Brief Overview

FireEye offers a range of advanced threat prevention, security analytics, and attack mitigation solutions and platforms.


FireEye Corporate Headquarters
601 McCarthy Blvd.
Milpitas, CA 95035
Tel: (877) 347 - 3393


Kevin Mandia, CEO of FireEye, was previously Founder of Mandiant, which was acquired by FireEye in 2013.


Ashar Aziz founded FireEye in 2004 and served as its CEO until 2012. The company acquired Mandiant in 2013. The company is headquartered in Milipitas, California with offices in Reston, Virginia; Buenos Aires, Argentina; and Mexico. After investments from Jafco Ventures, Sequoia Capital, Juniper Networks, and Norwest, the company went public in 2013. FireEye reported $600M in business in 2014.

Key Acquisitions

Verodin (2019) - Breach Simulation
iSIGHT Partners (2016) – Threat Intelligence
Invotas (2016) – Security Orchestration
nPulse (2014) – Forensics
Mandiant (2014) – Incident Response
Unveillance (2012) – by Mandiant

Key Competitors

Damballa, Fortinet, Palo Alto Networks, Stroz Friedberg

Products and Services

FireEye products and services can be grouped as follows:

• Platform: The FireEye appliance and cloud-based Threat Prevention Platform addresses advanced cyber threats for network, email, content, mobile, forensics (AX Series), and endpoint environments. The platform is also available as an Endpoint Threat Prevention Platform.
• Subscription: FireEye also provides subscription services via its FireEye Managed Defense, which offers security posture insight, guidance and remediation support on attacks, and work toward containment of attacks.
• Mandiant Consulting: The Mandiant Security Consulting Service offers incident response, security assessment, and incident response program development for organizations concerned with advanced attacks.
• Threat Intelligence: The FireEye Dynamic Threat Intelligence repository provides actionable information based on millions of VMS deployed worldwide.

In 2014, FireEye launched FireEye as a Service. The service works by pushing virtual machines into an environment and then managing from a security center.