FireEye NX 1500
NX 1500 | |
User Count | 500 |
OS Support | Microsoft Windows Mac OS X |
Performance | Up to 50 Mbps |
Network Monitoring Ports | 4x 10/100/1000 BASE-T Ports |
Network Ports Mode of Operation | on In-line Monitor, FailClose or Tap |
High Availability (HA) | Not Available |
High Availability (HA) Ports (rear panel) | Not Available |
Management Ports (rear panel) | 2x 10/100/1000 BASE- T Ports |
IPMI Port (rear panel) | Not Available |
Front LCD & Keypad | Not Available |
VGA Port | Not Available |
Serial Port (rear panel) | 115,200 bps, No Parity, 8 bits, 1 Stop Bit (RJ45 connector; RJ45-to-Dsub adapter cable is included) |
Drive Capacity | Single 500GB 2.5 inch SATA HDD, internal, fixed |
Enclosure | Desktop formfactor |
Chassis Dimension WxDxH | 11in(280mm) x 6.9in(175mm) x 1.8in(45.7mm) |
AC Power Supply | External 60 Watt 12V@5A Ouput AC Adapter, 90-264 VAC, 50-60 Hz, IEC60320-C14, inlet, FRU |
Power Consumption Maximum (watts) | 27 watts |
Thermal Dissipation Maximum (BTU/h) | 92 BTU/h |
MTBF (h) | 95,400 h |
Appliance Alone / As Shipped Weight lb. (kg) | 3.75 lb (1.7 kg) / 6.5 lb (2.95 kg) |
Regulatory Compliance Safety | IEC 60950 EN 60950-1 UL 60950 CSA/CAN-C22.2 |
Security Certifications | FIPS 140-2 Level 1 CC NDPP v1.1 |
Regulatory Compliance EMC | FCC Part 15 ICES-003 Class A AS/NZS CISPR 22 CISPR 32 EN 55032 EN 55024 IEC/EN 61000-3-2 IEC/EN 61000-3-3 IEC/EN 61000-4-2 V-2/2015 &V-3/2015 |
Environmental Compliance | RoHS Directive 2011/65/EU REACH WEEE Directive 2012/19/EU |
Operating Temperature | 0 ~ 40°C 32 ~ 104°F |
Non-Operating Temperature | -20 ~ 80°C -4 ~ 176°F |
Operating Relative Humidity | 5% - 85% non-condensing |
Non-Operating Relative Humidity | 5% - 95% non-condensing |
Operating Altitude | 3,000 m 9,842 ft |
OVERVIEW
FireEye Network Security is an effective cyber threat protection solution that helps organizations minimize the risk of costly breaches by accurately detecting and immediately stopping advanced, targeted and other evasive attacks hiding in Internet traffic. It facilitates efficient resolution of detected security incidents in minutes with concrete evidence, actionable intelligence and response workflow integration. With FireEye Network Security, organizations are effectively protected against today’s threats whether they exploit Microsoft Windows, Apple OS X operating systems, or application vulnerabilities; are directed at the headquarters or branch offices; or are hidden in a large volume of inbound Internet traffic that has to be inspected in real time.
Technical Advantages
Accurate Threat Detection FireEye Network Security uses multiple analysis techniques to detect attacks with high accuracy and a low rate of false alerts: • Multi-Vector Virtual Execution™ (MVX) engine detects zero-day, multi-flow and other evasive attacks with dynamic, signature-less analysis in a safe, virtual environment. It stops infection and compromise phases of the cyber-attack kill chain by identifying never-beforeseen exploits and malware. • Intelligence-Driven Analysis (IDA) engines detect and block obfuscated, targeted and other customized attacks with contextual, rule-based analysis from realtime insights gathered on the front lines from millions of MVX verdicts, thousands of hours of incident response experience gathered by Mandiant, a FireEye company and hundreds of iSight threat researchers. It stops infection, compromise and intrusion phases of the cyber-attack kill chain by identifying malicious exploits, malware and command and control (CnC) callbacks. It also extracts and submits suspicious network traffic to the MVX engine for a definitive verdict analysis. • Structured Threat Intelligence eXpression (STIX) allows the ingestion of third-party threat intelligence using an industry-standard format to add custom threat indicators into the IDA engines.