Comprehensive Vulnerability Feeds
Real Time Alerts
The correlation engine sources the latest vulnerability disclosures by plugging both into public feeds and vulnerability databases (ExploitDB, CVE Details, NIST NVD…) and by crawling vulnerability marketplaces and hacker forums in the dark web. This enables us to alert organisations preemptively before the vulnerabilities in their infrastructure become weaponised or exploitable. The aim of the platform is to manage exposure actively as opposed to spending resources on post-incident response
Features Pipeline
Notifications
Notification channel API release
SIEM
Integration with most popular SIEM Solutions
Metasploit
Integration with Metasploit for vulnerability exploitation (Law Enforcement & Intelligence)
Product Guide
Hawkeye’s UI & UX enable a seamless experience on the platform. We make threat management and visibility over your entire IT infrastructure’s vulnerability easier and more accessible to anyone on your tech team.
Dashboard
After logging in to Hawkeye, you can visualize all key statistics and information relevant to the assets you are monitoring. Total number of assets, vulnerabilities count, exploits and number of patches deployed. You can also see the progress over time of how your vulnerability levels change based on the number of disclosures.
Web and System Monitoring
This section allows you to review all the targets you added (be it a URL or IP Address). The pages enable you to see the details of your asset, including the host name, server, services, technology and framework used.
If you click on the asset, a drop down section will appear with further details on your target. By clicking on the report associated with your asset, you can view the vulnerabilities and exploits associated with it.
The target map allows you to visualise all the assets you are tracking and their respective location. If multiple targets are based in the same location, you will be able to see a “+“ sign on the target, and once clicked, it will reveal all the underlying targets that were previously grouped.
Analytics & Reports
The report section enables you to review in detail the vulnerability state of your assets, as well as various analytics across your data.
Analytics: the analytics cards help you review key statistics across your entire assets portfolio, with visual summary of Number of Vulnerabilities by Severity, Number of Hosts by Severity, Number of Services by Host and Number of Vulnerabilities by Service. More analytics cards can be customized for the client on request.
Reports: the Vulnerability report section lists all the vulnerabilities that affect your assets, including the CVE details, summary and criticality level of each vulnerability alongside the vulnerable component.
A filtering filed is available to help you search quickly through your assets by returning targets associated with a specific name, a CVE, a vulnerability or any other keyword.