Your SlideShare is downloading. ×
U.C. Berkeley Engages FireEye for Advanced Malware Protection
U.C. Berkeley Engages FireEye for Advanced Malware Protection
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

U.C. Berkeley Engages FireEye for Advanced Malware Protection

165

Published on

A case study highlighting The Department of Electrical Engineering and Computer Science (EECS) at U.C. Berkely entrusting FireEye with Malware protection.

A case study highlighting The Department of Electrical Engineering and Computer Science (EECS) at U.C. Berkely entrusting FireEye with Malware protection.

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
165
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Case StudyU.C. Berkeley EECS Engages FireEye forAdvanced Malware Protection Summary Company University of California Berkeley Industry Education Description The University of California, Berkeley is internationally recognized for excellence and pioneering achievements across many disciplines. The university has over 1,700 full-time faculty members and 35,000 students. The Department of Electrical Engineering and Computer Science (EECS) offers one of the strongest research and instructional programs anywhere in the world. Challenge Identify and deploy solution to address shortcomings in existing security product portfolio, while minimizing operational overhead and impact on users. To achieve the highest possible level of threat detection and remediation precision. Solution Deployment of FireEye Web Malware Protection System 4000 Series Appliance, FireEye Malware Protection Cloud and FireEye Malware Analysis Appliance. Benefits Highly accurate malware detection with nominal false positives, and real-time confirmation of malicious activity, independent of known signature- and pattern-based threats. Easy imple- mentation, requiring no changes to existing processes or infrastructure, and low operational overhead.Located adjacent to San Francisco Bay, University of California Berkeley is ranked as the world’s premier public universityaccording to a recent U.S. News & World Report. As the university’s largest single department, Electrical Engineering andComputer Science (EECS) is home to more than 1,500 undergraduate and graduate students. The pace of innovation andleading-edge research within the department combine to form a dynamic and stimulating environment for students, staffand faculty. For the EECS information technology team, attaining a balance that continues to foster learning, creativity andbreakthrough thinking, without imposing unduly restrictive policies, is a constant challenge.“ ireEye keeps us ahead of the onslaught of continually escalating Web-based threats. I trust FireEye to give me F the definitive expert view on how to protect our very unique environment.” – Fred Archibald, Computing Infrastructure Manager, Department of Electrical Engineering and Computer Science, University of California, BerkeleyFireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com
  • 2. Case Study are shared with subscribers of the FireEye MalwareAchieving Results When Others Failed Protection Cloud: Being a member of the worldwideFollowing a successful proof of concept evaluation, FireEye community gives us a truly global perspec-a FireEye Web Malware Protection System (MPS) tive on malware outbreaks.”4000 Series appliance was deployed to help protectthe department. Fred Archibald, computing infra- Irrefutable Proofstructure manager for EECS, recalled, “We looked A consequence of working for a world-renownedclosely at several competing products, but the FireEye university is the inherent expertise of the user popula-appliance was very compelling. It was extremely tion. Archibald explained, “Many of our users possesseasy to install, actually taking less than half an hour a highly detailed knowledge of computer science-in total but more importantly it was immediately able related fields. This sometimes leads to requests forto identify threats that had not been detected by tangible proof for the reasons a potentially maliciousthe existing multiple layers of protection.” piece of code has been intercepted or isolated.The FireEye Web Malware Protection System is spe- Unlike conventional defenses, the FireEye MPS actu-cifically designed to be deployed alongside other ally confirms malicious activity and provides detailedsecurity gateways to identify zero-day threats that descriptions of what was found. In addition, we canpolicy- and signature-based firewalls, Web gate- use the FireEye Malware Analysis Appliance to do aways, intrusion prevention and anti-virus systems, fail forensic investigation and this enables me to con-to detect. A highly sophisticated virtual execution vince even the most skeptical of users that an at-engine identifies both unknown and known malware. tack was real, and our remediation actions justified.”Archibald observed, “Cyber criminals are making The FireEye Web Malware Protection System has asubstantial and ever-increasing investments in mal- well deserved reputation for its effectiveness andware, and new threats are constantly being intro- extremely low operational overhead. Archibaldduced: There is no way that even a really good suite concurred, “Four years on and FireEye continues toof traditional security applications can cope. The deliver outstanding protection. It requires minimalFireEye MPS is so effective because it doesn’t rely on routine management and delivers precision resultsexisting signatures or patterns. It searches in real- with negligible false positives. It does the job so welltime for any unusual or suspicious activities to deter- that I can focus on other tasks, feeling confidentmine if a behavior poses a legitimate threat. Once that we are protected.”something malicious is detected, specific detailsKey Components:FireEye Web Malware Protection System 4000 SeriesFireEye Malware Protection CloudFireEye Malware Analysis ApplianceFireEye is the world leader in combating advanced malware, zero-day and targeted APT attacks that bypasstraditional defenses, such as Firewalls, IPS, AV, and Web gateways!© 2011 FireEye, Inc. All rights reserved. FireEye, Inc. and all FireEye, Inc. products are either trademarks or registered trademarks of FireEye, Inc.Other product and company names mentioned herein may be the trademarks of their respective owners. -- CS.WMPS052011FireEye, Inc. | 1390 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com

×