Analytics
10/8/2013
08:58 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Hexis Cyber Solutions Launches Intelligent Active Defense Solution

HawkEye G detects attacks, and then applying automated countermeasures to remove them

HANOVER, Md., October 8, 2013 -- Hexis Cyber Solutions (Hexis), a subsidiary of KEYW Corporation (NASDAQ: KEYW), today unveiled HawkEye G, the industry's first truly active defense solution to detect stealthy advanced cyber threats and take automatic action to remove the threats from the network. By delivering fast detection of advanced attacks -- from botnets and malware to advanced persistent threats (APTs) – and then applying automated countermeasures to remove these cyber threats, HawkEye G protects today's networks at digital speeds.

Drawing on experience from supporting the U.S. Government as well as state of the art big data capabilities, Hexis designed HawkEye G to directly combat the tools, techniques, and procedures of the most advanced attackers. This breakthrough technology takes the guesswork out of active defense by detecting, diagnosing and removing cyber threats within the network before they can compromise intellectual property or disrupt the business. HawkEye G sets itself apart from other defense tools by combining intelligence and defense capabilities with a continuous capability delivery service that enables the HawkEye G system to evolve as quickly as the threat environment evolves.

"By leveraging KEYW's legacy, Hexis Cyber Solutions is changing the way customers address their protection efforts," said Len Moodispaw, Chairman and CEO of KEYW Corporation. "With the best possible detection techniques and unmatched automated countermeasures, we are empowering our customers to thwart their adversaries."

HawkEye G's unique collection, detection and defense capabilities empower users to detect, engage and remove threats:

Detect: Leveraging an embedded high performance event data warehouse and the most advanced analytics to date, HawkEye G detects in seconds and minutes what used to be virtually invisible.

Engage: HawkEye G gathers diagnostic intelligence to confirm malware's presence, and determine the removal strategy.

Remove: HawkEye G eradicates threats in near real time, launching a spectrum of cyber countermeasures to mitigate the threat.

"Network owners today do everything possible to defend their perimeter – and they should – but still the threat gets in," stated Chris Fedde, the President of Hexis. "HawkEye G was purpose-built to find and remove that threat before it compromises the network. In addition, the analytics that are applied to the spectrum of network behavior means that high quality security awareness is constantly available to the network operator."

In addition to HawkEye G, the HawkEye family of products encompasses HawkEye AP, the Analytics Platform, for applications including suspicious behavior detection, log management, call detail record/internet protocol data record management, and risk and compliance applications.

For more information, please visit Hexis Cyber Solutions at www.hexiscyber.com where data sheets and white papers describing our solutions can be downloaded.

About Hexis Cyber Solutions

Hexis Cyber Solutions, Inc., a subsidiary of The KEYW Corporation (Nasdaq:KEYW) based in Hanover, Maryland, provides complete cybersecurity solutions for commercial companies, government agencies, and the Intelligence Community (IC).

Our mission is to ensure that business IT infrastructure is equipped with tools and capability to detect, engage, and remove both external and internal cyber threats. Cyber terrorists, organized crime, and foreign governments focus tremendous effort on commercial, government, and military interests as their prime target. Hexis Cyber Solutions' HawkEye family of products offer active, multi-disciplined approaches to achieve a higher standard of cybersecurity that is based on our expertise supporting our nation's cybersecurity missions to ensure that your business or organization can operate at its maximum potential. For more information contact Hexis Cyber Solutions, 7740 Milestone Parkway, Suite 400, Hanover, Maryland 21076; Phone 443-733-1900; Fax 443-733-1901; E-mail info@hexiscyber.com; or on the Web at www.hexiscyber.com.

About KEYW

KEYW provides agile cyber superiority, cybersecurity, and geospatial intelligence solutions for U.S. Government intelligence and defense customers and commercial enterprises. We create our solutions by combining our services and expertise with hardware, software, and proprietary technology to meet our customers' requirements. For more information contact KEYW Corporation, 7740 Milestone Parkway, Suite 400, Hanover, Maryland 21076; Phone 443-733-1600; Fax 443-733-1601; E-mailinvestors@keywcorp.com; or on the Web at www.keywcorp.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-4403
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in Zen Cart 1.3.9h allow remote attackers to hijack the authentication of administrators for requests that (1) delete a product via a delete_product_confirm action to product.php or (2) disable a product via a setflag action to categories.ph...

CVE-2012-2930
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to hijack the authentication of administrators for requests that (1) add a user via an adduser action to admin/index.php or (2) conduct static PHP code injection attacks in .htusers...

CVE-2012-2932
Published: 2015-04-24
Multiple cross-site scripting (XSS) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to inject arbitrary web script or HTML via the (1) selitems[] parameter in a copy, (2) chmod, or (3) arch action to admin/index.php or (4) searchitem parameter in a search action to admin/...

CVE-2012-5451
Published: 2015-04-24
Multiple stack-based buffer overflows in HttpUtils.dll in TVMOBiLi before 2.1.0.3974 allow remote attackers to cause a denial of service (tvMobiliService service crash) via a long string in a (1) GET or (2) HEAD request to TCP port 30888.

CVE-2015-0297
Published: 2015-04-24
Red Hat JBoss Operations Network 3.3.1 does not properly restrict access to certain APIs, which allows remote attackers to execute arbitrary Java methos via the (1) ServerInvokerServlet or (2) SchedulerService or (3) cause a denial of service (disk consumption) via the ContentManager.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.