background




Cyber Hawk

Overview





What is Cyber Hawk?

More than 70% of all cybersecurity incidents today are the result of internal security issues that no firewall or anti-virus could have prevented. What you need is Cyber Hawk so you can begin offering new, high-value INTERNAL security services to all your clients.

Cyber Hawk is your enabling technology for offering high value cybersecurity services. A based Cyber Hawk subscription includes 50 client licenses to run an unlimited number of scans at each site (up to 250 computers). For larger sites you can use multiple licenses.

Cyber Hawk Lets You:
  • Scan a network, detect security threats, and alert various stakeholders
  • Identify new security projects, differentiate your services from the competition, and create “stickiness”
  • Double check to ensure anti-virus and patching are working and to discover network misconfigurations
  • Open new revenue streams as customers opt into higher value security plans, as much as 20% or more
  • Combine machine learning and intelligent tagging to identify anomalous activity, suspicious changes and threats caused by misconfigurations
  • Have brandable, dynamic, built-in marketing material to help you position and sell your new security services with default Service Plans, Product Catalogs, and end-user slide shows
  • Auto populate with the details of the security services you will be delivering
A small investment in Cyber Hawk will yield a huge return in increased revenue, competitive differentiation, and serious peace-of-mind for your clients.





Smart Recommendations

Cyber Hawk automatically scans the client`s network searching for internal threats that occur behind the firewall. When it detects a potential security breach, Cyber Hawk generates an alert and delivers details on the specific threats, accompanied by a set of easy-to-follow, step-by-step instructions on how to resolve the problems Cyber Hawk has discovered. These recommendations help speed the remediation process.

In addition, Cyber Hawk automatically generates weekly and monthly summaries of the issues and insider threats it has identified. These recaps create a regularly updated set of reports that describe the potential threats in a way the client can easily consume. The reports also include threats that were detected but not alerted on because they are not in the client`s current security plan. Armed with this information, review these with your client, and where appropriate upsell the client into a more comprehensive security plan.





Built-In Breach Detection Technology

Cyber Hawk incorporates built-in breach detection technology that finds footholds that your anti-virus can`t. Detect keyloggers, trojans, spyware, unauthorized registry changes, or other malicious activity. The standard Breach Detection System is automatically deployed for all your Cyber Hawk sites. It performs a weekly scan and will let you know if it finds any lingering malware footholds that typically go unnoticed by anti-virus software, as they lie in wait on a client network and postpone their attack until a specified time in the future. Your weekly report includes summary information about the nature of the discovered issue.

If you have higher-risk clients with greater security requirements, you can upgrade them to Advanced Breach Detection System (ABDS). You can enable this feature on a client-by-client basis, right from inside the tool. With ABDS enabled, your client gets upgraded to a daily scan and you get much more detailed information about the threat that`s discovered, and what to do about it. One hit will pay for itself in time saved alone.

Cyber Hawk Makes It Easy To Do The Following:
  • Expose Unauthorized logins or attempts to restricted computers
  • Identify a new user profile suddenly added to the business owner`s computer
  • Find an application just installed on a locked down system
  • Get alerted to unauthorized wireless connections to the network
  • Notice if a new user was just granted administrative rights
  • Detect an unusual midnight log-in for the first time by a day-time worker
  • Find sensitive Personal Identifiable Information (PII) stored on machines where it doesn`t belong
  • Detect breaches that make it by the firewall and anti-virus
  • Expose hacker footholds along with instructions on how to remove






Cyber Hawk Makes It Easy For You To Do The Following:


Expose Unauthorized logins or attempts to restricted computers

Identify a new user profile suddenly added to the business owner`s computer

Find an application just installed on a locked down system

Get alerted to unauthorized wireless connections to the network

Notice if a new user was just granted administrative rights

Detect an unusual midnight log-in for the first time by a day-time worker

Find sensitive Personal Identifiable Information (PII) stored on machines where it doesn`t belong

Detect breaches that make it by the firewall and anti-virus

Expose hacker footholds along with instructions on how to remove