The Cybersecurity Company Helping Sony Fend Off Hackers

FireEye-logo.png

In late November, Sony Pictures found its planned release of the Seth Rogen comedy The Interview turning into a disaster of cinematic proportions. Hackers had seized control of the studio's computer systems, leaking troves of sensitive information, including executive salaries and embarrassing emails. The studio canceled and then reinstated the film's theatrical release, costing Sony an estimated $15 million.
It was one of the best things to happen last year to FireEye
Though not a household name, the Milpitas, California-based Company has become a go-to security firm when big companies fall victim to cyberattacks. FireEye customers include recent cyber victims like Home Depot, JPMorgan Chase, Neiman Marcus, and Target; the CIA and the FBI have called the firm in for help with investigations. So when Sony's Los Angeles security team realized the studio's network had been breached, they asked FireEye to help figure out exactly what had happened and where the systems were vulnerable. That's the first step for many FireEye clients, most of which then ask the company to repair and improve their data defenses.
"We were founded on the idea that cyber­attacks would ultimately overrun all existing defenses. Now this has been overwhelmingly demonstrated," says Ashar Aziz, the company's founder, chief strategy officer, and vice chairman. 
FireEye developed its reputation by commercializing a security technique that creates a mirror image of a company's systems to assess the online threats it is facing. It's one of a new breed of startups benefiting from what is a growing, if dismaying, feature of 21st-century commerce: relentless hack attacks. Last year alone saw one billion files hit by 1,540 data breaches--a 46 percent increase in the number of attacks from 2013, according to security firm Gemalto.
There is still a lot of room for grow: FireEye, which went public in 2013, controls a small fraction of the roughly $9 billion global market for network security, according to research firm IDC. But despite increasing demand for its services, the company has yet to turn a profit, and lost $443.8 million last year.
Technology analysts tend to shrug off such losses at young security companies, which need to hire expensive engineers and ramp up their marketing spending as business grows. FireEye plans to continue running at a loss this year, which Aziz argues is a smart strategy given the mounting demands for its services in the current cyber environment. "The threat actors have not gone away through all of this," Aziz says. "They have only gotten bigger and better." And what's bad news for pretty much anyone else is excellent news for those in the business of fighting such cyber villains.
Inc.com:  http://bit.ly/1HQ04Kg

 

« Who’s Afraid Of Superhumanity?
Financial Institutions Face Increasing Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

ON-DEMAND WEBINAR: Gen AI for Security: Adoption strategies with Amazon Bedrock

Watch this webinar and get a comprehensive roadmap for securely adopting generative AI using Amazon Bedrock, a fully managed service that offers a choice of high-performing foundation models (FMs).

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Masergy Communications

Masergy Communications

Masergy delivers hybrid networking, managed security and cloud communication solutions to enterprises around the globe.

Atos

Atos

Atos provides a unique Cyber Security end to end solution with a data-centric and pre-emptive security approach.

Inspired eLearning

Inspired eLearning

Inspired eLearning deliver solutions that help clients nurture and enhance workforce skills, protect themselves against cyberattacks and regulatory violations.

Computer & Communications Industry Association (CCIA)

Computer & Communications Industry Association (CCIA)

CCIA supports efforts to facilitate and streamline information sharing on cyber threats between the private sector and the Federal Government.

Appdome

Appdome

Appdome is the industry's first mobile integration as a service company, providing solutions for enterprise mobility and mobile application security.

Raz-Lee Security

Raz-Lee Security

Raz-Lee Security is the leading security solution provider for IBM Power i, otherwise known as iSeries or AS/400 servers.

Inspirria Cloudtech

Inspirria Cloudtech

Inspirria Cloudtech is a specialized Cloud Technologies Services provider and Cloud Aggregator focused on executing cloud models for clients.

LUCY Security

LUCY Security

LUCY is the answer when you want to increase your IT security, maintain your cyber security awareness, or test your IT defenses.

CNA Insurance

CNA Insurance

CNA offers a market-leading suite of cyber liability insurance products and risk control resources for businesses of all sizes.

Conquest Cyber

Conquest Cyber

Conquest Cyber builds adaptive risk management programs where innovation is most needed – within defense, intelligence, federal civilian agencies and the industrial base that supports them.

McCrary Institute - Auburn University

McCrary Institute - Auburn University

The McCrary Institute seeks practical solutions to real-world problems in the areas of cyber and critical infrastructure security.

Varen Technologies

Varen Technologies

Varen Technologies is an innovative consulting partner with highly respected cyber security, analytics, Agile Software Development and IT/maintenance expertise.

Red Access

Red Access

Red Access provides the first SaaS-based platform to protect web browsing from cyber threats on any browser and any in-app while ensuring frictionless user experience.

ACI Learning

ACI Learning

ACI Learning - Training tomorrow’s industry leaders with formats for all types of learners in Audit, Cybersecurity, and IT.

Unit 42

Unit 42

Unit 42 brings together world-renowned threat researchers, incident responders and security consultants to create an intelligence-driven, response-ready organization.

Averlon

Averlon

Averlon offers organizations peerless cloud security through Panoptic Cloud Visibility, Predictive Attack Intelligence and Rapid Remediation.