Understand the advanced malware, Zero-Day and Advanced Persistent Threats (APTs) targeting your organisation.

FireEye’s in-line tools (NX, EX and ETP) protect organisations from advanced threats targeting them with email and web-based malware and let Security Analysts choose whether or not a suspicious email or malicious web request can continue to its intended destination.

However, the high number of computer and server operating systems and versions available today adds to the complexity of threat analysis and defending against advanced malware, so to combat this, FireEye’s AX Series from Phoenix Datacom empowers Analysts to look at the threat in a safe and controlled environment across a wide spectrum of operating systems and versions, to see, for example, how a particular piece of malware will behave when opened using multiple versions of Adobe PDF reader across all operating systems in their organisation.

 

FireEye-ax-analysis

Click to enlarge

This provides organisations with deeper insight to the customised attacks, perpetrators and methods specifically targeting them across both Windows and Apple OS environments.

FireEye’s AX Series is available in two different modes: Live and Sandbox. Live mode will follow the execution externally to gain a full understanding of the malware’s intended lifecycle.

In sandbox mode, the malware execution is contained within a virtual environment and therefore does not share its findings with FireEye’s cloud-based Global Malware Protection Network.

Sandboxing is particularly attractive to organisations that do not wish to automatically share information regarding the types of attack and malware targeting its environment.

Request a Callback

Please fill out the form below and click submit to request a callback.
Fields marked * are mandatory.

  • This field is for validation purposes and should be left unchanged.

See Demonstration

To see this product in action, contact your Phoenix Datacom Account Manager, or fill out the form below for your demonstration, online, at your place of work, or in out state of the art Cyberlab at our operations in Buckinghamshire.

  • This field is for validation purposes and should be left unchanged.