FireEye Threat Analytics Platform Now Includes Adallom

The popular Threat Analytics Platform created by FireEye is designed to defend against cyber attacks. FireEye’s TAP received an upgrade as it was announced that Adallom’s security visibility for cloud applications is now being integrated into the Threat Analytic Platform suite. The enhancement was recently announced in Las Vegas at FireEye’s 2015 Momentum conference. The event serves as FireEye’s annual kick off and it attracts attendees from all around the world.

You might be wondering, what exactly is Adallom? Adallom provides products that plug into your SaaS offerings to give you a plethora of data about the SaaS app’s use. When organizations first migrate to apps such as Office 365, Salesforce and others popular SaaS apps, sometimes gaps occur in security and some corporate data could be at risk of being exposed. Adallom’s integration into FireEye will enhance an organizations ability to detect when their cloud services are being abused.

Grady Summers from FireEye says, “In recent years, the cloud has become a ubiquitous part of the enterprise IT mix, and as with any technology with explosive growth, there comes a new set of security considerations.” Summer expounds on the Adallom integration mentioning, “We developed FireEye TAP for these new realities, and by integrating with Adallom, we’re able to expand our customers’ security visibility into their cloud environments. FireEye and Adallom are working together to deliver more meaningful insights on user behavior and data, improving security capabilities with a more complete picture of an organization’s IT assets and users.”

With the addition of Adallom, FireEye’s Threat Access Platform now possesses security broker capabilities delivering visibility, governance and protection for cloud applications. Adallom cofounder Ami Luttwak mentioned that SaaS application attacks have quickly become sophisticated.  Luttwak is quoted in the press release saying, “We’re excited to partner with FireEye, the leader in stopping advanced cyber attacks, to integrate these insights and extend the protection to cloud deployments.”