Improved Threat Detection & Response Capabilities Enables Organizations to
Evolve to Continuous Monitoring & Automated Response Delivering Increased
Security & ROI
HANOVER, Md., Aug. 6, 2014 (GLOBE NEWSWIRE) -- Hexis Cyber Solutions (Hexis), a
wholly-owned subsidiary of The KEYW Holding Corporation (Nasdaq:KEYW), and a
provider of advanced cybersecurity solutions for commercial companies and
government agencies, today announced significant enhancements to its next
generation Threat Detection and Response solution, HawkEye G.
Hexis has developed important new capabilities that help customers realize the
full benefits of a continuous approach to detection and response. This is
critical in light of today's threat environment in which the volume and severity
of threats are increasing necessitating a shift from incident response to
continuous response. This is also driving a need for organizations to operate
with an arsenal of response capabilities, including automated, computer speed
response to reduce the risk of compromise and to increase the effectiveness and
efficiency of incident response efforts.
"In today's IT security landscape, every second malware is in an enterprise
environment could mean immeasurable damage," said Bob Gourley, partner and co-
founder, Cognitio Corp. "As attacks continue to escalate in frequency and
complexity and as response times continue to be hampered by the speed of human
interaction, automation has emerged as the best way to transform how enterprises
deal with advanced threats."
New HawkEye G Features Enabling Next Generation Detection & Automated Response
New features will provide significant enhancements to HawkEye G's detection
capabilities resulting in more robust Threat Detection and Response
capabilities. HawkEye G's detection capabilities are also being expanded to
enable insider threat detection. New features include:
* Lightweight Host Sensor. HawkEye G's new endpoint sensor improves security
by providing extensive endpoint telemetry data and improved system
performance. HawkEye G's sensor is lightweight resulting in no significant
impacts to system performance. The sensor is transparently deployed and
managed by HawkEye G. This delivers improved Endpoint Detection & Response
capabilities through more comprehensive collection of information relating
to processes, directories, the registry, files, and network connections.
Through a combination of big data and proprietary security analytics,
HawkEye G continuously monitors endpoint profiles for indications of
malicious activity. These new sensing technologies include static and
dynamic indicators, expanding the solution's ability to scan executables,
DLLs and process threads in real-time.
* Planned Third Party Integration. HawkEye G will integrate with third party
security solutions. The initial focus is on third-party network-based
detection solutions, including malware protection systems, next generation
firewalls, and intrusion prevention/detection systems. These will feed into
HexisThreat-IQ, an advanced threat assessment model that analyzes detection
information from disparate sources, thus enabling enhanced, automated
response capabilities in conjunction with the third party products.
* Insider Threat. HawkEye G will be introducing purpose built analytics and
functionality to enhance the detection of insider threats. Additional
analytics include detection of anomalous login activity as well as abuse of
"HawkEye G's new significant enhancements provide security professionals threat
detection they can trust and machine-guided automation that enables continuous
monitoring and response by significantly reducing the time it takes to detect,
investigate and respond to advanced threats," said Chris Fedde, President of
Hexis Cyber Solutions. "HawkEye G supports a continuous monitoring and response
strategy helping organizations significantly improve the productivity and ROI of
incident response teams while thwarting adversaries before damage is done."
HawkEye G: Next Generation Endpoint Threat Detection and Response
HawkEye G is Hexis' flagship solution for advanced threat detection and
response. HawkEye G provides comprehensive detection and response capabilities
across endpoints and the network. Its host sensor, big data platform, and
security analytics provide organizations with next generation endpoint detection
and response capabilities.
HawkEye G's automated response capabilities represent a critical differentiator
compared to other security platforms. HawkEye G enables organizations to embrace
automation at a pace and to an extent they are comfortable based on granular
policy controls, while relying on machine-guided, semi-automatic removal where
"Having a combination of endpoint and network capabilities is critical given the
nature of today's advanced threats where having increased visibility on both the
endpoint and the network is critical to detecting and responding to advanced
attacks," said Dennis Charlebois, VP, Product Operations. "HawkEye G's
combination of endpoint and network detection & response capabilities, the
cybersecurity expertise inherited from our sister company KEYW Corporation, and
our automated response capabilities represent key differentiators compared to
HawkEye G's Capabilities & Vision Aligned with Key Trends Cited by Leading
In the report "Market Guide for Endpoint Detection and Response Solutions"
Gartner analysts Peter Firstbrook and Neil MacDonald indicate that "Effectively
dealing with advanced threats that bypass traditional signature-based approaches
will require monitoring, detection and response capabilities at endpoints."
In the recent report "Targeted-Attack Hierarchy Of Needs Part 2" Forrester
Research analyst Rick Holland's indicates that effective breach detection
requires a combination of 1) malware analysis; 2) network analysis and
visibility (NAV); 3) endpoint visibility and control (EVC); and 4) security
analytics (SA) and that "When evaluating technology, prioritize vendors that
offer multiple pillars as well as those that have third-party integrations that
make operationalizing the solution effective."
"Our HawkEye G solution is well aligned with these key industry themes including
the need for increased visibility on both endpoints and networks in order to
detect advanced threats and a need for more robust response capabilities as
organizations shift from incident response to continuous response," said Todd
Weller, VP of Corporate Development at Hexis.
HawkEye G, featuring many new enhancements, is currently available through Hexis
Cyber Solutions' network of channel partners. The complete range of enhancements
described in herein is being introduced over the next 90 days. The Hexis'
Security Operations Center (HSOC) allows for continuous delivery of new features
as they are available.
For a demonstration of HawkEye G, please visit us at Black Hat USA in Las Vegas
on Wednesday, August 6(th) and Thursday, August 7(th) at booth number 558. Or
for your own personalized demo, contact us online to schedule a briefing.
About Hexis Cyber Solutions
Hexis Cyber Solutions, Inc., a wholly-owned subsidiary of The KEYW Holding
Corporation (Nasdaq:KEYW), based in Hanover, Maryland, provides complete
cybersecurity solutions for commercial companies, government agencies, and the
Intelligence Community (IC).
Our mission is to ensure that business IT infrastructure is equipped with tools
and capability to detect, engage, and remove both external and internal cyber
threats. Cyber terrorists, organized crime, and foreign governments focus
tremendous effort on commercial, government, and military interests as their
prime target. Hexis Cyber Solutions' HawkEye family of products offer active,
multi-disciplined approaches to achieve a higher standard of cybersecurity that
is based on our expertise supporting our nation's cybersecurity missions to
ensure that your business or organization can operate at its maximum potential.
For more information contact Hexis Cyber Solutions, 7740 Milestone Parkway,
Suite 400, Hanover, Maryland 21076; Phone 443-733-1900; Fax 443-733-1901; E-
mail firstname.lastname@example.org; or on the Web at www.hexiscyber.com.
KEYW provides agile cyber superiority, cybersecurity, and geospatial
intelligence solutions for U.S. Government intelligence and defense customers
and commercial enterprises. We create our solutions by combining our services
and expertise with hardware, software, and proprietary technology to meet our
customers' requirements. For more information contact KEYW Corporation, 7740
Milestone Parkway, Suite 400, Hanover, Maryland 21076; Phone 443-733-1600; Fax
443-733-1601; E-mail email@example.com; or on the Web at www.keywcorp.com.
Forward-Looking Statements: Statements made in this press release that are not
historical facts constitute forward-looking statements within the meaning of the
Private Securities Litigation Reform Act of 1995. Such statements include but
are not limited to statements about our future expectations, plans and
prospects, and other statements containing the words "estimates," "believes,"
"anticipates," "plans," "expects," "will," "potential," "opportunities", and
similar expressions. Our actual results, performance or achievements or industry
results may differ materially from those expressed or implied in these forward-
looking statements. These statements involve numerous risks and uncertainties,
including but not limited to those risk factors set forth in our Annual Report
on Form 10-K, dated and filed March 10, 2014 with the Securities and Exchange
Commission (SEC) as required under the Securities Act of 1934, and other filings
that we make with the SEC from time to time. Due to such uncertainties and
risks, readers are cautioned not to place undue reliance on such forward-looking
statements. KEYW is under no obligation to (and expressly disclaims any such
obligation to) update or alter its forward-looking statements whether as a
result of new information, future events or otherwise.
CONTACT: For Media Inquiries:
Nina Korfias - MSLGROUP
For Investor Relations:
Chris Donaghey - Hexis
This announcement is distributed by GlobeNewswire on behalf of
GlobeNewswire clients. The owner of this announcement warrants that:
(i) the releases contained herein are protected by copyright and
other applicable laws; and
(ii) they are solely responsible for the content, accuracy and
originality of the information contained therein.
Source: KEYW Corp. via GlobeNewswire