Blue Hexagon for AWS

Threat Protection Needs To Keep Pace With The Speed of Cloud

A recent study estimated that 83% of workloads will migrate to the cloud in 2020. In the same study, 66% of IT professionals surveyed said security was their biggest concern in adopting an enterprise cloud computing strategy. But retrofitting existing security to the cloud bring the following limitations:

  • Virtual versions of signature-based threat detection cannot keep up with threat variants. Additionally, it is almost impossible to run malware sandboxes in the cloud because most popular offerings are cloud hosted themselves.
  • Agent-based threat detection, where agents for threat detection solutions are installed on virtual machines, can be prohibitively expensive, deliver sub-optimal results, and isn’t ideally for server-less architectures
  • Virtual versions of network traffic analytic solutions that identify anomalies have challenges in baselining what is normal due to the dynamic and short-lived nature of cloud workloads.


We detect threats fast enough to keep up with the ephemeral nature of cloud workloads. Deployment is seamless as we integrate with AWS VPC Traffic Mirroring so you can replicate network traffic at any Elastic Network Interface (ENI) within your VPC for inspection by Blue Hexagon.

Ease of Deployment

We integrate with AWS VPC Traffic Mirroring so network traffic at any Elastic Network Interface (ENI) within a VPC can be sent for inspection by our deep learning platform. This is all performed without the need to install and manage agents on EC2 instances, simplifying deployments.

AWS VPC Traffic Mirroring
Deep Learning Inspection

Detect Known and Unknown Threats

We apply deep learning inspection to your VPC traffic — headers and payloads — to look for threats. Take an example where an attacker has discovered your AWS key in a public repository, and is trying to install coinminer on your VM instances. Blue Hexagon can detect threats in the payload such as the coinminer software, and threats in the headers such as the C2 communications to the attacker malicious domain. Threat verdict is delivered in less than a second.

Orchestrated Prevention

When a threat is detected,  Blue Hexagon can generate a notification into AWS Simple Notification Service (SNS) which can be consumed and orchestrated by any downstream services like AWS GuardDuty or an AWS Lambda. These services can invoke an AWS Cloud Formation Templates (CFT) to shutdown or quarantine the infected workload, ensuring complete security for business-critical applications.

AWS Simple Notification Service
Real-time Classification And Insights

Real-time Classification And Insights

Every threat detected is automatically classified by the Blue Hexagon neural networks in real-time. Threat family information and indicators of compromise are provided for deeper analysis. Security teams can also gain perspective on where threats are on the kill chain and discover insights such as the following:

  • Unique threats
  • Repeat attackers
  • Repeat victims
  • Threats by family
  • Threats by protocol

Integrated reporting

Our platform comes complete with integrated reporting for auditing or reporting to CXOs and security boards. The threat dashboard can be customized to drill into specific timeframes. Additionally, every section of the dashboard has a reporting component, enabling the specific trend or details to be saved into a PDF file, and emailed to relevant parties.

Integrated reporting

Ready to get started?
Let us show you how fast we stop your perimeter threats.