Analytics
10/8/2013
08:58 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Hexis Cyber Solutions Launches Intelligent Active Defense Solution

HawkEye G detects attacks, and then applying automated countermeasures to remove them

HANOVER, Md., October 8, 2013 -- Hexis Cyber Solutions (Hexis), a subsidiary of KEYW Corporation (NASDAQ: KEYW), today unveiled HawkEye G, the industry's first truly active defense solution to detect stealthy advanced cyber threats and take automatic action to remove the threats from the network. By delivering fast detection of advanced attacks -- from botnets and malware to advanced persistent threats (APTs) – and then applying automated countermeasures to remove these cyber threats, HawkEye G protects today's networks at digital speeds.

Drawing on experience from supporting the U.S. Government as well as state of the art big data capabilities, Hexis designed HawkEye G to directly combat the tools, techniques, and procedures of the most advanced attackers. This breakthrough technology takes the guesswork out of active defense by detecting, diagnosing and removing cyber threats within the network before they can compromise intellectual property or disrupt the business. HawkEye G sets itself apart from other defense tools by combining intelligence and defense capabilities with a continuous capability delivery service that enables the HawkEye G system to evolve as quickly as the threat environment evolves.

"By leveraging KEYW's legacy, Hexis Cyber Solutions is changing the way customers address their protection efforts," said Len Moodispaw, Chairman and CEO of KEYW Corporation. "With the best possible detection techniques and unmatched automated countermeasures, we are empowering our customers to thwart their adversaries."

HawkEye G's unique collection, detection and defense capabilities empower users to detect, engage and remove threats:

Detect: Leveraging an embedded high performance event data warehouse and the most advanced analytics to date, HawkEye G detects in seconds and minutes what used to be virtually invisible.

Engage: HawkEye G gathers diagnostic intelligence to confirm malware's presence, and determine the removal strategy.

Remove: HawkEye G eradicates threats in near real time, launching a spectrum of cyber countermeasures to mitigate the threat.

"Network owners today do everything possible to defend their perimeter – and they should – but still the threat gets in," stated Chris Fedde, the President of Hexis. "HawkEye G was purpose-built to find and remove that threat before it compromises the network. In addition, the analytics that are applied to the spectrum of network behavior means that high quality security awareness is constantly available to the network operator."

In addition to HawkEye G, the HawkEye family of products encompasses HawkEye AP, the Analytics Platform, for applications including suspicious behavior detection, log management, call detail record/internet protocol data record management, and risk and compliance applications.

For more information, please visit Hexis Cyber Solutions at www.hexiscyber.com where data sheets and white papers describing our solutions can be downloaded.

About Hexis Cyber Solutions

Hexis Cyber Solutions, Inc., a subsidiary of The KEYW Corporation (Nasdaq:KEYW) based in Hanover, Maryland, provides complete cybersecurity solutions for commercial companies, government agencies, and the Intelligence Community (IC).

Our mission is to ensure that business IT infrastructure is equipped with tools and capability to detect, engage, and remove both external and internal cyber threats. Cyber terrorists, organized crime, and foreign governments focus tremendous effort on commercial, government, and military interests as their prime target. Hexis Cyber Solutions' HawkEye family of products offer active, multi-disciplined approaches to achieve a higher standard of cybersecurity that is based on our expertise supporting our nation's cybersecurity missions to ensure that your business or organization can operate at its maximum potential. For more information contact Hexis Cyber Solutions, 7740 Milestone Parkway, Suite 400, Hanover, Maryland 21076; Phone 443-733-1900; Fax 443-733-1901; E-mail info@hexiscyber.com; or on the Web at www.hexiscyber.com.

About KEYW

KEYW provides agile cyber superiority, cybersecurity, and geospatial intelligence solutions for U.S. Government intelligence and defense customers and commercial enterprises. We create our solutions by combining our services and expertise with hardware, software, and proprietary technology to meet our customers' requirements. For more information contact KEYW Corporation, 7740 Milestone Parkway, Suite 400, Hanover, Maryland 21076; Phone 443-733-1600; Fax 443-733-1601; E-mailinvestors@keywcorp.com; or on the Web at www.keywcorp.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8142
Published: 2014-12-20
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys w...

CVE-2013-4440
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.

CVE-2013-4442
Published: 2014-12-19
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.

CVE-2013-7401
Published: 2014-12-19
The parse_request function in request.c in c-icap 0.2.x allows remote attackers to cause a denial of service (crash) via a URI without a " " or "?" character in an ICAP request, as demonstrated by use of the OPTIONS method.

CVE-2014-2026
Published: 2014-12-19
Cross-site scripting (XSS) vulnerability in the search functionality in United Planet Intrexx Professional before 5.2 Online Update 0905 and 6.x before 6.0 Online Update 10 allows remote attackers to inject arbitrary web script or HTML via the request parameter.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.