Dynamic Threat Intelligence cloud 2-way - subscription license renewal (1 y

Mfg.Part: RN-8400EX-2WDTI1Y | CDW Part: 3715157 | UNSPSC: 43232806
Availability: In Stock
Warranties
Advertised Price

Terms and Conditions

These services are considered Third Party Services, and this purchase is subject to CDW’s Third Party Cloud Services Terms and Conditions, unless you have a written agreement with CDW covering your purchase of products and services, in which case this purchase is subject to such other written agreement.

The third-party Service Provider will provide these services directly to you pursuant to the Service Provider’s standard terms and conditions or such other terms as agreed upon directly between you and the Service Provider. The Service Provider, not CDW, will be responsible to you for delivery and performance of these services. Except as otherwise set forth in the Service Provider’s agreement, these services are non-cancellable, and all fees are non-refundable.

Product Details
  • way
  • Subscription license renewal (1 year)
View Full Product Details
Better Together
Dynamic Threat Intelligence cloud 2-way - subscription license renewal (1 y
Quick View
Total Price:

Product Details

Main Features
  • way
  • Subscription license renewal (1 year)
The FireEye Dynamic Threat Intelligence (DTI) cloud interconnects FireEye threat prevention platforms deployed within customer networks, technology partner networks, and service providers around the world. This worldwide cloud efficiently shares auto-generated threat intelligence, such as covert callback channels, as well as new threat findings from FireEye Labs.

When a platform confirms an attack locally, it generates dynamic and anonymized threat intelligence of the attack and distributes it through the DTI cloud to warn other users. Unlike reputation and risk-based threat intelligence networks, which make assumptions about potentially risky code and broadcast signatures that may either falsely block or falsely allow traffic, FireEye systems confirm malicious activity. The assessments captured by the FireEye systems are conclusive because suspicious code is fully tested in a virtual execution environment.