Rapid investigation of attacks and breaches allows for swift containment and re-mediation.
To truly understand a targeted attack, you need to perform a forensic analysis, and to do this you need fast access to historical network data from before, during and after the event, as well as the means to reconstruct the attack.
This will help you to answer key questions, such as:
How did the attack penetrate or circumnavigate our defences?
For how long has the malware been present in our environment?
Which of our computers have been compromised?
What information has the attacker taken from our network?
The combination of FireEye’s Investigation Analysis system (IA series) and Network Forensics Platform (PX series) provides Security Professionals with the high-speed packet capture and deep forensic analysis capability needed to investigate and ascertain the what, where, when and how of the Zero-Day malware and Advanced Persistent Threats targeting their environments.
With FireEye’s PX and IA solutions, Security professionals see a detailed view of the packets and sessions before, during, and after the targeted attack to confirm what may have triggered a malware download or callback – enabling them to respond rapidly and effectively, and to apply this information to enhance their future cyber-security protection strategies.
PX and IA also compliment other FireEye solutions available from Phoenix Datacom, including:
Request a Callback
Please fill out the form below and click submit to request a callback.
Fields marked * are mandatory.
To see this product in action, contact your Phoenix Datacom Account Manager, or fill out the form below for your demonstration, online, at your place of work, or in out state of the art Cyberlab at our operations in Buckinghamshire.