HANOVER, Md., Aug. 6, 2014 (GLOBE NEWSWIRE) — Hexis Cyber Solutions (Hexis), a wholly-owned subsidiary of The KEYW Holding Corporation (Nasdaq:KEYW), and a provider of advanced cybersecurity solutions for commercial companies and government agencies, today announced significant enhancements to its next generation Threat Detection and Response solution, HawkEye G.
Hexis has developed important new capabilities that help customers realize the full benefits of a continuous approach to detection and response. This is critical in light of today’s threat environment in which the volume and severity of threats are increasing necessitating a shift from incident response to continuous response. This is also driving a need for organizations to operate with an arsenal of response capabilities, including automated, computer speed response to reduce the risk of compromise and to increase the effectiveness and efficiency of incident response efforts.
“In today’s IT security landscape, every second malware is in an enterprise environment could mean immeasurable damage,” said Bob Gourley, partner and co-founder, Cognitio Corp. “As attacks continue to escalate in frequency and complexity and as response times continue to be hampered by the speed of human interaction, automation has emerged as the best way to transform how enterprises deal with advanced threats.”
New HawkEye G Features Enabling Next Generation Detection & Automated Response
New features will provide significant enhancements to HawkEye G’s detection capabilities resulting in more robust Threat Detection and Response capabilities. HawkEye G’s detection capabilities are also being expanded to enable insider threat detection. New features include:
- Lightweight Host Sensor. HawkEye G’s new endpoint sensor improves security by providing extensive endpoint telemetry data and improved system performance. HawkEye G’s sensor is lightweight resulting in no significant impacts to system performance. The sensor is transparently deployed and managed by HawkEye G. This delivers improved Endpoint Detection & Response capabilities through more comprehensive collection of information relating to processes, directories, the registry, files, and network connections. Through a combination of big data and proprietary security analytics, HawkEye G continuously monitors endpoint profiles for indications of malicious activity. These new sensing technologies include static and dynamic indicators, expanding the solution’s ability to scan executables, DLLs and process threads in real-time.
- Planned Third Party Integration. HawkEye G will integrate with third party security solutions. The initial focus is on third-party network-based detection solutions, including malware protection systems, next generation firewalls, and intrusion prevention/detection systems. These will feed into HexisThreat-IQ, an advanced threat assessment model that analyzes detection information from disparate sources, thus enabling enhanced, automated response capabilities in conjunction with the third party products.
- Insider Threat. HawkEye G will be introducing purpose built analytics and functionality to enhance the detection of insider threats. Additional analytics include detection of anomalous login activity as well as abuse of enterprise resources.
“HawkEye G’s new significant enhancements provide security professionals threat detection they can trust and machine-guided automation that enables continuous monitoring and response by significantly reducing the time it takes to detect, investigate and respond to advanced threats,” said Chris Fedde, President of Hexis Cyber Solutions. “HawkEye G supports a continuous monitoring and response strategy helping organizations significantly improve the productivity and ROI of incident response teams while thwarting adversaries before damage is done.”
HawkEye G: Next Generation Endpoint Threat Detection and Response
HawkEye G is Hexis’ flagship solution for advanced threat detection and response. HawkEye G provides comprehensive detection and response capabilities across endpoints and the network. Its host sensor, big data platform, and security analytics provide organizations with next generation endpoint detection and response capabilities.
HawkEye G’s automated response capabilities represent a critical differentiator compared to other security platforms. HawkEye G enables organizations to embrace automation at a pace and to an extent they are comfortable based on granular policy controls, while relying on machine-guided, semi-automatic removal where desired.
“Having a combination of endpoint and network capabilities is critical given the nature of today’s advanced threats where having increased visibility on both the endpoint and the network is critical to detecting and responding to advanced attacks,” said Dennis Charlebois, VP, Product Operations. “HawkEye G’s combination of endpoint and network detection & response capabilities, the cybersecurity expertise inherited from our sister company KEYW Corporation, and our automated response capabilities represent key differentiators compared to other solutions.”
HawkEye G’s Capabilities & Vision Aligned with Key Trends Cited by Leading Industry Analysts
In the report “Market Guide for Endpoint Detection and Response Solutions” Gartner analysts Peter Firstbrook and Neil MacDonald indicate that “Effectively dealing with advanced threats that bypass traditional signature-based approaches will require monitoring, detection and response capabilities at endpoints.”
In the recent report “Targeted-Attack Hierarchy Of Needs Part 2” Forrester Research analyst Rick Holland’s indicates that effective breach detection requires a combination of 1) malware analysis; 2) network analysis and visibility (NAV); 3) endpoint visibility and control (EVC); and 4) security analytics (SA) and that “When evaluating technology, prioritize vendors that offer multiple pillars as well as those that have third-party integrations that make operationalizing the solution effective.”
“Our HawkEye G solution is well aligned with these key industry themes including the need for increased visibility on both endpoints and networks in order to detect advanced threats and a need for more robust response capabilities as organizations shift from incident response to continuous response,” said Todd Weller, VP of Corporate Development at Hexis.
HawkEye G, featuring many new enhancements, is currently available through Hexis Cyber Solutions’ network of channel partners. The complete range of enhancements described in herein is being introduced over the next 90 days. The Hexis’ Security Operations Center (HSOC) allows for continuous delivery of new features as they are available.
For a demonstration of HawkEye G, please visit us at Black Hat USA in Las Vegas on Wednesday, August 6thand Thursday, August 7th at booth number 558. Or for your own personalized demo, contact us online to schedule a briefing.
About Hexis Cyber Solutions
Hexis Cyber Solutions, Inc., a wholly-owned subsidiary of The KEYW Holding Corporation (Nasdaq:KEYW), based in Hanover, Maryland, provides complete cybersecurity solutions for commercial companies, government agencies, and the Intelligence Community (IC).
Our mission is to ensure that business IT infrastructure is equipped with tools and capability to detect, engage, and remove both external and internal cyber threats. Cyber terrorists, organized crime, and foreign governments focus tremendous effort on commercial, government, and military interests as their prime target. Hexis Cyber Solutions’ HawkEye family of products offer active, multi-disciplined approaches to achieve a higher standard of cybersecurity that is based on our expertise supporting our nation’s cybersecurity missions to ensure that your business or organization can operate at its maximum potential. For more information contact Hexis Cyber Solutions, 7740 Milestone Parkway, Suite 400, Hanover, Maryland 21076; Phone 443-733-1900; Fax 443-733-1901; E-mail firstname.lastname@example.org; or on the Web at www.hexiscyber.com.
Forward-Looking Statements: Statements made in this press release that are not historical facts constitute forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. Such statements include, but are not limited to, statements containing the words “estimates,” “believes,” “anticipates,” “plans,” “expects,” ‘will,” “potential,” “opportunities,” and similar expressions. Our actual results, performance or achievements or industry results may differ materially from those expressed or implied in these forward-looking statements, including, but not limited to, express or implied statements concerning: our expectations regarding our future financial performance, including the potential impact of successful contract awards; our bid and proposal pipeline; our ability to achieve projected growth in certain of our business units and the expected timing of such growth; demand for our products, services and solutions serving the intelligence, cyber and counterterrorism communities; and performance of key contracts, including the timing of production related to certain of our contracts and product offerings. Factors that may cause our results to differ, potentially materially, from those expressed or implied in our forward-looking statements include, but are not limited to: risks to our business and financial results related to reductions and other spending constraints imposed on the U.S. Government, including as a result the Federal budget deficit and Federal government shut-downs; risks of adverse regulatory action or litigation; risks that changes, cutbacks or delays in spending by Intelligence Community (IC) customers, including the National Security Agency (NSA), the National Geospatial-Intelligence Agency (NGA), and other agencies within the IC, the Federal Bureau of Investigation, and the Department of Defense (DoD) may occur, which could cause delays or cancellations of key government contracts; risks of delays to or the cancellation of our projects as a result of protest actions submitted by our competitors; risks that changes may occur in Federal government (or other applicable) procurement laws, regulations, policies and budgets; risks related to changes in government and customer priorities and requirements (including cost-cutting initiatives, the potential deferral of awards, terminations or reduction of expenditures to respond to the priorities of Congress and the Administration; and those risk factors set forth in our Annual Report on Form 10-K, dated and filed March 16, 2018 with the Securities and Exchange Commission (SEC), and other filings that we make with the SEC from time to time. Due to such uncertainties and risks, investors are cautioned not to place undue reliance on such forward-looking statements. We are under no obligation to (and expressly disclaims any such obligation to) update or alter our forward-looking statements whether as a result of new information, future events or otherwise.
Director, Corporate Communications
Vice President, Investor Relations and Treasury