Skip to main content

HYAS Wins “Threat Intelligence Innovation Award” in 7th Annual CyberSecurity Breakthrough Awards Program

Prestigious International Awards Program Recognizes Outstanding Information Security Products and Companies

HYAS Infosec, whose adversary infrastructure platform provides unparalleled visibility, protection and security against all kinds of malware and attacks, today announced that it is the recipient of the “Threat Intelligence Innovation Award” in the 7th annual CyberSecurity Breakthrough Awards program conducted by CyberSecurity Breakthrough, a leading independent market intelligence organization that recognizes the top companies, technologies and products in the global information security market today.

Underpinning all of HYAS solutions is an adversary infrastructure platform with a large, dynamic data lake that constantly ingests data from a variety of authoritative sources across exclusive, private, and commercial sources. The platform powers all of the HYAS solutions, which are designed to be easy to deploy and manage, deliver value by themselves as well as seamlessly integrating into any existing security stack and client architecture.

HYAS solutions built on this platform allow threat and fraud investigators and analysts to investigate any attack or IOC, rapidly discover related indicators and map out the complete campaign architecture, identify where the attack came from, and get proactive against future attacks by understanding what infrastructure the bad actor controls which hasn’t yet been weaponized or utilized.

Furthermore, HYAS solutions built on this platform provide organizations of all sizes the visibility and observability into the telltale signs of breach, early in the kill chain before the breach becomes a full-blown attack and causes damage. Driving the time from infection to detection and remediation to near real-time, HYAS detects the beaconing activity of an attack – the first step regardless of how the perimeter was breached and often missed by traditional security tools. By identifying and blocking communication to the adversary’s command-and-control, the attack can be rendered inert, enabling true business and operational resiliency against attacks of all forms, including but not limited to supply-chain, insider risk, phishing, and ransomware.

“Criminals use dynamic infrastructure to instruct and control their attacks, so illuminating that infrastructure is key to understanding cyber-attacks and stopping them. This is more effective than simply trying to erect a higher wall around the enterprise and enables a true operational resiliency strategy,” said David Ratner, CEO of HYAS. “We’re honored to receive this award from CyberSecurity Breakthrough as we help organizations ensure business continuity - independent of any new attack vector, surface, or technique that may be used to breach their environment. Our clients understand the complete campaign infrastructure, close cases faster, monitor bad actors, and move their approach and strategy from reactive to proactive.”

The mission of the CyberSecurity Breakthrough Awards is to honor excellence and recognize the innovation, hard work and success in a range of information security categories, including Cloud Security, Threat Detection, Risk Management, Fraud Prevention, Mobile Security, Email Security and many more. This year’s program attracted thousands of nominations from over 20 different countries throughout the world.

“HYAS solutions function as both an early warning system and last line of defense. They assume a breach will happen - that it’s just a matter of time - but with this technology in place, businesses can ensure continuity and resiliency regardless of where or how the breach occurred. We’re pleased to recognize them with this years’ ‘Threat Intelligence Innovation Award.’ Threat actors require complex infrastructure to conduct attacks across environments,” said Steve Johansson, managing director, CyberSecurity Breakthrough. “As good as security defenses are, there will always be something that gets through. By focusing on the infrastructure, HYAS is able to alert organizations that something has infiltrated the environment, has gotten past all the security barriers, and is now beaconing out for instructions. HYAS can then cut off communication to that infrastructure to stop the attack.”

About HYAS

HYAS is the world-leading authority on cyber adversary infrastructure and communication to that infrastructure. HYAS is dedicated to protecting organizations and solving intelligence problems through detection of adversary infrastructure and anomalous communication patterns.

We help businesses see more, do more, and understand more in real time about the nature of the threats they face. HYAS turns metadata into actionable threat intelligence, actual adversary visibility, and protective DNS that renders malware inoperable. For more information visit HYAS.com.

About CyberSecurity Breakthrough

Part of Tech Breakthrough, a leading market intelligence and recognition platform for global technology innovation and leadership, the CyberSecurity Breakthrough Awards program is devoted to honoring excellence in information security and cybersecurity technology companies, products and people. The CyberSecurity Breakthrough Awards provide a platform for public recognition around the achievements of breakthrough information security companies and products in categories including Cloud Security, Threat Detection, Risk Management, Fraud Prevention, Mobile Security, Web and Email Security, UTM, Firewall and more. For more information visit CyberSecurityBreakthrough.com.

Tech Breakthrough LLC does not endorse any vendor, product or service depicted in our recognition programs, and does not advise technology users to select only those vendors with award designations. Tech Breakthrough LLC recognition consists of the opinions of the Tech Breakthrough LLC organization and should not be construed as statements of fact. Tech Breakthrough LLC disclaims all warranties, expressed or implied, with respect to this recognition program, including any warranties of merchantability or fitness for a particular purpose.

Criminals use dynamic infrastructure to instruct and control their attacks, so illuminating that infrastructure is key to understanding and stopping cyber-attacks. This is more effective than simply trying to erect a higher wall around the enterprise.

Contacts

Amy Levine

Director of Marketing, HYAS

Amy (dot) Levine (at) Hyas (dot) com

877-572-6446

Dan Chmielewski

Madison Alexander PR

Dchm@madisonalexanderpr.com

949-231-2965

Data & News supplied by www.cloudquote.io
Stock quotes supplied by Barchart
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms and Conditions.