FireEye Email Security:
Better Protection from Email-Borne Attacks
PROTECT YOUR PEOPLE, DATA
AND ASSETS WITH FIREEYE
EMAIL SECURITY
Reduces business risk of
unauthorized access
Saves operation costs
Deploys in minutes with no
physical infrastructure
Learn More at FireEye.com/email
Industry-leading detection of,
and protection from, advanced
persistent threats to safeguard
business assets
Real-time, automated
protection from spear-phishing
and other socially engineered
attacks to minimize impostor
‘calls-to-action’
Flexible deployment models to
support on-premise, cloud and
hybrid email environments
Always up-to-date on the latest
protection; no upgrades
needed
Comprehensive, contextual
threat intelligence to provide
your security team the
information it needs to respond
to threats
Protection from hard-to-detect
multi-vector, multi-flow attacks
THE COSTS OF AN EMAIL
BREACH ARE SIGNIFICANT
FINANCIAL
REMEDIATION
REPUTATION
$3.8MILLION3
82
TO CONTAIN
A BREACH
AVERAGE COST
OF BRAND
DAMAGE DUE TO
ADVANCED
PERSISTENT
THREATS
$9.4MILLION5
DAYS4
The attacker targets a global
shipping company and identifies
an IT manager inside — learning
about them through social media.
An email is crafted to appear like
it’s from the IT manager’s boss,
recommending a critical software
update.
The IT manager, assuming the
email is real, clicks on a link
embedded in the email to
install the software update.
Malware is downloaded from the
attacker’s server and infects the IT
manager’s machine.
Passcodes that control the
shipping company’s closed circuit
television network are exfiltrated.
The attacker disables the
closed-circuit television cameras,
steals the containers, and flees the
scene.
RECON SOCIAL ENGINEERING SPEAR PHISHING
INFECTION EXFILTRATION MISSION ACCOMPLISHED
How attackers steal shipping containers with
a single spear-phishing email.
1 Radicati Group Email Statistics Report, 2015-2019.
2 https://securelist.com/analysis/quarterly-spam-reports/69932/spam-and-phishing-in-the-first-quarter-of-2015/
3 2015 Cost of a Breach Study: Global Analysis; Ponemon Institute.
4 2015 Cost of a Breach Study: Global Analysis; Ponemon Institute, https://nhlearningsolutions.com/Portals/0/Documents/2015-Cost-of-Data-Breach-Study.PDF
5 Economic Impact of Advanced Persistent Threats: Ponemon Institute. May 2014.
© 2016 FireEye, Inc. All rights reserved. FireEye is a registered trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks
or service marks of their respective owners.
ATTACKERS TYPICALLY TARGET
AN UNEXPECTED TARGET
However, attackers are beginning to focus on
information that allows them to go after physical assets.
INTELLECTUAL PROPERTYFINANCIAL DATAHIGH-VALUE PEOPLE
EMAIL THE FIRST SECURITY GAP
TARGETED BY ATTACKERS
2.5 BILLION
THERE ARE APPROXIMATELY
EMAILS SENT EVERY DAY
1
2 3 SPAM
2
NEARLY EMAILS AREOF EVERY

[Infographic] Email: The First Security Gap Targeted by Attackers

  • 1.
    FireEye Email Security: BetterProtection from Email-Borne Attacks PROTECT YOUR PEOPLE, DATA AND ASSETS WITH FIREEYE EMAIL SECURITY Reduces business risk of unauthorized access Saves operation costs Deploys in minutes with no physical infrastructure Learn More at FireEye.com/email Industry-leading detection of, and protection from, advanced persistent threats to safeguard business assets Real-time, automated protection from spear-phishing and other socially engineered attacks to minimize impostor ‘calls-to-action’ Flexible deployment models to support on-premise, cloud and hybrid email environments Always up-to-date on the latest protection; no upgrades needed Comprehensive, contextual threat intelligence to provide your security team the information it needs to respond to threats Protection from hard-to-detect multi-vector, multi-flow attacks THE COSTS OF AN EMAIL BREACH ARE SIGNIFICANT FINANCIAL REMEDIATION REPUTATION $3.8MILLION3 82 TO CONTAIN A BREACH AVERAGE COST OF BRAND DAMAGE DUE TO ADVANCED PERSISTENT THREATS $9.4MILLION5 DAYS4 The attacker targets a global shipping company and identifies an IT manager inside — learning about them through social media. An email is crafted to appear like it’s from the IT manager’s boss, recommending a critical software update. The IT manager, assuming the email is real, clicks on a link embedded in the email to install the software update. Malware is downloaded from the attacker’s server and infects the IT manager’s machine. Passcodes that control the shipping company’s closed circuit television network are exfiltrated. The attacker disables the closed-circuit television cameras, steals the containers, and flees the scene. RECON SOCIAL ENGINEERING SPEAR PHISHING INFECTION EXFILTRATION MISSION ACCOMPLISHED How attackers steal shipping containers with a single spear-phishing email. 1 Radicati Group Email Statistics Report, 2015-2019. 2 https://securelist.com/analysis/quarterly-spam-reports/69932/spam-and-phishing-in-the-first-quarter-of-2015/ 3 2015 Cost of a Breach Study: Global Analysis; Ponemon Institute. 4 2015 Cost of a Breach Study: Global Analysis; Ponemon Institute, https://nhlearningsolutions.com/Portals/0/Documents/2015-Cost-of-Data-Breach-Study.PDF 5 Economic Impact of Advanced Persistent Threats: Ponemon Institute. May 2014. © 2016 FireEye, Inc. All rights reserved. FireEye is a registered trademark of FireEye, Inc. All other brands, products, or service names are or may be trademarks or service marks of their respective owners. ATTACKERS TYPICALLY TARGET AN UNEXPECTED TARGET However, attackers are beginning to focus on information that allows them to go after physical assets. INTELLECTUAL PROPERTYFINANCIAL DATAHIGH-VALUE PEOPLE EMAIL THE FIRST SECURITY GAP TARGETED BY ATTACKERS 2.5 BILLION THERE ARE APPROXIMATELY EMAILS SENT EVERY DAY 1 2 3 SPAM 2 NEARLY EMAILS AREOF EVERY