Mandiant

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by K.e.coffman (talk | contribs) at 19:12, 16 August 2016 (Link already provided in the body). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Mandiant
Company typeSubsidiary
IndustryInformation security
Founded2004
FounderKevin Mandia
FateAcquired
HeadquartersAlexandria, Virginia
Key people
Kevin Mandia, CEO
Richard Bejtlich, CSO
RevenueIncrease US$100 million (2012)
Number of employees
300 (2013)
ParentFireEye, Inc.
Websitemandiant.com

Mandiant is an American cybersecurity firm. It rose to prominence in February 2013 when it released a report directly implicating China in cyber espionage.[1] On 30 December 2013, Mandiant was acquired by FireEye in a stock and cash deal worth in excess of $1 billion.[2]

History

Kevin Mandia, a former United States Air Force officer who serves as the company's chief executive officer, founded Mandiant as Red Cliff Consulting in 2004 prior to rebranding in 2006.[3] In 2011, Mandiant received funding from Kleiner Perkins Caufield & Byers to expand its staff and grow its business-to-business operations. Mandiant provides incident response and general security consulting along with incident management products to major global organizations, governments, and Fortune 100 companies. Its 2012 revenues were over $100 million, up 76% from 2011.[4] The company was acquired by FireEye on December 30, 2013.[5] Mandiant was awarded both the 2012 and 2013 SC Award for exemplary professional leadership in information-technology (IT) security.[6] Mandiant is the creator of OpenIOC, an extensible XML schema for the description of technical characteristics that identify threats, attackers' methodologies, and evidence of compromise.

APT1 espionage report

On 18 February 2013, Mandiant released a report[7] documenting evidence of cyber attacks by the People's Liberation Army (specifically Pudong District, Shanghai-based PLA Unit 61398[8]) targeting at least 141 organizations in the United States and other English-speaking countries extending as far back as 2006.[9] In the report, Mandiant refers to the espionage unit as APT1.[10] The report states that it is likely that Unit 61398 is the source of the attacks. A video was uploaded to YouTube demonstrating one such intrusion by APT.[11]

References

  1. ^ "Mandiant Intelligence Center Report". 2013. Retrieved 5 January 2016.
  2. ^ Nicole Perlroth and David E. Sanger (2 January 2014). "FireEye Computer Security Firm Acquires Mandiant". New York Times. Retrieved 5 January 2016.
  3. ^ "MANDIANT, A New Name for a Fast Growing Company; Red Cliff Consulting LLC Rebrands as Firm Offers Expanded Services, Education and Software Tools". Business Wire. 14 February 2006. Retrieved 5 January 2016.
  4. ^ Brad Stone and Michael Riley (7 February 2013). "Mandiant, the Go-To Security Firm for Cyber-Espionage Attacks". Bloomberg Business. Retrieved 5 January 2016.
  5. ^ "FireEye Announces Acquisition of Mandiant". 2014. Retrieved 5 January 2016.
  6. ^ "SC Magazine Names Mandiant® the 2013 Professional Award Winner for Best Security Company". 5 March 2013. Retrieved 5 January 2016. {{cite web}}: Check |archiveurl= value (help); Unknown parameter |deadurl= ignored (|url-status= suggested) (help)
  7. ^ "APT1: Exposing One of China's Cyber Espionage Units" (PDF). 18 February 2013. Retrieved 5 January 2016.
  8. ^ Xu Weiwei (20 February 2013). "China denies hacking claims". Morning Whistle. Retrieved 5 January 2016.
  9. ^ David E. Sanger, David Barboza and Nicole Perlroth (18 February 2013). "Chinese Army Unit Is Seen as Tied to Hacking Against U.S." New York Times. Retrieved 5 January 2016.
  10. ^ William Wan and Ellen Nakashima (19 February 2013). "Report ties cyberattacks on U.S. computers to Chinese military". Washington Post. Retrieved 5 January 2016.
  11. ^ APT1: Exposing One of China's Cyber Espionage Units on YouTube

External links