Gateway Systems Partners To Expand Offerings
Gateway Systems Limited is has announced that it has partnered with FireEye and Mandiant to expand their portfolio of product and services to “combat the ever expanding threat of cyber crime.”
A spokesperson said, “FireEye [FEYE] is a leader in cyber security, protecting organizations from advanced malware, zero-day exploits, APTs, and other cyber-attacks. FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber threats.
“These highly sophisticated attacks circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle.
“The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block attacks in real time. FireEye has over 4,000 customers across 67 countries, including more than 650 of the Forbes Global 2000.”
“We are delighted to be able to bring FireEye, its technology and its event response company Mandiant to the Bermuda market” stated Eric Buckingham, Senior Account Manager, Gateway Systems Limited.
“By adding FireEye to Gateway’s comprehensive team of security partners ensures we can deal with every aspect of Cyber Security and give our customers what they need to minimize the threat of a Cyber security breach. And when or if it does happen, we can assist in business recovery and deal with the repercussions”.
“Mandiant, a FireEye company, is the leader in helping organizations respond to and proactively protect against advanced cyber security threats.
“With over 10 years of experience dealing with advanced threat actors from around the world, they support organizations during the most critical times after a security breach has been identified and proactively help them improve their detection, response and containment capabilities.”
Read More About
Category: All, Business, technology