The Cybersecurity Company Helping Sony Fend Off Hackers

FireEye-logo.png

In late November, Sony Pictures found its planned release of the Seth Rogen comedy The Interview turning into a disaster of cinematic proportions. Hackers had seized control of the studio's computer systems, leaking troves of sensitive information, including executive salaries and embarrassing emails. The studio canceled and then reinstated the film's theatrical release, costing Sony an estimated $15 million.
It was one of the best things to happen last year to FireEye
Though not a household name, the Milpitas, California-based Company has become a go-to security firm when big companies fall victim to cyberattacks. FireEye customers include recent cyber victims like Home Depot, JPMorgan Chase, Neiman Marcus, and Target; the CIA and the FBI have called the firm in for help with investigations. So when Sony's Los Angeles security team realized the studio's network had been breached, they asked FireEye to help figure out exactly what had happened and where the systems were vulnerable. That's the first step for many FireEye clients, most of which then ask the company to repair and improve their data defenses.
"We were founded on the idea that cyber­attacks would ultimately overrun all existing defenses. Now this has been overwhelmingly demonstrated," says Ashar Aziz, the company's founder, chief strategy officer, and vice chairman. 
FireEye developed its reputation by commercializing a security technique that creates a mirror image of a company's systems to assess the online threats it is facing. It's one of a new breed of startups benefiting from what is a growing, if dismaying, feature of 21st-century commerce: relentless hack attacks. Last year alone saw one billion files hit by 1,540 data breaches--a 46 percent increase in the number of attacks from 2013, according to security firm Gemalto.
There is still a lot of room for grow: FireEye, which went public in 2013, controls a small fraction of the roughly $9 billion global market for network security, according to research firm IDC. But despite increasing demand for its services, the company has yet to turn a profit, and lost $443.8 million last year.
Technology analysts tend to shrug off such losses at young security companies, which need to hire expensive engineers and ramp up their marketing spending as business grows. FireEye plans to continue running at a loss this year, which Aziz argues is a smart strategy given the mounting demands for its services in the current cyber environment. "The threat actors have not gone away through all of this," Aziz says. "They have only gotten bigger and better." And what's bad news for pretty much anyone else is excellent news for those in the business of fighting such cyber villains.
Inc.com:  http://bit.ly/1HQ04Kg

 

« Who’s Afraid Of Superhumanity?
Financial Institutions Face Increasing Cyber Attacks »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Avanan

Avanan

Avanan is The Cloud Security Platform. Protect all your SaaS applications using tools from over 60 industry-leading vendors in just one click.

Competence Center for Applied Security Technology (CAST)

Competence Center for Applied Security Technology (CAST)

CAST offers a range of services in the field of secure modern information technology and a contact point for all questions regarding IT security.

ZyberSafe

ZyberSafe

ZyberSafe is an innovative Danish company specialized within building hardware encryption solutions.

SISSDEN

SISSDEN

SISSDEN will improve cybersecurity through the development of increased awareness and the effective sharing of actionable threat information.

Array Networks

Array Networks

Array Networks, the network functions platform company, develops purpose-built systems for hosting virtual networking and security functions with guaranteed performance.

RunSafe Security

RunSafe Security

RunSafe Security is the pioneer of a patented cyberhardening transformation process designed to disrupt attackers and protect vulnerable embedded systems and devices.

Relution

Relution

Relution is the Unified Endpoint Management platform for innovative companies and educational institutions. It enables you to manage your mobile apps and devices easily and securely.

APERIO

APERIO

APERIO, the global leader in industrial data integrity, helps its customers drive profitability and sustainability while mitigating risk in their industrial operations.

ACA Group

ACA Group

ACA Group are a leading governance, risk, and compliance (GRC) advisor in financial services.

Portshift

Portshift

Portshift leverages the power of Kubernetes and Service-Mesh to deliver a single source of truth for containers and cloud-native applications security.

Conquest Cyber

Conquest Cyber

Conquest Cyber builds adaptive risk management programs where innovation is most needed – within defense, intelligence, federal civilian agencies and the industrial base that supports them.

Maritime Cyber Threats Research Group - University of Plymouth

Maritime Cyber Threats Research Group - University of Plymouth

The Maritime Cyber Threats research group of the University of Plymouth is focused on investigating marine cyber threats and researching solutions.

Information Technology Solutions (ITS)

Information Technology Solutions (ITS)

Information Technology Solutions is a single source provider for managing and securing mission-critical IT services.

Jit

Jit

Jit empowers developers to own security for the product they are building from day zero.

Strategic Technology Solutions (STS)

Strategic Technology Solutions (STS)

Strategic Technology Solutions specialize in providing Cybersecurity and Managed IT Services to the legal industry.

PingSafe

PingSafe

PingSafe is creating the next-generation cloud security platform powered by attackers' intelligence, providing coverage for vulnerabilities that traditional security solutions would otherwise overlook