HANOVER, Md., April 20, 2015 (GLOBE NEWSWIRE) -- Hexis Cyber Solutions, Inc. (Hexis), a wholly-owned subsidiary of The KEYW Holding Corporation (Nasdaq:KEYW), and a provider of advanced cybersecurity solutions for commercial companies and government agencies, today announced a significant new release of its integrated cybersecurity platform, HawkEye G. New capabilities include ThreatSync™ for evidence-based detection and validation of unknown and known threats, and integration with third-party security technologies such as Palo Alto Networks and FireEye for detection and Splunk for increased threat intelligence.
New Capabilities Provide Accurate Policy-Based Automated Threat Removal
Point security solutions and manual remediation processes cannot adequately address today's increasingly complex cyber threats. Point solutions lack the features, depth and speed needed to stop the external threat actors as they penetrate the perimeter, install malware, establish persistence and move laterally to reach the target. Furthermore, these point solutions generate large quantities of alerts and false positives, leaving it to the inundated incident responders and security teams to find serious threats hidden in all the alerts – making today's networks more vulnerable than ever.
"Most industry benchmarks have concluded that the time between exploitation and discovery of malicious activity is measured in weeks, if not months," said Jon Oltsik, senior principal analyst, Enterprise Strategy Group. "Reducing the time required for detection and removal of cyber threats is the priority for security professionals today. Protecting business critical data, coupled with the overwhelming advanced skills shortage, has created the need for a unified solution that can detect, verify and remove threats at machine speed."
In a recent report1 Forrester analysts John Kindervag and Stephanie Balaouras concur stating, "Given the consequences of data breaches, businesses can no longer rely on passive, manual procedures to defend against them. The only way to protect the exfiltration of our data by hackers and cybercriminals is to provide our security teams with a set of rules that will incentivize automated response."
Working in conjunction with HawkEye G's policy-based, automated threat removal engine, ThreatSync™ will lower the time between perimeter breach, detection and threat verification, thus empowering security teams to quickly and confidently defend themselves using machine speed removal of sophisticated adversaries.
New Analytics and Third Party Integrations Add More Context Improving Organizations' Ability to Detect and Remove Threats
Leveraging threat fusion and analytics capabilities from ThreatSync™, and threat intelligence from third-party security solution providers, HawkEye G 3.0 operates as an evidence-based threat removal platform that combats attacks at machine speed. This also enables the security operations teams to more effectively leverage existing security investments as HawkEye G removes the alerts and alarms generated by the third party security products.
Gartner2 analyst Lawrence Pingree highlights the importance of "Bringing together system events, network activities and indicators of compromise mapped across a graphical kill-chain timeline and comprehensive analytics capabilities are essential to operationalize and simplify EDR [endpoint detection and response] for security operations personnel."
HawkEye G 3.0 not only provides its own host-based and network-based detection capabilities, but also integrates with enterprises' existing security infrastructure by consuming, fusing and verifying third-party alerts. The new ThreatSync™ Unified Threat Scoring Model measures threat alerts based on how successfully the adversary is meeting its objectives. If the threat is confirmed to be engaged in malicious activity, the threat score is raised and incident responders can execute automated countermeasures or receive an alert that will allow them to follow machine-guided actions to remove the threat. HawkEye G also integrates transparently into security systems, applications, and processes already in place at organizations, sending threat alerts and response actions to third-party reporting, dashboard and event management systems including Splunk, SIEMs and HawkEye AP.
"The staggering amount of false positives and ghost alerts generated by perimeter-based security devices has left security teams searching for a way to cut through the overwhelming noise," said Chris Carlson, senior director of Product Management, Hexis Cyber Solutions. "With HawkEye G's new ability to corroborate actual endpoint behavior captured on the platform's host detection sensors with third-party data, our continuous monitoring capabilities will help capture, analyze, and remove malicious activity before compromise in the enterprise. This is truly a second generation product, and the customer responses from our initial installations have been extremely positive."
HawkEye G 3.0 will be available April 30 through Hexis Cyber Solutions' network of channel partners.
For a demonstration of HawkEye G 3.0, visit us at RSA 2015 in San Francisco, on Monday, April 20 through Thursday, April 23 at booth number S1007, located in the South Hall. Or for your own personalized demo, contact us online to schedule a briefing.
1 "Rules Of Engagement: A Call To Action To Automate Breach Response," Forrester, December 2, 2014, John Kindervag, Stephanie Balaouras with Glenn O'Donnell, Heidi Shey, Claire O'Malley
2 "Competitive Landscape: Endpoint Detection and Response Tools, 2014," Gartner, November 26, 2014, Lawrence Pingree
About Hexis Cyber Solutions
Hexis Cyber Solutions, Inc. is a team of cybersecurity experts delivering solutions that enable organizations to defend against and remove cyber threats at machine speeds before they do damage. Hexis' advanced security solutions use real-time endpoint sensors, network detection, and threat analytics to provide organizations with an intelligent and automated threat detection and response solution. Hexis' solutions deliver improved visibility into the network and endpoints, threat verification, and automated threat removal capabilities for organizations of all sizes.
Hexis Cyber Solutions, Inc. is a wholly-owned subsidiary of The KEYW Holding Corporation (KEYW), based in Hanover, Maryland with engineering offices in Columbia, Maryland and San Mateo, California. Hexis' solutions were developed leveraging KEYW's expertise in supporting our nation's cybersecurity missions. For more information contact Hexis Cyber Solutions, 7740 Milestone Parkway, Suite 400, Hanover, Maryland 21076; Phone 443-733-1900; Fax 443-733-1901; E-mail email@example.com; or on the Web at www.hexiscyber.com.
Follow Hexis on Twitter: @hexis_cyber
KEYW provides agile cyber superiority, cybersecurity, and geospatial intelligence solutions for U.S. Government intelligence and defense customers and commercial enterprises. We create our solutions by combining our services and expertise with hardware, software, and proprietary technology to meet our customers' requirements. For more information contact KEYW Corporation, 7740 Milestone Parkway, Suite 400, Hanover, Maryland 21076; Phone 443-733-1600; Fax 443-733-1601; E-mail firstname.lastname@example.org; or on the Web at www.keywcorp.com.