SlideShare a Scribd company logo
BUSINESS CHALLENGE
As a provider of digital corporate
communication services to many of the
world’s leading companies, information
security is of critical importance to
Investis. Investis designs, builds, hosts,
and maintains their clients’ digital
estates, publishing market-facing
information on a daily basis. Corporate
information partners are an attractive
target for advanced attackers seeking
lucrative inside information. This
compelled Investis to take extra measures
to protect their environment.
Investis is ISO 27001 certified and a
member of CISP, the UK government’s
cybersecurity information partnership.
The Investis security team conducts
regularpenetrationtestingandhasmultiple
applications to scan for vulnerabilities.
It maintains a rigorous patch schedule and
installs the latest software.
The ever-increasing sophistication of
cyber crime and first-hand experience
of the mechanisms being used by
state-sponsored hackers led Investis
to conclude that traditional information
security practices were inadequate.
Attacks by advanced threat actors
required a superior ability to rapidly
detect, investigate and resolve at the
earliest stages.
SOLUTION
As well as being the cyber security
partner of choice for many of the
US’s largest firms, Investis knew that
Mandiant Consulting (a FireEye
company) had been selected by the
UK Government Communications
Headquarters (GCHQ) as one of four
vendors certified to respond to cyber
security attacks targeting the UK’s
national infrastructure. After further
recommendations by key clients,
Investis hired Mandiant, initially to
conduct a strategic review of its
information security program.
Following a rigorous, on-site assessment,
Investis was pleased to find its daily
operational practices were not putting
Investis implements FireEye as
a Service to protect clients from
advanced attackers
C U S T O M E R S T O R Y
SECURITY
REIMAGINED
COMPANY PROFILE
Investis provides the world’s
leading digital communications
platform for hosting corporate
and investor relations websites
and web data feed services.
Investis helps 1,700 clients
and over 3,000 communications
professionals in more than
30 countries communicate,
engage, and understand their
global corporate audiences.
Investis employs 350 people
in six countries.
“We chose FireEye as a Service because we
wanted expert consultants who specialise in
identifying and stopping advanced attackers.”
— Alex Booth, chief operating officer, Investis
Investis implements FireEye as a Service to protect clients from advanced attackersCUSTOMER STORY:
the company at risk and best practices werebeing
observed,buttheyacknowledgedthe need to scale
their monitoring and incident response capabilities.
Investis chose to augment its security team with
FireEye®
as a Service.
“We chose FireEye as a Service because we
wanted expert consultants who speacilise in
identifying and stopping advanced attackers,”
said Investis’ chief operating officer, Alex Booth.
“For Investis to be the world’s safest platform
for managing digital communications and hosting
corporate websites, we needed the strongest
cyber security partner in the business. FireEye
consultants are on the front line investigating
advanced attacks every day, which gives them
the cutting edge in threat intelligence.”
The FireEye as a Service team regularly monitors
all traffic flowing through Investis’ global network,
using advanced detection and data analysis
capabilities and drawing upon intelligence collected
during thousands of client engagements across all
major industries. When FireEye as a Service
confirms an incident, it alerts the Investis team
and directs their response.
The service also provides the following capabilities:
Attack confirmation by top security experts:
Threat assessment experts analyse Investis’
network traffic around the clock, proactively
hunting for signs of compromise, such as
spear-phishing attempts or command and
control activity.
Context and risk assessment: Analysts correlate
attacker tactics against an extensive database of
intelligence, collected from 100,000+ annual
hours of incident response experience. They
classify the risk and provide Investis’ security
team with details about what is happening.
Rapid response: Investis can quickly engage
the FireEye professional services team when
rapid response or advanced forensic capabilities
are required.
BUSINESS BENEFITS
The primary benefit that Investis receives from
the FireEye as a Service solution is the ability to
detect advanced attacks that would otherwise go
unnoticed and to rapidly follow-up on incidents so
attacks can be stopped in the earliest stages.
“FireEye consultants are on the front line investigating
advanced attacks every day, which gives them the
cutting edge in threat intelligence.”
— Alex Booth, chief operating officer, Investis
www.fireeye.com
Investis implements FireEye as a Service to protect clients from advanced attackersCUSTOMER STORY:
“FireEye as a Service acts like part of our extended
security team, continuously monitoring and poised
for immediate response,” said Siv Ananthakumar,
director of IT operations. “FireEye as a Service
gives us the capability of ascertaining the root
cause of incidents, enabling us to respond in a way
that minimises the risk of a recurrence.”
Some of the specific benefits Investis has realised
with FireEye as a Service:
Improved detection of attempted attacks:
By applying intelligence about the newest
advanced attacker techniques and tactics, FireEye
as a Service enables the Investis team to detect
and stop attacks that could otherwise put its
clients in jeopardy.
Reduced response time: Detailed analysis and
remediation recommendations provided by the
FireEye as a Service analysts enable the Investis
team to quickly prioritise and resolve issues.
Enhanced incident response capabilities:
Exposure to FireEye as a Service analysts has
raised the skills and awareness of Investis’ IT team
while providing rapid access to incident response
experts when incidents escalate.
VISION
Investis is expanding its deployment of the
FireEye as a Service solution, adding network
sensors in additional locations throughout the
world and is currently assessing endpoint
coverage for end-to-end visibility. Investis wants
to leverage the knowledge they have gained about
advanced threats. Through its partnership with
FireEye and continued development of its security
practices, Investis is responding to the growing
security concerns of companies all over the world
by providing the safest information services
platform available.
FireEye, Inc. | 1440 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com
© 2015 FireEye, Inc. All rights reserved. FireEye is a trademark of FireEye, Inc.
All other brands, products, or service names are or may be trademarks or service
marks of their respective owners. — CS.IN.UK-EN.062015
“FireEye as a Service gives us the capability of
ascertaining the root cause of incidents, enabling
us to respond in a way that minimises the risk of
a recurrence.” — Siv Ananthakumar, director of IT operations, Investis

More Related Content

What's hot

National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
Vidushi Singh
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
Indian Air Force
 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security Certifications
Mercury Solutions Limited
 
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | EdurekaTop 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Edureka!
 
Cyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsCyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teams
Wynyard Group
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
InfinIT - Innovationsnetværket for it
 
Cybersecurity on Business Resilience
Cybersecurity on Business ResilienceCybersecurity on Business Resilience
Cybersecurity on Business Resilience
PECB
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
InfinIT - Innovationsnetværket for it
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
Dawn Yankeelov
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
Nur Shiqim Chok
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Edureka!
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2
Brad Deflin
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
Awais Shibli
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
Nur Shiqim Chok
 
Cyber security resilience ESRM Conference Amsterdam 2016
Cyber security resilience  ESRM Conference Amsterdam 2016Cyber security resilience  ESRM Conference Amsterdam 2016
Cyber security resilience ESRM Conference Amsterdam 2016
Niran Seriki, CCISO, CISM
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation Slides
SlideTeam
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
FireEye, Inc.
 
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS
 
ISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber SecurityISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber Security
Tharindunuwan9
 

What's hot (19)

National Cyber Security Policy-2013
National Cyber Security Policy-2013National Cyber Security Policy-2013
National Cyber Security Policy-2013
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
The Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security CertificationsThe Ultimate Guide To Cyber Security Certifications
The Ultimate Guide To Cyber Security Certifications
 
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | EdurekaTop 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
 
Cyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsCyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teams
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
Cybersecurity on Business Resilience
Cybersecurity on Business ResilienceCybersecurity on Business Resilience
Cybersecurity on Business Resilience
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...[Cisco Connect 2018 - Vietnam] Pauline hampshire   changing the security equa...
[Cisco Connect 2018 - Vietnam] Pauline hampshire changing the security equa...
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...[Cisco Connect 2018 - Vietnam] Pauline hampshire   vietnam cisco connect with...
[Cisco Connect 2018 - Vietnam] Pauline hampshire vietnam cisco connect with...
 
Cyber security resilience ESRM Conference Amsterdam 2016
Cyber security resilience  ESRM Conference Amsterdam 2016Cyber security resilience  ESRM Conference Amsterdam 2016
Cyber security resilience ESRM Conference Amsterdam 2016
 
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation SlidesCyber Security For Organization Proposal PowerPoint Presentation Slides
Cyber Security For Organization Proposal PowerPoint Presentation Slides
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
 
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
 
ISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber SecurityISO/IEC 27032 – Guidelines For Cyber Security
ISO/IEC 27032 – Guidelines For Cyber Security
 

Similar to Fire eye investis case study

AURISEG CONSULTING PRIVATE LIMITED
AURISEG CONSULTING PRIVATE LIMITED AURISEG CONSULTING PRIVATE LIMITED
AURISEG CONSULTING PRIVATE LIMITED
Srinivasan M.S
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Technology
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
accenture
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
Accenture Operations
 
ITrust Cybersecurity Services - Datasheet EN
ITrust Cybersecurity Services - Datasheet ENITrust Cybersecurity Services - Datasheet EN
ITrust Cybersecurity Services - Datasheet EN
ITrust - Cybersecurity as a Service
 
Infopercept - Managed Security Services Providers
Infopercept - Managed Security Services ProvidersInfopercept - Managed Security Services Providers
Infopercept - Managed Security Services Providers
Infopercept
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company Presentation
ChaitanyaS
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
CYBER SENSE
 
FINTECH: Industries we Serve
FINTECH: Industries we ServeFINTECH: Industries we Serve
FINTECH: Industries we Serve
The TNS Group
 
Cyber security landscape
Cyber security landscapeCyber security landscape
Cyber security landscape
Jisc
 
Defensive Cybersecurity Approach for Organizations.pptx
Defensive Cybersecurity Approach for Organizations.pptxDefensive Cybersecurity Approach for Organizations.pptx
Defensive Cybersecurity Approach for Organizations.pptx
Infosectrain3
 
ISF Congress 2016 - Session 7.2_Kukreja
ISF Congress 2016 - Session 7.2_KukrejaISF Congress 2016 - Session 7.2_Kukreja
ISF Congress 2016 - Session 7.2_Kukreja
Puneet Kukreja
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
manoharparakh
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
Marc St-Pierre
 
Virtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber SecurityVirtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber Security
Cyber Security Experts
 
NCC Group C Suite Cyber Security Advisory Services
NCC Group C Suite Cyber Security Advisory ServicesNCC Group C Suite Cyber Security Advisory Services
NCC Group C Suite Cyber Security Advisory Services
Ollie Whitehouse
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Accenture Technology
 
___2360_SP_RBR_4pp_FINAL---Screen
___2360_SP_RBR_4pp_FINAL---Screen___2360_SP_RBR_4pp_FINAL---Screen
___2360_SP_RBR_4pp_FINAL---Screen
Manuel Sanchez Lopez
 
Security and Risk Mitigation
Security and Risk MitigationSecurity and Risk Mitigation
Security and Risk Mitigation
haydenchamber
 
Cybergate International - Your Cyber Security Partner - Company Profile.pdf
Cybergate International - Your Cyber Security Partner - Company Profile.pdfCybergate International - Your Cyber Security Partner - Company Profile.pdf
Cybergate International - Your Cyber Security Partner - Company Profile.pdf
FrancescoMifsud1
 

Similar to Fire eye investis case study (20)

AURISEG CONSULTING PRIVATE LIMITED
AURISEG CONSULTING PRIVATE LIMITED AURISEG CONSULTING PRIVATE LIMITED
AURISEG CONSULTING PRIVATE LIMITED
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
 
FusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security TeamFusionX & Accenture: One Global Security Team
FusionX & Accenture: One Global Security Team
 
ITrust Cybersecurity Services - Datasheet EN
ITrust Cybersecurity Services - Datasheet ENITrust Cybersecurity Services - Datasheet EN
ITrust Cybersecurity Services - Datasheet EN
 
Infopercept - Managed Security Services Providers
Infopercept - Managed Security Services ProvidersInfopercept - Managed Security Services Providers
Infopercept - Managed Security Services Providers
 
Cy Cops Company Presentation
Cy Cops Company PresentationCy Cops Company Presentation
Cy Cops Company Presentation
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
FINTECH: Industries we Serve
FINTECH: Industries we ServeFINTECH: Industries we Serve
FINTECH: Industries we Serve
 
Cyber security landscape
Cyber security landscapeCyber security landscape
Cyber security landscape
 
Defensive Cybersecurity Approach for Organizations.pptx
Defensive Cybersecurity Approach for Organizations.pptxDefensive Cybersecurity Approach for Organizations.pptx
Defensive Cybersecurity Approach for Organizations.pptx
 
ISF Congress 2016 - Session 7.2_Kukreja
ISF Congress 2016 - Session 7.2_KukrejaISF Congress 2016 - Session 7.2_Kukreja
ISF Congress 2016 - Session 7.2_Kukreja
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
 
Virtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber SecurityVirtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber Security
 
NCC Group C Suite Cyber Security Advisory Services
NCC Group C Suite Cyber Security Advisory ServicesNCC Group C Suite Cyber Security Advisory Services
NCC Group C Suite Cyber Security Advisory Services
 
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
 
___2360_SP_RBR_4pp_FINAL---Screen
___2360_SP_RBR_4pp_FINAL---Screen___2360_SP_RBR_4pp_FINAL---Screen
___2360_SP_RBR_4pp_FINAL---Screen
 
Security and Risk Mitigation
Security and Risk MitigationSecurity and Risk Mitigation
Security and Risk Mitigation
 
Cybergate International - Your Cyber Security Partner - Company Profile.pdf
Cybergate International - Your Cyber Security Partner - Company Profile.pdfCybergate International - Your Cyber Security Partner - Company Profile.pdf
Cybergate International - Your Cyber Security Partner - Company Profile.pdf
 

Fire eye investis case study

  • 1. BUSINESS CHALLENGE As a provider of digital corporate communication services to many of the world’s leading companies, information security is of critical importance to Investis. Investis designs, builds, hosts, and maintains their clients’ digital estates, publishing market-facing information on a daily basis. Corporate information partners are an attractive target for advanced attackers seeking lucrative inside information. This compelled Investis to take extra measures to protect their environment. Investis is ISO 27001 certified and a member of CISP, the UK government’s cybersecurity information partnership. The Investis security team conducts regularpenetrationtestingandhasmultiple applications to scan for vulnerabilities. It maintains a rigorous patch schedule and installs the latest software. The ever-increasing sophistication of cyber crime and first-hand experience of the mechanisms being used by state-sponsored hackers led Investis to conclude that traditional information security practices were inadequate. Attacks by advanced threat actors required a superior ability to rapidly detect, investigate and resolve at the earliest stages. SOLUTION As well as being the cyber security partner of choice for many of the US’s largest firms, Investis knew that Mandiant Consulting (a FireEye company) had been selected by the UK Government Communications Headquarters (GCHQ) as one of four vendors certified to respond to cyber security attacks targeting the UK’s national infrastructure. After further recommendations by key clients, Investis hired Mandiant, initially to conduct a strategic review of its information security program. Following a rigorous, on-site assessment, Investis was pleased to find its daily operational practices were not putting Investis implements FireEye as a Service to protect clients from advanced attackers C U S T O M E R S T O R Y SECURITY REIMAGINED COMPANY PROFILE Investis provides the world’s leading digital communications platform for hosting corporate and investor relations websites and web data feed services. Investis helps 1,700 clients and over 3,000 communications professionals in more than 30 countries communicate, engage, and understand their global corporate audiences. Investis employs 350 people in six countries. “We chose FireEye as a Service because we wanted expert consultants who specialise in identifying and stopping advanced attackers.” — Alex Booth, chief operating officer, Investis
  • 2. Investis implements FireEye as a Service to protect clients from advanced attackersCUSTOMER STORY: the company at risk and best practices werebeing observed,buttheyacknowledgedthe need to scale their monitoring and incident response capabilities. Investis chose to augment its security team with FireEye® as a Service. “We chose FireEye as a Service because we wanted expert consultants who speacilise in identifying and stopping advanced attackers,” said Investis’ chief operating officer, Alex Booth. “For Investis to be the world’s safest platform for managing digital communications and hosting corporate websites, we needed the strongest cyber security partner in the business. FireEye consultants are on the front line investigating advanced attacks every day, which gives them the cutting edge in threat intelligence.” The FireEye as a Service team regularly monitors all traffic flowing through Investis’ global network, using advanced detection and data analysis capabilities and drawing upon intelligence collected during thousands of client engagements across all major industries. When FireEye as a Service confirms an incident, it alerts the Investis team and directs their response. The service also provides the following capabilities: Attack confirmation by top security experts: Threat assessment experts analyse Investis’ network traffic around the clock, proactively hunting for signs of compromise, such as spear-phishing attempts or command and control activity. Context and risk assessment: Analysts correlate attacker tactics against an extensive database of intelligence, collected from 100,000+ annual hours of incident response experience. They classify the risk and provide Investis’ security team with details about what is happening. Rapid response: Investis can quickly engage the FireEye professional services team when rapid response or advanced forensic capabilities are required. BUSINESS BENEFITS The primary benefit that Investis receives from the FireEye as a Service solution is the ability to detect advanced attacks that would otherwise go unnoticed and to rapidly follow-up on incidents so attacks can be stopped in the earliest stages. “FireEye consultants are on the front line investigating advanced attacks every day, which gives them the cutting edge in threat intelligence.” — Alex Booth, chief operating officer, Investis www.fireeye.com
  • 3. Investis implements FireEye as a Service to protect clients from advanced attackersCUSTOMER STORY: “FireEye as a Service acts like part of our extended security team, continuously monitoring and poised for immediate response,” said Siv Ananthakumar, director of IT operations. “FireEye as a Service gives us the capability of ascertaining the root cause of incidents, enabling us to respond in a way that minimises the risk of a recurrence.” Some of the specific benefits Investis has realised with FireEye as a Service: Improved detection of attempted attacks: By applying intelligence about the newest advanced attacker techniques and tactics, FireEye as a Service enables the Investis team to detect and stop attacks that could otherwise put its clients in jeopardy. Reduced response time: Detailed analysis and remediation recommendations provided by the FireEye as a Service analysts enable the Investis team to quickly prioritise and resolve issues. Enhanced incident response capabilities: Exposure to FireEye as a Service analysts has raised the skills and awareness of Investis’ IT team while providing rapid access to incident response experts when incidents escalate. VISION Investis is expanding its deployment of the FireEye as a Service solution, adding network sensors in additional locations throughout the world and is currently assessing endpoint coverage for end-to-end visibility. Investis wants to leverage the knowledge they have gained about advanced threats. Through its partnership with FireEye and continued development of its security practices, Investis is responding to the growing security concerns of companies all over the world by providing the safest information services platform available. FireEye, Inc. | 1440 McCarthy Blvd. Milpitas, CA 95035 | 408.321.6300 | 877.FIREEYE (347.3393) | info@fireeye.com | www.fireeye.com © 2015 FireEye, Inc. All rights reserved. FireEye is a trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners. — CS.IN.UK-EN.062015 “FireEye as a Service gives us the capability of ascertaining the root cause of incidents, enabling us to respond in a way that minimises the risk of a recurrence.” — Siv Ananthakumar, director of IT operations, Investis