Analytics
10/8/2013
08:58 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Hexis Cyber Solutions Launches Intelligent Active Defense Solution

HawkEye G detects attacks, and then applying automated countermeasures to remove them

HANOVER, Md., October 8, 2013 -- Hexis Cyber Solutions (Hexis), a subsidiary of KEYW Corporation (NASDAQ: KEYW), today unveiled HawkEye G, the industry's first truly active defense solution to detect stealthy advanced cyber threats and take automatic action to remove the threats from the network. By delivering fast detection of advanced attacks -- from botnets and malware to advanced persistent threats (APTs) – and then applying automated countermeasures to remove these cyber threats, HawkEye G protects today's networks at digital speeds.

Drawing on experience from supporting the U.S. Government as well as state of the art big data capabilities, Hexis designed HawkEye G to directly combat the tools, techniques, and procedures of the most advanced attackers. This breakthrough technology takes the guesswork out of active defense by detecting, diagnosing and removing cyber threats within the network before they can compromise intellectual property or disrupt the business. HawkEye G sets itself apart from other defense tools by combining intelligence and defense capabilities with a continuous capability delivery service that enables the HawkEye G system to evolve as quickly as the threat environment evolves.

"By leveraging KEYW's legacy, Hexis Cyber Solutions is changing the way customers address their protection efforts," said Len Moodispaw, Chairman and CEO of KEYW Corporation. "With the best possible detection techniques and unmatched automated countermeasures, we are empowering our customers to thwart their adversaries."

HawkEye G's unique collection, detection and defense capabilities empower users to detect, engage and remove threats:

Detect: Leveraging an embedded high performance event data warehouse and the most advanced analytics to date, HawkEye G detects in seconds and minutes what used to be virtually invisible.

Engage: HawkEye G gathers diagnostic intelligence to confirm malware's presence, and determine the removal strategy.

Remove: HawkEye G eradicates threats in near real time, launching a spectrum of cyber countermeasures to mitigate the threat.

"Network owners today do everything possible to defend their perimeter – and they should – but still the threat gets in," stated Chris Fedde, the President of Hexis. "HawkEye G was purpose-built to find and remove that threat before it compromises the network. In addition, the analytics that are applied to the spectrum of network behavior means that high quality security awareness is constantly available to the network operator."

In addition to HawkEye G, the HawkEye family of products encompasses HawkEye AP, the Analytics Platform, for applications including suspicious behavior detection, log management, call detail record/internet protocol data record management, and risk and compliance applications.

For more information, please visit Hexis Cyber Solutions at www.hexiscyber.com where data sheets and white papers describing our solutions can be downloaded.

About Hexis Cyber Solutions

Hexis Cyber Solutions, Inc., a subsidiary of The KEYW Corporation (Nasdaq:KEYW) based in Hanover, Maryland, provides complete cybersecurity solutions for commercial companies, government agencies, and the Intelligence Community (IC).

Our mission is to ensure that business IT infrastructure is equipped with tools and capability to detect, engage, and remove both external and internal cyber threats. Cyber terrorists, organized crime, and foreign governments focus tremendous effort on commercial, government, and military interests as their prime target. Hexis Cyber Solutions' HawkEye family of products offer active, multi-disciplined approaches to achieve a higher standard of cybersecurity that is based on our expertise supporting our nation's cybersecurity missions to ensure that your business or organization can operate at its maximum potential. For more information contact Hexis Cyber Solutions, 7740 Milestone Parkway, Suite 400, Hanover, Maryland 21076; Phone 443-733-1900; Fax 443-733-1901; E-mail info@hexiscyber.com; or on the Web at www.hexiscyber.com.

About KEYW

KEYW provides agile cyber superiority, cybersecurity, and geospatial intelligence solutions for U.S. Government intelligence and defense customers and commercial enterprises. We create our solutions by combining our services and expertise with hardware, software, and proprietary technology to meet our customers' requirements. For more information contact KEYW Corporation, 7740 Milestone Parkway, Suite 400, Hanover, Maryland 21076; Phone 443-733-1600; Fax 443-733-1601; E-mailinvestors@keywcorp.com; or on the Web at www.keywcorp.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-5427
Published: 2015-03-29
Johnson Controls Metasys 4.1 through 6.5, as used in Application and Data Server (ADS), Extended Application and Data Server (aka ADX), LonWorks Control Server 85 LCS8520, Network Automation Engine (NAE) 55xx-x, Network Integration Engine (NIE) 5xxx-x, and NxE8500, allows remote attackers to read pa...

CVE-2014-5428
Published: 2015-03-29
Unrestricted file upload vulnerability in unspecified web services in Johnson Controls Metasys 4.1 through 6.5, as used in Application and Data Server (ADS), Extended Application and Data Server (aka ADX), LonWorks Control Server 85 LCS8520, Network Automation Engine (NAE) 55xx-x, Network Integratio...

CVE-2014-9205
Published: 2015-03-29
Stack-based buffer overflow in the PmBase64Decode function in an unspecified demonstration application in MICROSYS PROMOTIC stable before 8.2.19 and PROMOTIC development before 8.3.2 allows remote attackers to execute arbitrary code by providing a large amount of data.

CVE-2015-0528
Published: 2015-03-29
The RPC daemon in EMC Isilon OneFS 6.5.x and 7.0.x before 7.0.2.13, 7.1.0 before 7.1.0.6, 7.1.1 before 7.1.1.2, and 7.2.0 before 7.2.0.1 allows local users to gain privileges by leveraging an ability to modify system files.

CVE-2015-0996
Published: 2015-03-29
Schneider Electric InduSoft Web Studio before 7.1.3.4 SP3 Patch 4 and InTouch Machine Edition 2014 before 7.1.3.4 SP3 Patch 4 rely on a hardcoded cleartext password to control read access to Project files and Project Configuration files, which makes it easier for local users to obtain sensitive info...

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.