FireEye Network Security Pros and Cons

FireEye Network Security Pros

Sr Technical Consultant at a tech services company with 51-200 employees
It protects from signature-based attacks and signature-less attacks. The sandboxing technology, invented by FireEye, is very valuable. Our customers go for FireEye because of the sandboxing feature. When there is a threat or any malicious activity with a signature, it can be blocked by IPS. However, attacks that do not have any signatures and are very new can only be blocked by using the sandboxing feature, which is available only in FireEye. So, FireEye has both engines. It has an IPS engine and a sandbox engine, which is the best part. You can get complete network protection by using FireEye.
I also like its logging method. Its logging is very powerful and useful for forensic purposes. You can see the traffic or a specific activity or how something entered your network and where it went.
View full review »
SK
Lead Program Manager at a computer software company with 10,001+ employees
It is stable and quite protective. It has a lot of features to scan a lot of malicious things and vulnerabilities.
View full review »
OT/ICS Information Security Specialist at SANS
The most valuable feature is MVX, which tests all of the files that have been received in an email.
View full review »
Find out what your peers are saying about FireEye, Palo Alto Networks, Broadcom and others in Advanced Threat Protection. Updated: May 2021.
511,773 professionals have used our research since 2012.
PP
ciso at SDIS49
The server appliance is good.
View full review »
Professional Services Division Manager at 2Bsecure
The most valuable feature is the network security module.
View full review »

FireEye Network Security Cons

Sr Technical Consultant at a tech services company with 51-200 employees
Its documentation can be improved. The main problem that I see with FireEye is the documentation. We are an official distributor and partner of FireEye, and we have access to complete documentation about how to configure or implement this technology, but for customers, very limited documentation is available openly. This is the area in which FireEye should evolve. All documents should be easily available for everyone.
They can maybe consider supporting some compliance standards. When we are configuring rules and policies, it can guide whether they are compliant with a particular compliance authority. In addition, if I have configured some rules that have not been used, it should give a report saying that these rules have not been used in the last three months or six months so that I disable or delete those rules.
View full review »
SK
Lead Program Manager at a computer software company with 10,001+ employees
I heard that FireEye recently was hacked, and a lot of things were revealed. We would like FireEye to be more secure as an organization. FireEye has to be more protective because it is one of the most critical devices that we are using in our environment. They have a concept called SSL decryption, but that is only the packet address. We would like FireEye to also do a lot of decryption inside the packet. Currently, FireEye only does encryption and decryption of the header, but we would like them to do encryption and decryption of the entire packet.
View full review »
OT/ICS Information Security Specialist at SANS
It would be very helpful if there were better integration with other solutions from other vendors, such as Fortinet and Palo Alto.
View full review »
Find out what your peers are saying about FireEye, Palo Alto Networks, Broadcom and others in Advanced Threat Protection. Updated: May 2021.
511,773 professionals have used our research since 2012.
PP
ciso at SDIS49
Technical packaging could be improved.
View full review »
Professional Services Division Manager at 2Bsecure
It is very expensive, the price could be better.
View full review »
Find out what your peers are saying about FireEye, Palo Alto Networks, Broadcom and others in Advanced Threat Protection. Updated: May 2021.
511,773 professionals have used our research since 2012.