Search company, investor...

Founded Year




Total Raised




About FireEye

FireEye (NASDAQ: FEYE) operates as a cyber security firm. It provides website security solutions, email security solutions, content security solutions, endpoint security solutions, and more. The company was founded in 2004 and is based in Milpitas, California.

Headquarters Location

1440 McCarthy Boulevard

Milpitas, California, 95035,

United States




Expert Collections containing FireEye

Expert Collections are analyst-curated lists that highlight the companies you need to know in the most important technology spaces.

FireEye is included in 2 Expert Collections, including Regtech.



1,611 items

Technology that addresses regulatory challenges and facilitates the delivery of compliance requirements. Regulatory technology helps companies and regulators address challenges ranging from compliance (e.g. AML/KYC) automation and improved risk management.



7,452 items

These companies protect organizations from digital threats.

FireEye Patents

FireEye has filed 338 patents.

The 3 most popular patent topics include:

  • computer security
  • computer network security
  • computer security exploits
patents chart

Application Date

Grant Date


Related Topics





Application Date


Grant Date



Related Topics



Latest FireEye News

24 Stories To Learn About Hacker News

Nov 23, 2023

Let's learn about Hacker News via these 24 free stories. They are ordered by most time reading created on HackerNoon. Visit the /Learn Repo to find the most read stories about any technology. 1. While You Were Weekending 2. Black Hat Hacking Forums Get Hacked: Possibly a LulzSec Attack Presently, the world of black hat forums appears to be engulfed in a series of cyberattacks. According to a Telegram channel, on 18th June 2019 it was reported that three leading black hat hacking forums were reportedly exploited, affecting an aggregate of over 260,000 hackers. From the disclosed data, it appears as though the creator of the aforementioned Telegram Channel has access to certain Ukrainian police files which may have led to the leak. 3. Hackers Are Stealing NFTs, and It’s Not As Easy as You Think Unfortunately, even though NFTs are relatively new, there’s already been an issue of hackers stealing non-fungible tokens. Here's a closer look. 4. Introduction to One Gadget: A Necessary Tool for Exploitation This post uses a concrete CTF problem to show you step-by-step how to find and execute a one gadget and eventually spawn a shell. 5. 7 Best Workflow Automation Software Available Online A business's success depends upon the amount of work its employees do. However, every employee has a priority list for their tasks meaning that certain tasks are more important than others. Unfortunately, this prioritization sometimes leads to them ignoring/rushing the smaller yet crucial tasks that are important to the smooth functioning of a business. 6. 3 Impressive Cyberattacks of 2020: What we Can Learn From Them When it comes to cyberattacks, everybody is at risk, whether it be big corporations, government bodies, small businesses, or private individuals.  7. How I Hit the Front Page of Hacker News 5 Times First, let me turn off your warning bells. 8. Why a YC Rejection Isn't The End of The World If you've been following tech entrepreneurs on social media channels, you've probably seen many people sharing their stories about getting rejected from YC—the famed startup accelerator in Silicon Valley. A few others shared their success stories, and the vast majority of applicants remained silent as the decision letters were rolled out. 9. EU Drafts Data Regulations for Voice Assistant Developers On March 2, 2021, the European Data Protection Board (EDPB) released Guidelines on Virtual Voice Assistants (VVAs) to protect users’ privacy. 10. How I Got 78 Criticisms on Show Hacker News for My Zoom Competitor Last month, I launched the app on Show HN. As a result, it got 82 points and 78 comments. Ranked in the toppest 10 of popular posts in a day also. Actually, we have pros and cons about it and people tend to criticize it more. Anyway, it felt so amazing that a lot of the people across the world visited my website and said hi to me. What an exciting moment! Today, I’d like to share how to develop and launch a landing page. 11. How Hacker News Home Page Got Us 300+ Stars on GitHub in 24 Hours Hacker News is said to be the Holy Grail for tech folks. There’s one thing that a company, startups in particular, wants desperately: RIGHT traffic for free. 12. Can you Hire a Hacker on the Dark Web? If you are here, you have probably heard about how to hire a hacker on the dark or deep web. Using regular web browsers, we can only have access to four percent of the net. The other 96% must be accessed through a unique browser, Tor. 13. MakeMySummary Software Update: June 2020 We recently released an update for MakeMySummary. The following are the highlights of the update. 14. How I Made My Side Project Going Viral on Hacker News In December 2019, I finally decided to kill my side project after 12 months of coding. It was a tough moment, I felt disappointed and angry. 15. Analyzing 110 Million Comments from Hacker News In this article, we’ll observe another test with1.1M Hacker News curated comments with numeric fields 16. DAOMaker and Eminence Included in The Biggest DeFi Hacks of 2020 Decentralized finance (DeFi) was created back in 2015, when the pioneer application, MakerDAO, allowed any crypto holders to take out loans in the DAI stablecoin. Years of steady growth followed and a palpable buzz around DeFi started to emerge in the crypto community, leading to the breakout year that was 2020.  17. 22 Internet Stories From Hacker News, and Beyond! This is the first weekly list of top content collected from hacker news and other sources about tech, science, privacy, and other interesting news. 18. Houston, We Have a Pizza Robot And other very important tech news from today. 19. A Guide to Staying Safe on the Internet Now, more than ever, we must remain vigilant of the evolving threats brought about by cunning and mischievous hackers.   20. From Idea to MVP to Hacker News in 44 Hours A day by day account of how I went from initial idea to coding and releasing my new app in 11 days, culminating in a Hacker News post. 21. 17 Best Animation Software for Beginners in 2022 Looking for the best animation software for beginners? You are at the right place! 22. Collecting Data from 1.1M Hacker News Curated Comments In this test we use the data collection of 1.1M Hacker News curated comments with numeric fields from 23. How A Week-Long Project Took Me To #2 On Product Hunt and The Front Page of Hacker News The month of May has been a fairly crazy one. It started out like any other, with me trying to come up with a decent, catchy name for my latest side project that still had an available domain name associated with it. Since it was a tech-related startup, I was considering top-level domains (TLDs) like .ai, .io, .co, and .com. 24. Why the SUNBURST Incident is More Alarming than the FireEye’s Hack Why the SUNBURST incident is more alarming than the FireEye’s hack. Thank you for checking out the 24 most read stories about Hacker News on HackerNoon. Visit the /Learn Repo to find the most read stories about any technology.

FireEye Frequently Asked Questions (FAQ)

  • When was FireEye founded?

    FireEye was founded in 2004.

  • Where is FireEye's headquarters?

    FireEye's headquarters is located at 1440 McCarthy Boulevard, Milpitas.

  • What is FireEye's latest funding round?

    FireEye's latest funding round is PIPE.

  • How much did FireEye raise?

    FireEye raised a total of $85.45M.

  • Who are the investors of FireEye?

    Investors of FireEye include Blackstone, Norwest Venture Partners, Sequoia Capital, Silicon Valley Bank, Juniper Networks and 7 more.

  • Who are FireEye's competitors?

    Competitors of FireEye include Recorded Future, Tanium, Digital Shadows, Zimperium, Veracode and 7 more.


Compare FireEye to Competitors

Veracode Logo

Veracode focuses on intelligent software security in the technology industry. The company offers a software security platform to continuously find and fix flaws and vulnerabilities in software throughout the development lifecycle using artificial intelligence (AI). It primarily sells to sectors such as the public sector, financial services, software and technology, retail and e-commerce, and healthcare. Veracode was formerly known as Veracode Securities Corporation. It was founded in 2006 and is based in Burlington, Massachusetts.

Zimperium Logo

Zimperium provides enterprise mobile threat defense. The Zimperium Mobile Threat Defense system delivers enterprise-class protection for Android and iOS devices against the next generation of advanced mobile threats. Developed for mobile devices, Zimperium uses patented, behavior-based analytics that continuously runs on the device to protect mobile devices against WiFi, cellular, and host-based threats wherever business takes them. It was founded in 2010 and is based in Dallas, Texas.

Lookout Logo

Lookout operates as a data-centric cloud security platform. It protects data and controls access with cloud-native, converged secure access service edge (SASE) and security service edge (SSE). The company delivers an integrated cloud security platform that secures data for enterprises and ensures they comply with regulations. Lookout was formerly known as Flexilis. The company was founded in 2007 and is based in San Jose, California.

eSentire Logo

eSentire focuses on managed detection and response services in the cybersecurity industry. The company offers a range of services including exposure management services, managed detection and response, and digital forensics and incident response, all aimed at identifying security gaps, improving threat detection, and providing rapid response to cyber threats. It primarily serves various sectors including the insurance, construction, finance, legal, manufacturing, private equity, healthcare, and retail industries. It was founded in 2001 and is based in Waterloo, Canada.

Recorded Future Logo
Recorded Future

Recorded Future provides intelligence-related solutions to reveal unknown threats. It delivers threat intelligence powered by patented machine learning to lower risk, empowering organizations to reveal unknown threats before they impact business and enabling teams to respond to security alerts. The company was founded in 2009 and is based in Somerville, Massachusetts. In May 2019, Recorded Future was acquired by Insight Partners.

Deep Instinct Logo
Deep Instinct

Deep Instinct is a cybersecurity company that provides a deep learning platform to prevent enterprises from threats. Its solution reduces detection noise and false alert storms to reduce overall risk, improve SOC team productivity, and improve the cost of ownership of its customer cybersecurity stack. The company was founded in 2015 and is based in Tel Aviv, Israel.


CBI websites generally use certain cookies to enable better interactions with our sites and services. Use of these cookies, which may be stored on your device, permits us to improve and customize your experience. You can read more about your cookie choices at our privacy policy here. By continuing to use this site you are consenting to these choices.