FIREEYE in Industrial Control Systems Security Solutions

FireEye provides a specific SCADA and ICS environment for ICS Healthcheck, which has capabilities to assess its cybersecurity and provide a detailed technical analysis and recommendations for the security environment. FireEye industrial systems and critical infrastructure security solutions combine advanced security technologies, intelligence, and industrial know-how with partner products, to offer holistic protection for the entire enterprise.

The company offers the following products in the ICS security market:

  • FireEye Threat Analytics Platform (TAP)
  • FireEye iSIGHT Critical Infrastructure

The company offers the following services in the ICS security market:

  • Mandiant ICS Healthcheck
  • Mandiant Incident Response Retainer
  • Mandiant Red Team and Penetration Testing

FireEye is changing identification and occurrence examination with cloud-based Threat Analytics Platform (TAP). TAP provides an undertaking wide perceivability, arranged discovery mastery, and guided examination work processes to intensify protection against the advanced modern digital attacks.

FireEye Threat Analytics Platform

  • Real-Time analysis is applied by the platform to streams of network and log data to identify potentially malicious activities.
  • The platform is designed to process and analyze large volumes of events per second (with the help of Sub-Second Search capability).
  • FireEye Threat Analytics platform prioritizes alerts.
  • Various tools are included in this platform to assign tasks and monitor the outcome of those tasks. Responders can add their notes and attach relevant files to an incident record to help consolidate incident information in a sole source. Search tools are provided to enable retrieval.

 

USP : FireEye’s solutions for critical infrastructure and ICS are in pace with industry standards and federal regulations to protect complete network environments. The company provides comprehensive solutions which protect important assets from cybersecurity threats.

BUYERS
VENDORS
EXPERTS
2.6
ANALYSTS

FIREEYE detailed analysis

Product Maturity
Company Maturity
Use Case Maturity
Most IMPORTANT
0.0
0.0
0.0
Feature and Functionality
1.25
2.90
2.65
Services
5.00
3.85
2.85
Pricing
0
0.00
0.90
Deployment
0.60
3.90
3.45
LEAST IMPORTANT LESS IMPORTANT

PARTICIPATING QUADRANTS

FIREEYE has chosen it’s strengths in these 3 territories
  • Niche Quadrant

    All-Middle East and Africa

    27 Participants

  • Niche Quadrant

    All-Asia-Pacific

    31 Participants

  • Niche Quadrant

    All-Europe

    34 Participants

SECTORS
REGIONS
North America Latin America Middle East and Africa Europe Asia-Pacific
STRENGTHS
  • Product Maturity / Implementation Methodology / Risk and Thr...
    Excellent cloud security
    FireEye cloud based Threat Analytics Platform (TAP) enables to leverage intelligence on adversaries and victims and from millions of sensors across the globe and applies it to logs and events from both IT and OT environments to detect, respond and hunt for hidden threats. Show More
  • Product Maturity / Implementation Methodology / Risk and Thr...
    Good threat intelligence solution
    FireEye iSIGHT intelligence offers organization with intelligence on ICS threats, including cyber physical systems, IoT and automation, giving insight into the intent and capabilities of threat actors targeting organization. This subscription service tells exactly who they are, what they’re after and why, so one can make informed business decisions and better manage risk. Show More
  • Product Maturity / Post Deployment / Support & Maintenance
    Excellent ICS security solution
    FireEye enables to identify ICS security vulnerabilities, misconfigurations and flaws. It’s minimally invasive assessment approach avoids the operational risks associated with software agents and network scanning in an ICS environment. Show More
  • Product Maturity / Post Deployment
    Support & Maintenance
  • Product Maturity / Development Tools
    Network traffic anomaly detection tools
  • Product Maturity / Post Deployment
    Education & Training
  • Product Maturity / Post Deployment
    Incident Response
  • Product Maturity / Pre Deployment
    Cyber attack simulation
  • Product Maturity / Pre Deployment
    Implementation
  • Product Maturity / Pre Deployment
    Regulatory compliance
  • Product Maturity / Development Tools
    Log review tools
  • Product Maturity / Control systems
    Distributed Control System (DCS)
  • Product Maturity / Control systems
    Engineering workstations
  • Product Maturity / Control systems
    Programmable Logic Controllers (PLCs)
  • Product Maturity / Control systems
    Remote Terminal Unit (RTU)
  • Product Maturity / Oil and gas
    ISO 27002 (Enterprise Cyber Security)
  • Product Maturity / Oil and gas
    NIST 800-82 (Guide to Industrial Control Systems)
  • Product Maturity / Manufacturing
    NIST 171
  • Product Maturity / Common standards
    Critical Infrastructure Protection Standards (NERC-CIPs)
  • Product Maturity / Common standards
    General Data Protection Regulation
WEAKNESSES
  • Product Maturity / Use Cases / Integration of legacy devices
    Legacy control systems
    One of the common flaws of security solutions used in OT infrastructure is its inability to protect legacy control systems such as SCADA. Show More
  • Product Maturity / Modes
    Cloud
  • Product Maturity / Modes
    Hybrid
  • Product Maturity / Modes
    On-premise
  • Product Maturity / Use Cases
    Integration of legacy devices
  • Product Maturity / Development Tools
    IOC detection tools
  • Product Maturity / Development Tools
    Multi-purpose tools
  • Product Maturity / Development Tools
    Outlier analysis tools
  • Product Maturity / Development Tools
    Reverse engineering tools
  • Product Maturity / Development Tools
    System artifact review tools
  • Product Maturity / Control systems
    HMI panels
  • Product Maturity / Control systems
    Intelligent Electronic Devices (IEDs)
  • Product Maturity / Nuclear
    IAEA - Computer Security at Nuclear Facilities
  • Product Maturity / Nuclear
    NRC -10 CFR - 73.54
  • Product Maturity / Nuclear
    NRC - Regulatory Guide 5.71
  • Product Maturity / Oil and gas
    ISA-99 (Industrial Automation & Control Systems Security)
  • Product Maturity / Oil and gas
    WIB M-2784 (Process Control Domain – Security Requirements for Vendors)
  • Product Maturity / Manufacturing
    DFARS
  • Product Maturity / Manufacturing
    ISO/TR 22100-4
  • Product Maturity / Manufacturing
    NIST CSF
See More

Have you EVER used FIREEYE Products?

Share your experience with potential buyers.

TOP FEATURES
  • Implementation Methodology
    Risk and Threat Assessment
  • Development Tools
    Network traffic anomaly detection tools
  • Post Deployment
    Support & Maintenance
  • Antivirus/Malware
    Malware protection
  • Pre Deployment
    Implementation
  • Pre Deployment
    Regulatory compliance
  • Control systems
    Remote Terminal Unit (RTU)
  • Secure Web Gateways
    User Behavior Analytics
  • Secure Web Gateways
    User Dashboard
  • Distributed Denial Of Service
    Behavior based detection

CONNECT with this company

360 Connect helps you reach out to vendors and find the right people connect to it. Think of it as a concierge service for businesses to connect with other businesses, to buy, sell or invest in.

FIREEYE Presence in Industrial Control Systems Security Solutions

Questions & Answers

TOP REVIEWS

Get help
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
#2 in Industrial Control Systems Security Solutions

“Better Anomaly Detection solution"

(*)(*)(*)(*)(*)5
The Siemens Secure-NOK SNOK® Network Anomaly Detection solution runs on the RX1500 Application Processing Engine (APE) module. This APE is x86-based and is designed to use a single-line module slot in a Siemens RUGGEDCOM RX1500 device. It is capable of hosting various cyber security solutions such as Next Generation Firewalls and identity-based cloaking solutions. SNOK® Network Anomaly Detection helps Siemens RUGGEDCOM RX1500 with an additional critical layer for its security application capability.
Internal Analyst,MnM
Internal Analyst, MnM
#17 in Industrial Control Systems Security Solutions 9 Reviews

“Real-time monitoring and cyber security services"

(*)(*)(*)(*)(*)5
MSSPs are empowered by the Nozomi Networks solution to provide real-time monitoring and cyber security services for OT networks. It is a multitenant application that provides best-in-class ICS threat detection.
Internal Analyst,MnM
Internal Analyst, MnM
#2 in Industrial Control Systems Security Solutions

“Enhanced network security"

(*)(*)(*)(*)(*)5
Network Security from Siemens helps customers to be prepared for challenges; it helps them use it as a base to build digital enterprises.
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#22 in Industrial Control Systems Security Solutions 10 Reviews

“Embedded security deployment model"

(*)(*)(*)(*)(*)5
Schneider offers an embedded security deployment model for industrial automation interconnectivity. Virtualizations and encryption technologies are used by the company to secure containers for varied applications.
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#5 in Industrial Control Systems Security Solutions

“Good process overview"

(*)(*)(*)(*)(*)5
ABB''''s S+ Operations offers an arranged, and detailed process overview displays to present situational awareness and recognition anywhere in the water facility.
Other,Company Name Classified
Other, Company Name Classified
#2 in Industrial Control Systems Security Solutions

“Robust and easy to use"

(*)(*)(*)(*)(*)5
Siemens’ modern Distributed Control System is robust and easy to use once integrated with all tools. Siemens’ SIMATIC PCS 7 is a process automation software that enables advanced process control, virtual commissioning & process simulation and also monitors plant performance through one integrated engineering system.
Chief Manager - Marketing,Company Name Classified
Chief Manager - Marketing, Company Name Classified
#10 in Industrial Control Systems Security Solutions

“Advanced security solutions"

(*)(*)(*)(*)(*)5
McAfee has always been innovative and hence provides advanced software solutions to manage systems centrally. It also helps prevent the proliferation of unauthorized apps and malware.
Internal Analyst,MnM
Internal Analyst, MnM
#10 in Industrial Control Systems Security Solutions

“Best firewall solution"

(*)(*)(*)(*)(*)5
McAfee Firewall Enterprise uses SecureOS and Type Enforced Access Control to ensure efficient security. SecureOS is a UNIX operating system; it uses Type Enforcement security technology that is patented. This ensures superior network security without the need for emergency security patches.
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#22 in Industrial Control Systems Security Solutions 10 Reviews

“Deploying in high security areas"

(*)(*)(*)(*)(*)5
Access Control Systems are deployed in high-security areas that need monitoring of movement of material or people.
Chief Product Officer,Company Name Classified
Chief Product Officer, Company Name Classified
#10 in Industrial Control Systems Security Solutions

“Provides better antimalware solution"

(*)(*)(*)(*)(*)5
McAfee Firewall Enterprise is an anti-virus module used on HTTP, FTP, and Send mail rules for the detection and subsequent blocking of viruses, spyware, and prohibited MIME extensions.
Chief Product Manager,Company Name Classified
Chief Product Manager, Company Name Classified
#20 in Industrial Control Systems Security Solutions 10 Reviews

“Anomaly Detection"

(*)(*)(*)(*)(*)5
The Anomaly Detection Engine provided by Indegy creates standard baselines, detects deviations, and triggers alerts for suspicious events.
Internal Analyst,MnM
Internal Analyst, MnM
#17 in Industrial Control Systems Security Solutions 9 Reviews

“Application Control"

(*)(*)(*)(*)(*)5
This discovers threats and suspicious behavior related to specific applications.
Internal Analyst,MnM
Internal Analyst, MnM
#22 in Industrial Control Systems Security Solutions 10 Reviews

“Good Security Solution"

(*)(*)(*)(*)(*)5
Network communications can be secured and controlled, and the security solution provided by Schneider can protect network traffic. These solutions help increase productivity as well as improve asset performance.
Internal Analyst,MnM
Internal Analyst, MnM
#28 in Industrial Control Systems Security Solutions

“Excellent end-point protection"

(*)(*)(*)(*)(*)5
Rockwell automation provides an excellent end-point protection software(e.g.antivirus,anti-malware) which control system PCs and keep all signatures up to date
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
#24 in Industrial Control Systems Security Solutions 10 Reviews

“Tracking Advanced Threats"

(*)(*)(*)(*)(*)5
Raytheon Foreground Security model which is V-SOC. The V-SOC model focuses on advanced threats and tracking attacker tactics, techniques, and procedures versus simple alert response. The V-SOC service identifies existing network or host compromises, zero day exploits, data exfiltration, network anomalies, emerging advanced threats, suspicious insider behaviour, use of insecure ports/protocols, and misconfigured devices.
Chief Manager - Marketing,Company Name Classified
Chief Manager - Marketing, Company Name Classified
#28 in Industrial Control Systems Security Solutions

“Support and service"

(*)(*)(*)(*)(*)5
Rockwell Automation has been recognized for its excellent support and service for critical production equipment. The successful completion of their work made a significant contribution and deliver high quality parts on schedule.
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
#12 in Industrial Control Systems Security Solutions 10 Reviews

“Incident response and investigation consultancy services"

(*)(*)(*)(*)(*)5
Kaspersky Lab’s Industrial Systems Emergency Response Team is a project that offers wide range of information services, starting from intelligence on the latest threats and security incidents with mitigation strategies and incident response and investigation consultancy and services. In addition to the latest intelligence about threats and vulnerabilities, Kaspersky Lab’s Industrial CERT shares expertise on compliance.
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
#48 in Industrial Control Systems Security Solutions 10 Reviews

“Quality Processing and Analysis Tool"

(*)(*)(*)(*)(*)5
With the rise in data analytics ,extracting maximum amount of information from available data sources , the company aims to minimise critical activities and protect the vulnerability. It provides national digital defence capacity permitting government bodies to control access to interchange information, according to local legal and regulatory framework .
Internal Analyst,MnM
Internal Analyst, MnM
#29 in Industrial Control Systems Security Solutions

“Excellent ICS security solution"

(*)(*)(*)(*)(*)5
The company identifies privileged account risks by locating all privileged user and application accounts, credentials and trust relationships, including accounts associated with remote access. It reduces the risk of unauthorized access to critical systems by securing and controlling access to privileged accounts.
Vice President - Marketing,Company Name Classified
Vice President - Marketing, Company Name Classified
#28 in Industrial Control Systems Security Solutions

“Highly focused and skilled"

(*)(*)(*)(*)(*)5
Rockwell team is highly focused, skilled and professional. They have been successful with the work they have been awarded by delivering what was needed on time and on budget. Rockwell intrusion prevention system (IPS) inspects traffic coming from both the enterprise and external networks, and can block traffic that it determines to be malicious.

TOP NEWS