Category Topics

General

This category is designed for general chatter. Whether it’s your first time here or you are a veteran FireEye developer, this is a place for you to discuss all things general.
3

Detection on Demand

This category is designed for developers who are using FireEye’s Detection on Demand API. Whether it’s your first time here or you become a veteran of the API, this is a place for you to discuss all things Detection on Demand. Tell us what you like, what you don’t like, or maybe ways in which you’d like to see us extend the API. Whatever you have to say, we want to hear it.
18

Third Party Integrations

A category to discuss integrations and apps developed by FireEye for third parties, like Splunk, Microsoft, Google, etc.
0

Cloudvisory

Discuss all things Cloudvisory in this category. Get answers and insights from experts within FireEye and the developer community.
1

Helix

FireEye Helix is a cloud-hosted security operations platform that allows organizations to take control of any incident from alert to fix. Whether you are new to Helix, or you are a seasoned veteran, this category is a great place to ask questions and get answers. There are also sub categories for feature requests and bug reports that are monitored by the Helix team.
12

Endpoint Security

Each desktop, laptop and server is a possible entry for a breach, leaving your data, customer information and intellectual property at risk. Endpoint Security protects your organization with intelligence led protection, detection and response. Whether you are new to Endpoint, or you are a seasoned veteran, this category is a great place to ask questions and get answers. There are also sub categories for feature requests and bug reports that are monitored by the Endpoint team.
8

Email Security Cloud Edition

Email is the primary method used to initiate an advanced attack. Our secure email gateway with advanced email protection can detect threats other solutions miss, because the detection engines inspect suspicious email traffic to identify attacks that evade traditional signature- and policy-based defenses. Whether you are new to Email Security Cloud Edition, or you are a seasoned veteran, this category is a great place to ask questions and get answers. There are also sub categories for feature requests and bug reports that are monitored by the Email team.
1

Threat Intelligence

FireEye Threat Intelligence provides a multi-layered approach to using intelligence within your security organization, expanding on threat feeds, tactical intelligence, and operational intelligence. Whether you are new to Threat Intelligence, or you are a seasoned veteran, this category is a great place to ask questions and get answers. There are also sub categories for feature requests and bug reports that are monitored by the Threat Intelligence team.
0

Network Security

FireEye Network Security is an effective cyber threat protection solution that helps organizations minimize the risk of costly breaches by accurately detecting and immediately stopping advanced, targeted and other evasive attacks hiding in Internet traffic. Whether you are new to Network Security, or you are a seasoned veteran, this category is a great place to ask questions and get answers. There are also sub categories for feature requests and bug reports that are monitored by the Network Security team.
0

Network Forensics

FireEye Network Forensics allows you to identify and
resolve security incidents faster by capturing and indexing
full packets at extremely rapid speeds. With Network
Forensics, you can detect a broad array of security
incidents, improve the quality of your response and
precisely quantify the impact of each incident.
0

Investigation Analysis

The Investigation Analysis System is a standalone appliance that works hand-in-hand with the FireEye Network Forensics Platform, acquired through FireEye’s purchase of nPulse Technologies. The Network Forensics Platform provides ultrafast packet capture and meta-data extraction, while the Investigation Analysis System extends that functionality through a centralized, easy-to-use analytical interface across an organization’s network meta-data.
0

Malware Analysis

Malware analysis is an important part of preventing and detecting future cyber attacks. Using malware analysis tools, cyber security experts can analyze the attack lifecycle and glean important forensic details to enhance their threat intelligence. Whether you are new to Malware Analysis, or you are a seasoned veteran, this category is a great place to ask questions and get answers. There are also sub categories for feature requests and bug reports that are monitored by the Malware Analysis team.
0

Email Security Server Edition

Email is the primary method used to initiate an advanced attack. Our secure email gateway with advanced email protection can detect threats other solutions miss, because the detection engines inspect suspicious email traffic to identify attacks that evade traditional signature- and policy-based defenses. Whether you are new to Email Security Cloud Edition, or you are a seasoned veteran, this category is a great place to ask questions and get answers. There are also sub categories for feature requests and bug reports that are monitored by the Email team.
0
7

Site Feedback

Discussion about this site, its organization, how it works, and how we can improve it. For example, if you’d like to see a new category on the community then this is the place to let us know.
0