infoTECH Feature

October 10, 2013

Hexis Cyber Solutions Unveils HawkEye G to Detect and Remove Stealthy Advanced Cyber Threats

Network owners today do everything possible to defend their perimeter but still the threat gets in. Realizing this, Hexis Cyber Solutions recently launched industry's first active defense solution that detects stealthy advanced cyber threats and takes automatic action to remove them from the network.

HawkEye G has been designed by Hexis, a wholly owned subsidiary of KEYW Corporation, to directly combat the tools, techniques, and procedures of the most advanced attackers.

This breakthrough technology, delivers fast detection of advanced attacks, like botnets, malware and advanced persistent threats. By using an embedded high performance event data warehouse and the most advanced analytics to date, HawkEye G detects in seconds and minutes what was virtually invisible.

Later, it uses automated countermeasures to remove these cyber threats and protect today's networks at digital speeds, before they can compromise intellectual property or disrupt the business.

"By leveraging KEYW's legacy, Hexis Cyber Solutions is changing the way customers address their protection efforts," said Len Moodispaw, Chairman and CEO of KEYW Corporation, in a press statement. "With the best possible detection techniques and unmatched automated countermeasures, we are empowering our customers to thwart their adversaries."

HawkEye G combines intelligence and defense capabilities with a continuous capability delivery service. This allows the HawkEye G system to evolve as quickly as the threat environment evolves.

Officials said that this particular feature makes it stand out from the rest of the defense tools available in the market today.

Chris Fedde, the President of Hexis, stated: "HawkEye G was purpose-built to find and remove that threat before it compromises the network. In addition, the analytics that are applied to the spectrum of network behavior means that high quality security awareness is constantly available to the network operator."




Edited by Ryan Sartor
FOLLOW US

Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter

infoTECH Whitepapers