Category | Topics |
---|---|
GeneralThis category is designed for general chatter. Whether it’s your first time here or you are a veteran FireEye developer, this is a place for you to discuss all things general.
|
3
|
Detection on DemandThis category is designed for developers who are using FireEye’s Detection on Demand API. Whether it’s your first time here or you become a veteran of the API, this is a place for you to discuss all things Detection on Demand. Tell us what you like, what you don’t like, or maybe ways in which you’d like to see us extend the API. Whatever you have to say, we want to hear it.
|
18
|
Third Party IntegrationsA category to discuss integrations and apps developed by FireEye for third parties, like Splunk, Microsoft, Google, etc.
|
0
|
CloudvisoryDiscuss all things Cloudvisory in this category. Get answers and insights from experts within FireEye and the developer community.
|
1
|
HelixFireEye Helix is a cloud-hosted security operations platform that allows organizations to take control of any incident from alert to fix. Whether you are new to Helix, or you are a seasoned veteran, this category is a great place to ask questions and get answers. There are also sub categories for feature requests and bug reports that are monitored by the Helix team.
|
12
|
Endpoint SecurityEach desktop, laptop and server is a possible entry for a breach, leaving your data, customer information and intellectual property at risk. Endpoint Security protects your organization with intelligence led protection, detection and response. Whether you are new to Endpoint, or you are a seasoned veteran, this category is a great place to ask questions and get answers. There are also sub categories for feature requests and bug reports that are monitored by the Endpoint team.
|
8
|
Email Security Cloud EditionEmail is the primary method used to initiate an advanced attack. Our secure email gateway with advanced email protection can detect threats other solutions miss, because the detection engines inspect suspicious email traffic to identify attacks that evade traditional signature- and policy-based defenses. Whether you are new to Email Security Cloud Edition, or you are a seasoned veteran, this category is a great place to ask questions and get answers. There are also sub categories for feature requests and bug reports that are monitored by the Email team.
|
1
|
Threat IntelligenceFireEye Threat Intelligence provides a multi-layered approach to using intelligence within your security organization, expanding on threat feeds, tactical intelligence, and operational intelligence. Whether you are new to Threat Intelligence, or you are a seasoned veteran, this category is a great place to ask questions and get answers. There are also sub categories for feature requests and bug reports that are monitored by the Threat Intelligence team.
|
0
|
Network SecurityFireEye Network Security is an effective cyber threat protection solution that helps organizations minimize the risk of costly breaches by accurately detecting and immediately stopping advanced, targeted and other evasive attacks hiding in Internet traffic. Whether you are new to Network Security, or you are a seasoned veteran, this category is a great place to ask questions and get answers. There are also sub categories for feature requests and bug reports that are monitored by the Network Security team.
|
0
|
Network ForensicsFireEye Network Forensics allows you to identify and
resolve security incidents faster by capturing and indexing full packets at extremely rapid speeds. With Network Forensics, you can detect a broad array of security incidents, improve the quality of your response and precisely quantify the impact of each incident. |
0
|
Investigation AnalysisThe Investigation Analysis System is a standalone appliance that works hand-in-hand with the FireEye Network Forensics Platform, acquired through FireEye’s purchase of nPulse Technologies. The Network Forensics Platform provides ultrafast packet capture and meta-data extraction, while the Investigation Analysis System extends that functionality through a centralized, easy-to-use analytical interface across an organization’s network meta-data.
|
0
|
Malware AnalysisMalware analysis is an important part of preventing and detecting future cyber attacks. Using malware analysis tools, cyber security experts can analyze the attack lifecycle and glean important forensic details to enhance their threat intelligence. Whether you are new to Malware Analysis, or you are a seasoned veteran, this category is a great place to ask questions and get answers. There are also sub categories for feature requests and bug reports that are monitored by the Malware Analysis team.
|
0
|
Email Security Server EditionEmail is the primary method used to initiate an advanced attack. Our secure email gateway with advanced email protection can detect threats other solutions miss, because the detection engines inspect suspicious email traffic to identify attacks that evade traditional signature- and policy-based defenses. Whether you are new to Email Security Cloud Edition, or you are a seasoned veteran, this category is a great place to ask questions and get answers. There are also sub categories for feature requests and bug reports that are monitored by the Email team.
|
0
|
7
|
|
Site FeedbackDiscussion about this site, its organization, how it works, and how we can improve it. For example, if you’d like to see a new category on the community then this is the place to let us know.
|
0
|