FireEye Inc (NASDAQ:FEYE), the leader in stopping today’s cyber attacks, today announced its state government focused intelligence sharing initiative with the National Fusion Center Association (NFCA). The initiative is a collaboration between FireEyeand the NFCA, including the joint development of Automated Threat Intelligence Exchange Network (ATIX) for the California State Threat Assessment System (STAS).

FireEye sits on the NFCA’s subcommittee for Cyber Threat Intelligence and Sharing, providing industry leading intelligence and expertise to analyze information, identify trends, and share accurate, actionable threat intelligence for various state needs. This includes supporting regional and state intelligence agencies during national and local crises, dissemination of advanced threat intelligence to agencies, and training of cyber analysts.

“In today’s world of advanced threat actors, having the best threat intelligence and knowing how and with whom to share it is the key to addressing a potential data breach quickly,” said NFCA Executive Director W. Ross Ashley, III. “The support FireEye provides at every level of government has proven invaluable in helping us to produce and share critical intelligence in order to keep our states secure.”

“Cyber security programs need to be based on adaptive defense approaches supported by intelligence to best protect Northern California Law Enforcement, First Responders, Government and Private Sector Partners,” said Mike Sena, Director, Northern California Regional Intelligence Center. “Whether it is identifying cyber crime, cyber terror, or cyber espionage, intelligence sharing enables us to take a strong stance against today’s threats.”

“When you can rely on a solid combination of intelligence, technology and expertise, you stand a much better chance of identifying a breach before the worst can happen,” said Chad Holmes, FireEye chief security strategist, global government, office of the CTO. “As the cyber liaison officer for many of the state intelligence agencies across the country, I see firsthand how vital it is that disparate agencies share intelligence in critical cyber situations.”

In addition, the NFCA and FireEye have also partnered to create a weeklong training to be held in each region for cyber state intelligence analysts. This training will be focused on cyber intelligence gathering, curating information, and creating cyber intelligence products for dissemination.

Unique to California, the ATIX program that FireEye is jointly developing for the California State Threat Assessment System will provide the California State Intelligence agencies with the ability to proactively gather critical digital information from their partners, respond to cyber incidents and distribute actionable intelligence back to their partners in machine- and human-readable formats. (Original Source)

Shares of FireEye Inc closed yesterday at $48.59 . FEYE has a 1-year high of $55.33 and a 1-year low of $24.81. The stock’s 50-day moving average is $49.81 and its 200-day moving average is $42.29.

On the ratings front, FireEye has been the subject of a number of recent research reports. In a report released yesterday, Citigroup analyst Walter Pritchard maintained a Hold rating on FEYE. Separately, on July 13, Piper Jaffray’s Andrew Nowinski reiterated a Buy rating on the stock .

According to, which ranks over 7,500 financial analysts and bloggers to gauge the performance of their past recommendations, Walter Pritchard and Andrew Nowinski have a total average return of 13.9% and 11.3% respectively. Pritchard has a success rate of 70.0% and is ranked #288 out of 3707 analysts, while Nowinski has a success rate of 59.2% and is ranked #527.

Overall, 7 research analysts have assigned a Hold rating and 6 research analysts have given a Buy rating to the stock. When considering if perhaps the stock is under or overvalued, the average price target is $45.67 which is -6.0% under where the stock closed yesterday.

FireEye Inc provides cybersecurity solution for detecting, preventing and resolving cyber-attacks that evade legacy signature-based security products. Its solutions include traditional and next-generation firewalls, IPS, anti-virus, and gateways.