KeyW is now part of Jacobs. Learn more about this exciting combination.

Hexis Cyber Solutions Enhances HawkEye G Integrated Detection and Automated Response Capabilities

HANOVER. Md., March 01, 2016 (GLOBE NEWSWIRE) — Hexis Cyber Solutions Inc. (Hexis), a wholly-owned subsidiary of The KEYW Holding Corporation (NASDAQ:KEYW), and a provider of advanced cybersecurity solutions for commercial companies and government agencies, is committed to the continuous innovation and development of its flagship next-generation endpoint security solution, HawkEye G. With a continued focus on enhancing its integrated malware and threat actor detection modules, enterprise platform support, and ecosystem partners, Hexis is pleased to announce current and forthcoming product enhancements to its HawkEye G solution.

Significant HawkEye G Release 4 Enhancements Demonstrate Continued Innovation

Hexis continues to focus on product innovation and the forthcoming HawkEye G release 4 will include several, significant enhancements.

Expanded network sandboxing integration.  

HawkEye G Release 4 will include native, network sandboxing capabilities powered by Lastline, the only Full System Emulation (FUSE™) malware analysis platform.   Lastline was recognized by NSS Labs as a leader in Breach Detection in its 2015 Breach Detection System Comparative Evaluation.  This technology integration will add multi-protocol content extraction and network sandbox malware analysis to the HawkEye G product line without requiring additional appliances.  Network content will be extracted, verified, and submitted from the HawkEye G Network Sensor appliances to Lastline’s malware analysis sandbox for detonation, analysis, and scoring for false positive reduction or response actions based on real-time endpoint event data. Organizations can choose to leverage Lastline’s cloud-based or on-premise offerings for the analysis of Windows PE files, Microsoft Office documents, and PDF files extracted from HTTP and SMTP protocols on a single appliance. 

Expanding Platform Coverage to Mac OS. 

Hexis’ platform support includes Windows workstation and server, Red Hat Linux, and with Release 4 of HawkEye G, expands coverage to Mac OS X. “We continue to expand our platform support offerings to meet our customers’ growing needs for security on their end-user computing platforms. With the addition of Mac OS X support, we’ve set a high bar enabling organizations to improve their endpoint security posture across multiple operating systems, delivering multiple advanced malware detection engines, an expanding third-party ecosystem, and automated response capabilities from a single technology vendor,” explains Chris Carlson, Hexis VP of Product Management.

YARA Rules Support. 

HawkEye G Release 4 adds support for customer-defined YARA rules via a YARA engine embedded in the HawkEye G Host Sensor.  This will enable multiple new capabilities including custom threat scoring in detection mode, automated quarantine file in response mode, and a new endpoint prevention module that performs process pre-execution suspension, inspection, and termination before malware begins to execute.  The prevention module runs locally on the endpoint in either online or offline modes without requiring connection to the HawkEye G Manager or cloud services to function.

 “The team has worked tirelessly to develop these product enhancements for the HawkEye G Release 4. We are confident that these additions to the product will empower our enterprise and government customers to better prevent, detect, and respond to ever-changing malicious attacks,” says Chris Fedde, President, Hexis Cyber Solutions.

Hexis HawkEye G App for Splunk™

Built from the ground up with integration in mind, Hexis strives to continuously expand and improve our technology integrations and partnerships with the goal of increasing the value of our solution and enhancing ROI for customers. 

With this in mind, we are pleased to announce the release of Hexis HawkEye G App for Splunk, which is now available for download on the Splunk marketplace.  The HawkEye G App for Splunk presents a real-time situational overview of the HawkEye G deployment, including dashboards, reports, search and alerting on endpoint and network threat activity, threat scoring, automated and machine-guided remediation activity, and system health and status.

If you’re attending RSA 2016, we encourage you to stop by the Hexis Cyber Solutions booth #1529 to learn more about the next-generation of endpoint security.

About Hexis Cyber Solutions
Hexis Cyber Solutions, Inc. is a team of cybersecurity experts delivering solutions that enable organizations to defend against and remove cyber threats at machine speeds before they do damage. Hexis’ advanced security solutions use real-time endpoint sensors, network detection, and threat analytics to provide organizations with an intelligent and automated threat detection and response solution. Hexis’ solutions deliver improved visibility into the network and endpoints, threat verification, and automated response capabilities for organizations of all sizes.
Follow Hexis on Twitter: @hexis_cyber and LinkedIn.

About KeyW
KeyW is an innovative national security solutions provider to the Intelligence, Cyber, and Counterterrorism communities. KeyW’s advanced technologies in cyber; intelligence, surveillance and reconnaissance; and analytics span the full spectrum of customer missions and enhanced capabilities. The company’s highly skilled workforce solves complex customer challenges such as preventing cyber threats, transforming data to actionable intelligence, and building and deploying sensor packages into any domain. For more information, please visit www.KeyWCorp.com and follow KeyW on Twitter @KeyWCorp.


Forward-Looking Statements: Statements made in this press release that are not historical facts constitute forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. Such statements include, but are not limited to, statements containing the words “estimates,” “believes,” “anticipates,” “plans,” “expects,” ‘will,” “potential,” “opportunities,” and similar expressions. Our actual results, performance or achievements or industry results may differ materially from those expressed or implied in these forward-looking statements, including, but not limited to, express or implied statements concerning: our expectations regarding our future financial performance, including the potential impact of successful contract awards; our bid and proposal pipeline; our ability to achieve projected growth in certain of our business units and the expected timing of such growth; demand for our products, services and solutions serving the intelligence, cyber and counterterrorism communities; and performance of key contracts, including the timing of production related to certain of our contracts and product offerings. Factors that may cause our results to differ, potentially materially, from those expressed or implied in our forward-looking statements include, but are not limited to: risks to our business and financial results related to reductions and other spending constraints imposed on the U.S. Government, including as a result the Federal budget deficit and Federal government shut-downs; risks of adverse regulatory action or litigation; risks that changes, cutbacks or delays in spending by Intelligence Community (IC) customers, including the National Security Agency (NSA), the National Geospatial-Intelligence Agency (NGA), and other agencies within the IC, the Federal Bureau of Investigation, and the Department of Defense (DoD) may occur, which could cause delays or cancellations of key government contracts; risks of delays to or the cancellation of our projects as a result of protest actions submitted by our competitors; risks that changes may occur in Federal government (or other applicable) procurement laws, regulations, policies and budgets; risks related to changes in government and customer priorities and requirements (including cost-cutting initiatives, the potential deferral of awards, terminations or reduction of expenditures to respond to the priorities of Congress and the Administration; and those risk factors set forth in our Annual Report on Form 10-K, dated and filed March 16, 2018 with the Securities and Exchange Commission (SEC), and other filings that we make with the SEC from time to time. Due to such uncertainties and risks, investors are cautioned not to place undue reliance on such forward-looking statements. We are under no obligation to (and expressly disclaims any such obligation to) update or alter our forward-looking statements whether as a result of new information, future events or otherwise.

Media Contact:
Karen Coker
Director, Corporate Communications
443.733.1613
communications@keywcorp.com

Investor Contact:
Mark Zindler
Vice President, Investor Relations and Treasury
703.880.9379
investors@keywcorp.com