HawkEye G adds threat analytics, third-party integration

HawkEye G adds threat analytics, third-party integration

Point security solutions and manual remediation processes alone cannot adequately address the increasingly complex cyber threats agencies face.  Automated solutions can lower the time between perimeter breach, detection and threat verification, helping agencies protect their data from hackers and cybercriminals.

Hexis Cyber Solutions, a provider of advanced cybersecurity solutions, announced that its integrated cybersecurity platform, HawkEye G, now includes ThreatSync, a framework providing threat analytics. The platform is also now integrated with third-party security technologies from Palo Alto Networks and FireEye for detection and from Splunk for increased threat intelligence.

Leveraging threat analytics capabilities from ThreatSync and threat intelligence from third-party security solution providers,  HawkEye G 3.0 operates as an evidence-based threat removal platform that “combats attacks at machine speed,” the company said.

ThreatSync reduces false positives and “ghost alerts” generated by perimeter network security devices by confirming if malware activity detected in the network or a virtual sandbox actually exists on the host. If it does, the device’s threat score is raised to a confirmed infection score.  If it’s not confirmed, the device’s threat score is unchanged.

HawkEye G 3.0 not only provides its own host-based and network-based detection capabilities, but also integrates with enterprises’ existing security infrastructure by consuming, fusing and verifying third-party alerts. HawkEye G also integrates transparently into security systems, applications and processes already in place at organizations, sending threat alerts and response actions to third-party reporting, dashboard and event management systems -- including Splunk, SIEMs and HawkEye AP.

“The staggering amount of false positives and ghost alerts generated by perimeter-based security devices has left security teams searching for a way to cut through the overwhelming noise,” said Chris Carlson, senior director of product management, Hexis Cyber Solutions. “With HawkEye G’s new ability to corroborate actual endpoint behavior ... with third-party data, our continuous monitoring capabilities will help capture, analyze and remove malicious activity before compromise in the enterprise.”

About the Author

Connect with the GCN staff on Twitter @GCNtech.

inside gcn

  • electronic roadway sign (SHUBIN.INFO/Shutterstock.com)

    How hackers could cause chaos on America's roads and railways

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group