Fireeye Email Security Server Edition: Data Sheet
Fireeye Email Security Server Edition: Data Sheet
HIGHLIGHTS
• Offers comprehensive email
security against malicious
attachments, credential-
phishing URLs, spoofing, zero-
day and multi-stage attacks
Figure 1. Integrated Email Security appliances include EX 3500, EX 5500 and EX 8500.
• Supports analysis against
Microsoft Windows and
Apple macOS X operating
Overview
system images
Email is the most vulnerable vector for cyber attacks because it is the highest
• Extensively examines email for volume data ingress point. Organizations face an ever-increasing number of
threats hidden in password- security challenges from email-based advanced threats. Most advanced threats
protected files, encrypted
use email to deliver URLs linked to credential phishing sites and weaponized
attachments, and URLs
file attachments. Because it is highly targetable and customizable, email is the
• Acquires real-time threat primary medium for cyber crime.
intelligence from the FireEye
DTI Cloud FireEye Email Security helps organizations minimize the risk of costly
breaches caused by advanced email attacks. Deployed on premises, FireEye
• Prioritizes and contains threats
Email Security – Server Edition leads the industry in identifying, isolating and
by providing contextual insights
for alerts immediately stopping URL and attachment-based attacks, before they enter an
organization’s environment. Email Security combines intelligence-led context
• Deploys on-premises with and detection plug-ins to unearth malicious and benign phishing URLs on a big
integrated or distributed
data, scalable platform. The signatureless Multi-Vector Virtual Execution™ (MVX)
MVX service
engine analyzes email attachments and URLs linked to downloadable content
against a comprehensive cross-matrix of operating systems, applications and
web browsers. Threats are identified with minimal noise, and false positives are
nearly nonexistent.
DATA SHEET | FIREEYE EMAIL SECURITY SERVER EDITION 2
FireEye collects extensive threat intelligence on At the core of Email Security are Advanced URL Defense,
adversaries through firsthand breach investigations and the MVX engine and MalwareGuard. These technologies
millions of sensors. Email Security draws on both concrete use machine learning and analytics to identify attacks that
evidence and contextual intelligence about attacks and evade traditional signature and policy-based defenses.
attackers to prioritize alerts and block threats in real time.
An integral part of Advanced URL Defense, PhishVision
By integrating with FireEye Network Security and Endpoint is an image classification engine that uses deep learning
Security organizations can get broader visibility into multi- to compile and compare screenshots of trusted and
vector blended attacks and coordinate real-time protection. commonly targeted brands against web pages referenced
by URLs in an email. Working in tandem with PhishVision,
Defense against email borne threats Kraken is a phishing detection plug-in that applies
With all the personal information available online, a domain and page content analytics to augment machine
cyber criminal can use social engineering to trick almost learning. Skyfeed, another advance in URL detection, is
any user into taking an action, clicking a URL or opening a purpose-built, fully automated malware intelligence
an attachment. gathering system. Social media accounts, blogs,
forums and threat feeds are collected to discover false
Email Security provides real-time detection and
negatives. The multi-faceted nature of Advanced URL
prevention against credential harvesting, impersonation
Defense offers organizations protected by Email Security
and spear-phishing attacks that typically evade
unparalleled defense against credential harvesting and
traditional email security defenses. Emails are analyzed
spear-phishing attacks.
and quarantined (blocked) if unknown and advanced
threats are found hidden in: MalwareGuard is a machine learning utility that takes
binary files as input and outputs a suspiciousness score.
• Attachment types including, but not limited to: EXE,
Every Portable Executable (PE) file seen on the wire is
DLL, PDF, SWF, DOC/ DOCX, XLS/XLSX, PPT/PPTX,
analyzed by MalwareGuard. A decision is made based on
JPG, PNG, MP3, MP4 and ZIP/RAR/TNEF archives
the score and detections triggered by MalwareGuard are
• Password-protected and encrypted attachments assigned a name.
• Password-protected attachments with password
The MVX engine detects zero-day, multi-flow and other
sent via image
evasive attacks by using dynamic, signature-less analysis in
• URLs embedded in emails, MS Office documents, PDF a safe, virtual environment. It identifies never-before-seen
and archive files (ZIP, ALZIP, JAR), and other file types exploits and malware to stop infection and compromise.
(Uuencoded, HTML)
Evasion mitigation
• Files downloaded through URLs – and even FTP links
Email Security supports a controlled live mode feature to
• Obfuscated, spoofed, shortened and dynamically defend against attacks that evade requests for remote
redirected URLs objects. The MVX engine detects malware requiring
• Credential-phishing and typosquatting URLs multiple downloads and returns the remote objects
requested by the sample binary. Controlled live mode
• Unknown Microsoft Windows and Apple macOS X
reduces false negatives for multistage downloads,
operating system images, browser and application advanced spear-phishing attacks and advanced
vulnerabilities ransomware intrusions.
• Malicious code embedded in spear-phishing emails
Attackers also try to evade technology used for detecting
While ransomware attacks start with an email, a call back suspicious URLs. As part of Advanced URL Defense,
to a command-and-control server is typically required to evasion mitigations for phishing sites are continually
encrypt the data. Email Security identifies and stops these evolving. Evasion mitigations are continually enhanced
hard-to- detect multi-stage malware campaigns. as part of Advanced URL Defense. Another evasion
mitigation, Guest Images can be customized to mimic
Superior threat detection a “used” endpoint when a potentially malicious object
Email Security helps mitigate the risk of costly breaches is executed. Many evasion techniques are prevented by
by identifying and isolating advanced, targeted and other ensuring the Guest Image reproduces an endpoint domain,
evasive attacks camouflaged as normal traffic. Once domain user, Outlook data and browser history.
detected, these attacks are immediately stopped, analyzed
and fingerprinted for faster identification of future threats.
DATA SHEET | FIREEYE EMAIL SECURITY SERVER EDITION 3
Integration to improve alert handling efficiencies • Central Management correlates alerts from both Email
Email Security analyzes every email attachment and URL Security and Network Security for a broader view of an
to accurately identify today’s advanced attacks. Real- attack and to set blocking rules to prevent the attack
time updates from the entire FireEye security ecosystem from spreading.
combined with attribution of alerts to known threat actors
• Central Management supports role-based tagging to
provide context for prioritizing and acting on critical alerts
know who is being targeted.
and blocking advanced email attacks. Known, unknown
and non-malware-based threats are identified with minimal • Central Management supports alert response and
noise and false positives so that resources are focused remediation based on role-based criteria.
on real attacks to reduce operational expenses. Riskware
Additional capabilities
categorization separates genuine breach attempts from
YARA-based rules enable customization
undesirable, but less malicious activity (such as adware
Email Security enables analysts to specify and test custom
and spyware) to prioritize alert response.
rules to analyze email attachments for threats targeting
Rapid adaptation to the evolving threat landscape their organization.
Email Security helps your organization continually adapt
Executive impersonation protection
your proactive defense against email-borne threats via
Email Security – Server Edition offers the capability to
real-time threat intelligence from the FireEye Dynamic
block business email compromises (BEC) to protect
Threat Intelligence (DTI) Cloud. Deep intelligence about
important employees from being spoofed. A policy is
threats and attackers combines adversarial, machine and
created that compares inbound email display names to an
victim intelligence to:
approved list that matches approved envelope senders.
• Deliver timely and broader visibility to threats
Message queue, alert and quarantine management
• Identify specific capabilities and features of detected Email Security – Server Edition provides a high degree
malware and malicious attachments of control over the email messages it scans. For active
• Provide contextual insights to prioritize and protection-mode deployments, messages can be tracked
accelerate response and managed as they move through the MTA queue. Email
attributes can be used to search and verify that messages
• Determine the probable identity and motives of an
were received, analyzed and delivered to the next hop and
attacker and track their activities within your organization trends over time can be monitored through an intuitive
• Rewrite all URLs embedded within an email to protect dashboard. Explicit allow and block lists provide custom
users from malicious links control over email processing. Common alert attributes
can be searched and selected. And bulk operations can be
• Retroactively identify spear-phishing attacks and
performed on alerts and quarantined messages.
prevent access to phishing sites by highlighting
malicious URLs Active-protection or monitor-only mode
Email Security can analyze emails and quarantine threats
Response workflow integration
for active protection. For monitor-only deployments
Email Security works seamlessly with FireEye Helix and
organizations just set up a transparent BCC rule to send
FireEye Central Management.
copies of emails to Email Security for analysis.
• As a component of the security operations platform
— FireEye Helix — it provides visibility across the
entire infrastructure. FireEye Helix augments email and
third-party alerts with intelligence, correlation to the
endpoint, automation, and investigative tips. With these
capabilities, FireEye Helix surfaces unseen threats and
empowers expert decisions.
DATA SHEET | FIREEYE EMAIL SECURITY SERVER EDITION 4
Central Site
FireEye
MVX Smart Grid Cloud MVX
Remote site
Performance* Up to 700 unique attachments Up to 1,800 unique attachments Up to 2,650 unique attachments
per hour per hour per hour
Network Interface Ports 2x 1GigE BaseT 2x 1GigE BaseT 4x SFP+ (supporting 10GigE Fiber,
10GigE Copper, 1GigE Copper),
2x 1GigE BaseT
USB Ports (rear panel) 4x USB Type A Rear 2x USB Type A Front, 2x USB Type A Front,
2x USB Type A Rear 2x USB Type A Rear
Serial Port (rear panel) 115,200 bps, No Parity, 8 Bits, 115,200 bps, No Parity, 8 Bits, 115,200 bps, No Parity, 8 Bits,
1 Stop Bit 1 Stop Bit 1 Stop Bit
Storage Capacity 4x 2TB, RAID 10, HDD 3.5 inch, FRU 4x 2TB, RAID 10, HDD 3.5 inch, FRU 4x 2TB, RAID 10, HDD 3.5 inch, FRU
Enclosure 1RU, Fits 19-inch Rack 2RU, Fits 19-inch Rack 2RU, Fits 19-inch Rack
Chassis Dimensions (WxDxH) 17.2” x 25.6” x 1.7” 17.24” x 24.41” x 3.48” 17.24” x 24.41” x 3.48”
(437 x 650 x 43.2 mm) (438 x 620 x 88.4 mm) (438 x 620 x 88.4 mm)
AC Power Supply Redundant (1+1) 750 watt, Redundant (1+1) 800 watt, Redundant (1+1) 800 watt,
100 - 240 VAC, 9 – 4.5A,50-60 Hz, 100 - 240 VAC, 9 – 4.5A,50-60 Hz, 100 - 240 VAC, 9 – 4.5A,50-60 Hz,
IEC60320-C14 inlet, FRU IEC60320-C14 inlet, FRU IEC60320-C14 inlet, FRU
Thermal Maximum Power 245 watts (836 BTU per hour) 456 watts (1,556 BTU per hour) 530 watts (1,808 BTU per hour)
Appliance Alone / As Shipped 30.0 lbs (13.6 kg) / 41.0 lbs (18.6 kg) 44.1 lbs (20.0 kg) / 65.3 lbs (29.6 kg) 44.4 lbs (20.2 Kg) / 65.6 lbs (29.8 kg)
Weight, lb (kg)
Security Certifications FIPS 140-2, CC NDPP v1.1 FIPS 140-2, CC NDPP v1.1 FIPS 140-2, CC NDPP v1.1
Environmental Compliance RoHS Directive 2011/65/EU; REACH; RoHS Directive 2011/65/EU; REACH; RoHS Directive 2011/65/EU; REACH;
WEEE Directive 2012/19/EU WEEE Directive 2012/19/EU WEEE Directive 2012/19/EU
Operating Temperature 0 ~ 35° C (32 ~ 95° F) 0 ~ 35° C (32 ~ 95° F) 0 ~ 35° C (32 ~ 95° F)
Operating Relative Humidity 10 ~ 95% @ 40° C, non-condensing 10 ~ 95% @ 40° C, non-condensing 10 ~ 95% @ 40° C, non-condensing
* All performance values vary depending on the system configuration and email traffic profile being processed. Size appliance(s) based on
unique attachments per hour.
DATA SHEET | FIREEYE EMAIL SECURITY SERVER EDITION 6
VX 5500 VX 12500
Performance* Up to 480 unique attachments per hour Up to 3,780 unique attachments per hour
Management Ports (rear panel) 1x 10/100/1000 Mbps BASE- T Ports 1x 10/100/1000 Mbps BASE- T Ports
Cluster Ports (rear panel) 3x 10/100/1000 Mbps BASE-T Ports 1x 10/100/1000 Mbps BASE-T Ports,
2x 10 Gbps BASE-T Ports
USB Ports (rear panel) 4x Type A USB Ports 2x Type A USB Ports
Serial Port (rear panel) 115,200 bps, No Parity, 8 bits, 1 Stop Bit 115,200 bps, No Parity, 8 Bits, 1 Stop Bit
Drive Capacity 2x 2TB 3.5 SAS HDD, RAID 1, hot-swappable, FRU 4 x 4TB 3.5” SAS3 HDD, RAID 1, FRU
Chassis Dimensions (WxDxH) 17. 2x25.6x1.7 Inches (437 x 650 x 43.2 mm) 17.2x33.5x3.5 Inches (437 x 851 x 89 mm)
AC Power Supply Redundant (1+1) 750 watt, 100-240 VAC, Redundant (1+1) 800W: 100-127V,
8 - 3.8 A, 50-60 Hz, IEC60320-C14, inlet, 9.8A-7A 1000W: 220-240V, 7-5A, 50-60Hz, FRU
hot-swappable, FRU IEC60320-C14 inlet, FRU
Thermal Dissipation Maximum 972 BTU per hour 2594 BTU per hour
Appliance Alone / As Shipped Weight 33 lb (15 kg) / 48 lb (21.8 kg) 46 lb (21 kg) / 90 lb (40.2 kg)
Security Certification FIPS 140-2 Level 1, CC NDPP v1.1 FIPS 140-2 Level 1, CC NDPP v1.1
* All performance values vary depending on the system configuration and traffic profile being processed.
** With appropriate redundant hardware configurations.
DATA SHEET | FIREEYE EMAIL SECURITY SERVER EDITION 7
EX 5500V
CPU cores 8
Memory 16 GB
* All performance values vary depending on the system configuration and traffic profile being processed.