What is FireEye?

FireEye Enterprise is a fully featured Security Management Software designed to serve Agencies, Enterprises. FireEye Enterprise provides end-to-end solutions designed for Web App. This online Security Management system offers Web Threat Management at one place.

Pricing

FireEye Starting Price

Awards
FireEye Award

Our Awards and Recognition

More Awards
Need a Little Help?

Talk with a software expert for free. Get a list of software that's great for you in less than 10 minutes.

FireEye Screenshots

Key Features of FireEye

Here are the powerful features that make FireEye stand out from the competition. Packed with innovative tools and advanced functionalities, this software offers a range of benefits.

  • Access control
  • Activity Log
  • Activity Monitoring
  • Advanced Firewall
  • AI / Machine Learning
  • Anonymous Browsing
  • Anti Spam
  • Anti Virus
  • Application Access Control
  • Application Security
  • Archiving
  • Asset Discovery
  • Asset Tagging
  • Audit Trail
  • Audit Trails
  • Availability Testing
  • Backup Management
  • Bandwidth Monitoring
  • Baseline Manager
  • Basic Firewall
  • Behavioral Analytics
  • Billing & Invoicing
  • Biometric
  • Compliance Management
  • Compliance Reporting
  • Configuration Management
  • Connectivity Management
  • Consolidation
  • Content Routing
  • Credential Management
  • Customer Management
  • Dashboard
  • Data Export
  • Data Visualization
  • Database Security Audit
  • Defect Tracking
  • Deployment Management
  • Diagnostic Tools
  • DNS Leak Protection
  • Document Imaging
  • eDiscovery
  • Email Attachment Protection
  • Encryption
  • Endpoint Management
  • Event Logs
  • Event Tracking
  • Event-Based Notifications
  • File Access Control
  • File Integrity Monitoring
  • Financial Data Protection
  • Firewall
  • Forensic Analysis
  • FTP Monitoring
  • Full Transaction Diagnostics
  • Granular Access Controls
  • Health Monitoring
  • Incident Management
  • Internet Security
  • Internet Usage Monitoring
  • Intrusion Detection System
  • Inventory Management
  • IP Address Monitoring
  • IP Protection
  • Job Costing
  • Kill Switch
  • Lead management
  • Least Privilege
  • Log Management
  • Maintenance Scheduling
  • Mobile Access
  • Mobile Authentication
  • Multi-Language
  • Multi-Protocol
  • Multifactor Authentication
  • Network Diagnosis
  • Network Logs
  • Network Monitoring
  • Network Scanning
  • Password Management
  • Password Protection
  • Patch Management
  • PCI Assessment
  • Peer-to-Peer
  • Performance Control
  • Performance Metrics
  • Policy Management
  • Predefined Protocols
  • Prioritization
  • Quarantine
  • Quotes / Estimates
  • Real Time Monitoring
  • Real-Time Reporting & Dashboards
  • Real-time Scheduling
  • Redundancy Checking
  • Release Management
  • Remediation
  • Remote Access
  • Reporting/Analytics
  • Reverse Proxy
  • Risk Assessment
  • Risk Management
  • Role based management
  • Root-Cause Diagnosis
  • Schedulers
  • Scheduling
  • Security Event Log
  • Sensitive Data Identification
  • Server Performance
  • Signature Matching
  • Single Sign On
  • SLA Monitoring
  • Spyware Removal
  • SSL Offload
  • Subscriber Management
  • Syslogs
  • Threat Intelligence
  • Threat Protection
  • Thresholds
  • Trace individual transactions
  • Transaction Monitoring
  • Two-Factor Authentication
  • Uptime Reporting
  • User Activity Monitoring
  • User Friendly Webportal
  • User Management
  • Version Control
  • Virtual Machine Monitoring
  • Virus Definition Update
  • Vulnerability Assessment
  • Vulnerability Management
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Inspection
  • Web Logs
  • Web Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Whitelisting / Blacklisting
  • Work Order Management
Show More
  • Advanced persistent threat (APT) protection
  • Antivirus and malware protection
  • Application control and whitelisting
  • Data backup and recovery
  • Data encryption at rest and in transit
  • Data loss prevention (DLP)
  • Endpoint protection and device control
  • Firewall protection
  • Identity and access management (IAM)
  • Incident response and threat intelligence
  • Intrusion detection and prevention system (IDS/IPS)
  • Log management and auditing
  • Network anomaly detection
  • Network encryption (SSL/TLS)
  • Network forensics and packet analysis
  • Network load balancing and failover
  • Network segmentation and isolation
  • Network traffic monitoring and analysis
  • Secure email and messaging
  • Secure file transfer protocols (SFTP)
  • Secure remote access
  • Security assessment and compliance
  • Security incident response automation
  • Security information and event management (SIEM)
  • Security policy management
  • Two-factor authentication (2FA)
  • User behavior analytics (UBA)
  • Virtual private network (VPN) support
  • Vulnerability scanning and assessment
  • Web filtering and content control
  • Wireless network security
Show More
  • Auto Update
  • Company Size
  • Drag & Drop
  • Frequency of Use
  • Invoices
  • Length of Use
  • Mobile Access
  • Rating
  • Real Time Editing
  • Reviewer's Role
  • Toll Free Numbers
  • AI / Machine Learning
  • Anti Spam
  • Anti Virus
  • Anti-Phishing
  • Application Security
  • Behavioral Analytics
  • DMARC
  • eCommerce
  • Email Attachment Protection
  • Email encryption
  • Email hosting
  • Email Security
  • Encryption
  • HIPAA Compliance
  • HIPAA Compliant Email
  • HIPAA Compliant Messaging
  • Online Fax
  • Policy Management
  • Quarantine
  • Reporting/Analytics
  • Threat Intelligence
  • Website builder
  • Whitelisting / Blacklisting
Show More
  • Behavioral Analytics
  • Compliance Reporting
  • Endpoint Management
  • File Integrity Monitoring
  • Forensic Analysis
  • Log Management
  • Network Monitoring
  • Real Time Monitoring
  • Threat Intelligence
  • User Activity Monitoring
  • Advanced Threat Hunting
  • Anomaly Detection
  • Application control and whitelisting
  • Behavioral Analysis
  • Centralized Management Console
  • Credential and Access Management
  • Data loss prevention (DLP)
  • Endpoint Compliance Monitoring
  • Endpoint Isolation and Quarantine
  • Endpoint Visibility and Inventory
  • File and Device Control
  • File Integrity Monitoring
  • Forensic Analysis
  • Host-based Intrusion Detection and Prevention (HIDS/HIPS)
  • Incident Response and Investigation
  • Machine Learning and Artificial Intelligence (AI) capabilities
  • Malware Detection and Removal
  • Memory and Process Monitoring
  • Network traffic analysis
  • Real-time Endpoint Monitoring
  • Remediation and Patch Management
  • Remote Endpoint Management
  • Sandboxing and Behavioral Analysis
  • Security Event Logging and Alerting
  • Security Incident and Event Management (SIEM) Integration
  • Security policy enforcement
  • Threat detection and prevention
  • Threat Intelligence Integration
  • User and Entity Behavior Analytics (UEBA)
  • Vulnerability assessment and management
Show More

FireEye Specifications

Get a closer look at the technical specifications and system requirements for FireEye. Find out if it's compatible with your operating system and other software.

Deployment :
Cloud Based
Subscription Plan :
Monthly, Yearly
Accessibility :
API
Customization
Mobile Support
Desktop Platforms :
Web app
Windows
Language Support :
English
Business :
StartUps
SMBs
Agencies
Enterprises
Available Support :
Email
Company Details :
Company Name : FireEye
Headquarter : Milpitas
Website : Visit Website

FireEye Comparisons

Compare FireEye with other similar options available in Security Management Software. Explore the key differences to see why it's the top choice for businesses and individuals.

FireEye logo
Do you work for FireEye?
Claim This Profile

FireEye Reviews (0)

Ask a question

No reviews yet. Rate this app or be the first to review.

Write a Review

Alternatives of FireEye

Explore alternative software options that can fulfill similar requirements as FireEye. Evaluate their features, pricing, and user feedback to find the perfect fit for your needs.

FireEye FAQs

What are the top 5 features for FireEye?

The top 5 features for FireEye are:

  • User Management
  • Password Protection
  • Basic Firewall
  • Internet Security
  • Web Threat Management

What type of customer support is available from FireEye?

The available support which FireEye provides is:

  • Email

Where is the headquarters/company of FireEye located?

The headquarters/company of FireEye is located at Milpitas.

Free Demo Get Pricing
Free Demo