Hexis Cyber Solutions Enhances HawkEye G to Improve Continuous Monitoring & Response
(GlobeNewswire Via Acquire Media NewsEdge) HANOVER, Md., Aug. 6, 2014 (GLOBE NEWSWIRE) -- Hexis Cyber Solutions (Hexis), a wholly-owned subsidiary of The KEYW Holding Corporation (Nasdaq:KEYW), and a provider of advanced cybersecurity solutions for commercial companies and government agencies, today announced significant enhancements to its next generation Threat Detection and Response solution, HawkEye G.
Hexis has developed important new capabilities that help customers realize the full benefits of a continuous approach to detection and response. This is critical in light of today's threat environment in which the volume and severity of threats are increasing necessitating a shift from incident response to continuous response. This is also driving a need for organizations to operate with an arsenal of response capabilities, including automated, computer speed response to reduce the risk of compromise and to increase the effectiveness and efficiency of incident response efforts.
"In today's IT security landscape, every second malware is in an enterprise environment could mean immeasurable damage," said Bob Gourley, partner and co-founder, Cognitio Corp. "As attacks continue to escalate in frequency and complexity and as response times continue to be hampered by the speed of human interaction, automation has emerged as the best way to transform how enterprises deal with advanced threats."
New HawkEye G Features Enabling Next Generation Detection & Automated Response
New features will provide significant enhancements to HawkEye G's detection capabilities resulting in more robust Threat Detection and Response capabilities. HawkEye G's detection capabilities are also being expanded to enable insider threat detection. New features include:
Lightweight Host Sensor. HawkEye G's new endpoint sensor improves security by providing extensive endpoint telemetry data and improved system performance. HawkEye G's sensor is lightweight resulting in no significant impacts to system performance. The sensor is transparently deployed and managed by HawkEye G. This delivers improved Endpoint Detection & Response capabilities through more comprehensive collection of information relating to processes, directories, the registry, files, and network connections. Through a combination of big data and proprietary security analytics, HawkEye G continuously monitors endpoint profiles for indications of malicious activity. These new sensing technologies include static and dynamic indicators, expanding the solution's ability to scan executables, DLLs and process threads in real-time.Planned Third Party Integration. HawkEye G will integrate with third party security solutions. The initial focus is on third-party network-based detection solutions, including malware protection systems, next generation firewalls, and intrusion prevention/detection systems. These will feed into HexisThreat-IQ, an advanced threat assessment model that analyzes detection information from disparate sources, thus enabling enhanced, automated response capabilities in conjunction with the third party products.Insider Threat. HawkEye G will be introducing purpose built analytics and functionality to enhance the detection of insider threats. Additional analytics include detection of anomalous login activity as well as abuse of enterprise resources.
"HawkEye G's new significant enhancements provide security professionals threat detection they can trust and machine-guided automation that enables continuous monitoring and response by significantly reducing the time it takes to detect, investigate and respond to advanced threats," said Chris Fedde, President of Hexis Cyber Solutions. "HawkEye G supports a continuous monitoring and response strategy helping organizations significantly improve the productivity and ROI of incident response teams while thwarting adversaries before damage is done."
HawkEye G: Next Generation Endpoint Threat Detection and Response
HawkEye G is Hexis' flagship solution for advanced threat detection and response. HawkEye G provides comprehensive detection and response capabilities across endpoints and the network. Its host sensor, big data platform, and security analytics provide organizations with next generation endpoint detection and response capabilities.
HawkEye G's automated response capabilities represent a critical differentiator compared to other security platforms. HawkEye G enables organizations to embrace automation at a pace and to an extent they are comfortable based on granular policy controls, while relying on machine-guided, semi-automatic removal where desired.
"Having a combination of endpoint and network capabilities is critical given the nature of today's advanced threats where having increased visibility on both the endpoint and the network is critical to detecting and responding to advanced attacks," said Dennis Charlebois, VP, Product Operations. "HawkEye G's combination of endpoint and network detection & response capabilities, the cybersecurity expertise inherited from our sister company KEYW Corporation, and our automated response capabilities represent key differentiators compared to other solutions."
HawkEye G's Capabilities & Vision Aligned with Key Trends Cited by Leading Industry Analysts
In the report "Market Guide for Endpoint Detection and Response Solutions" Gartner analysts Peter Firstbrook and Neil MacDonald indicate that "Effectively dealing with advanced threats that bypass traditional signature-based approaches will require monitoring, detection and response capabilities at endpoints."
In the recent report "Targeted-Attack Hierarchy Of Needs Part 2" Forrester Research analyst Rick Holland's indicates that effective breach detection requires a combination of 1) malware analysis; 2) network analysis and visibility (NAV); 3) endpoint visibility and control (EVC); and 4) security analytics (SA) and that "When evaluating technology, prioritize vendors that offer multiple pillars as well as those that have third-party integrations that make operationalizing the solution effective."
"Our HawkEye G solution is well aligned with these key industry themes including the need for increased visibility on both endpoints and networks in order to detect advanced threats and a need for more robust response capabilities as organizations shift from incident response to continuous response," said Todd Weller, VP of Corporate Development at Hexis.
HawkEye G, featuring many new enhancements, is currently available through Hexis Cyber Solutions' network of channel partners. The complete range of enhancements described in herein is being introduced over the next 90 days. The Hexis' Security Operations Center (HSOC) allows for continuous delivery of new features as they are available.
For a demonstration of HawkEye G, please visit us at Black Hat USA in Las Vegas on Wednesday, August 6th and Thursday, August 7th at booth number 558. Or for your own personalized demo, contact us online to schedule a briefing.
About Hexis Cyber Solutions
Hexis Cyber Solutions, Inc., a wholly-owned subsidiary of The KEYW Holding Corporation (Nasdaq:KEYW), based in Hanover, Maryland, provides complete cybersecurity solutions for commercial companies, government agencies, and the Intelligence Community (IC).
Our mission is to ensure that business IT infrastructure is equipped with tools and capability to detect, engage, and remove both external and internal cyber threats. Cyber terrorists, organized crime, and foreign governments focus tremendous effort on commercial, government, and military interests as their prime target. Hexis Cyber Solutions' HawkEye family of products offer active, multi-disciplined approaches to achieve a higher standard of cybersecurity that is based on our expertise supporting our nation's cybersecurity missions to ensure that your business or organization can operate at its maximum potential. For more information contact Hexis Cyber Solutions, 7740 Milestone Parkway, Suite 400, Hanover, Maryland 21076; Phone 443-733-1900; Fax 443-733-1901; E-mail firstname.lastname@example.org; or on the Web at www.hexiscyber.com.
KEYW provides agile cyber superiority, cybersecurity, and geospatial intelligence solutions for U.S. Government intelligence and defense customers and commercial enterprises. We create our solutions by combining our services and expertise with hardware, software, and proprietary technology to meet our customers' requirements. For more information contact KEYW Corporation, 7740 Milestone Parkway, Suite 400, Hanover, Maryland 21076; Phone 443-733-1600; Fax 443-733-1601; E-mail email@example.com; or on the Web at www.keywcorp.com.
Forward-Looking Statements: Statements made in this press release that are not historical facts constitute forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. Such statements include but are not limited to statements about our future expectations, plans and prospects, and other statements containing the words "estimates," "believes," "anticipates," "plans," "expects," "will," "potential," "opportunities", and similar expressions. Our actual results, performance or achievements or industry results may differ materially from those expressed or implied in these forward-looking statements. These statements involve numerous risks and uncertainties, including but not limited to those risk factors set forth in our Annual Report on Form 10-K, dated and filed March 10, 2014 with the Securities and Exchange Commission (SEC) as required under the Securities Act of 1934, and other filings that we make with the SEC from time to time. Due to such uncertainties and risks, readers are cautioned not to place undue reliance on such forward-looking statements. KEYW is under no obligation to (and expressly disclaims any such obligation to) update or alter its forward-looking statements whether as a result of new information, future events or otherwise.
CONTACT: For Media Inquiries:
Nina Korfias - MSLGROUP
For Investor Relations:
Chris Donaghey - Hexis
Source: KEYW Corp.
2014 GlobeNewswire, Inc.
[ Back To Telecom Signaling's Homepage ]