detected by individual FireEye MPS appliances, and automatically distributes this time sensitive zero-day intelligence globally to all subscribed customers in frequent updates. Content Updates include a combination of DTI and FireEye Labs generated intelligence identified through Research efforts.


FireEye’s solutions are available for the public sector through Carahsoft, their reseller network, and partners, through a large variety of contract vehicles including GSA Schedule 70, SEWP-V, CMaaS BPA, and various other state and local contracts.

Cyber actions[edit]


FireEye was involved in the forensic investigation against the Srizbi botnet in 2008.[15][16]


In October/November 2009, FireEye participated in an effort to take down the Mega-D botnet (also known as Ozdok.)[17]


On March 16, 2011, the Rustock botnet was taken down through an action by Microsoft, US federal law enforcement agents, FireEye, and the University of Washington.[18]


In July 2012, FireEye was involved in analysis[19] of the Grum botnet's command and control servers located in the Netherlands, Panama, and Russia.


In September 2015, FireEye obtained an injunction against a security researcher attempting to report vulnerabilities in FireEye Malware Protection System.[20]

See also[edit]


  1. ^ "FireEye First Cyber Security Company Awarded SAFETY Act Certifications by Department of Homeland Security". MarketWatch. Retrieved 21 May 2015. 
  2. ^ "FireEye has become Go-to Company for Breaches". USA Today. Retrieved 21 May 2015. 
  3. ^ "FireEye Fastest Growing Cyber Security". Yahoo Finance. Retrieved 11/20/2015.  Check date values in: |access-date= (help)
  4. ^ Mitra, Sramana (January 29, 2009). "Barriers To Innovation". Forbes. Retrieved 2009-11-30. 
  5. ^ "Crunchbase — Ashar Aziz". Crunchbase. 2012-07-18. Retrieved 2012-07-18. 
  6. ^ Messmer, Ellen (2006-05-02). "Start-up FireEye debuts with virtual-machine security approach". Network World. Retrieved 2010-10-18. 
  7. ^ Jose Sevilla (3 August 2015). "Silicon Valley Bank - SVB Capital". SVB Financial Group. 
  8. ^ Hoover, J.Nicholas (November 19, 2009). "In-Q-Tel Joins Forces With FireEye To Fight Cyberthreats". DarkReading. Retrieved 2009-11-30. 
  9. ^ a b "FireEye Appoints Board Chairman David DeWalt as Chief Executive Officer" (Press release). FireEye. 2012-11-28. Retrieved 2012-11-30. 
  10. ^ Robertson, Jordan (2012-11-28). "Former McAfee Chief DeWalt Named FireEye CEO, Aims for 2013 IPO". Bloomberg. Retrieved 2012-11-30. 
  11. ^ Perlroth, Nicole; Sanger, David E. (2014-01-02). "FireEye Computer Security Firm Acquires Mandiant". The New York Times. 
  12. ^ "Computer Forensics and Malware Analysis - FireEye". FireEye. 
  13. ^ Miller, Ron (May 8, 2014). "FireEye Buys nPulse Technologies For $60M+ To Beef Up Network Security Suite". TechCrunch. 
  14. ^ Tony Owusu. "FireEye (FEYE) Stock Spikes on Earnings Beat, Increased Revenue Guidance". TheStreet. Retrieved August 4, 2015. 
  15. ^ Keizer, Gregg (November 26, 2008). "Massive botnet returns from the dead, starts spamming". Computerworld. Retrieved 2009-11-30. 
  16. ^ Kiriyama, George (November 11, 2008). "SJ-Based Spammer Unplugged". NBC 11 KNTV. Retrieved 2009-11-30. 
  17. ^ Cheng, Jacqui (November 11, 2009). "Researchers' well-aimed stone takes down Goliath botnet". Ars Technica. Retrieved 2009-11-30. 
  18. ^ Wingfield, Nick (2011-03-18). "Spam Network Shut Down". Wall Street Journal. Retrieved 2011-03-18. 
  19. ^ "FireEye Blog | Threat Research, Analysis, and Mitigation". Retrieved 2014-04-12. 
  20. ^ Goodin, Dan (September 11, 2015). "Security company litigates to bar disclosure related to its own flaws". Retrieved September 12, 2015. 

External links[edit]