We've unified Citrix solutions and our portfolio. Learn more .

FireEye Endpoint Security

Citrix Ready Product Image / Logo
Request Product Details

Compatible with

  • Citrix Virtual Apps 1808
  • Citrix Virtual Apps 1811
  • Citrix Virtual Apps and Desktops service
  • Citrix Virtual Apps and Desktops service on Azure
  • Citrix Virtual Apps and Desktops service with AWS
  • Citrix Virtual Desktops 1808
  • Citrix Virtual Desktops 1811
  • XenApp 7.14
  • XenApp 7.15 LTSR
  • XenApp 7.18
  • XenDesktop 7.14
  • XenDesktop 7.15 LTSR
  • XenDesktop 7.18

Compatibility

  • Citrix Virtual Apps and Desktops service (XenApp & XenDesktop service)
  • Citrix Virtual Desktops (XenDesktop)
  • Citrix Virtual Apps (XenApp)
  • Citrix Virtual Apps and Desktops service on Azure

Product Details

FireEye Endpoint Security combines the best of legacy security products, enhanced with FireEye technology, expertise and intelligence to defend against today’s cyber attacks. FireEye uses four engines in Endpoint Security to prevent, detect and respond to a threat.

To prevent common malware, Endpoint Security uses a signature-based endpoint protection platform (EPP) engine. To find threats for which a signature does not yet exist, MalwareGuard uses machine learning seeded with knowledge from the frontlines of cyber attacks. To deal with advanced threats, endpoint detection and response (EDR) capabilities are enabled through a behavior-based analytics engine. Finally, a real-time indicator of compromise (IOC) engine that relies on current, frontline intelligence helps find hidden threats. This defense in depth strategy helps protect vital information stored on customer endpoints.

Features

Even with the best protection, breaches are inevitable. To ensure a substantive response that minimizes business disruption, Endpoint Security provides tools to:

  • Search for and investigate known and unknown threats on tens of thousands of endpoints in minutes
  • Identify and detail vectors an attack used to infiltrate an endpoint
  • Determine whether an attack occurred (and persists) on a specific endpoint and where it spread
  • Establish timeline and duration of endpoint compromises and follow the incident
  • Clearly identify which endpoints, physical or virtual, and systems need containment to prevent further compromise

Screenshots