Cloud SecurityDevice & IoTPress Release

Armis Introduces AI-Powered Cyber Exposure Management: Armis Centrix™

Armis, the asset intelligence cybersecurity company, announced the launch of Armis Centrix™, the AI-powered cyber exposure management platform. Armis Centrix™ is a seamless, frictionless, cloud-based platform that proactively secures all your assets, remediates vulnerabilities, blocks threats and protects your entire attack surface.

Armis Centrix™ enables organizations to discover, contextualize, enrich and profile every asset in their environment whilst also building a line of defence by leveraging Armis Centrix™ Asset Intelligence risk scores, policies, alerting and visualizations and most importantly: prioritize efforts against the exposures that matter to your business. Armis Centrix™ also integrates with existing enforcement and ticketing tools to establish end-to-end workflows and true risk lifecycle management and track risk reduction efforts to easily report on progress made. Armis Centrix™ takes proactive measures, detects threats & stops attacks to establish operational workflows and track risk reduction.

“In a perimeter-less world, where assets are digitally connected, traditional cybersecurity boundaries no longer exist. Legacy on-premises systems and point solutions are no longer fit for purpose leaving your attack surface and most critical assets open and exposed to cyber criminals and multiple bad actors,” said Nadir Izrael, CTO and Co-Founder, Armis. “The sheer scale and dynamic nature of the attack surface necessitates an entirely different, AI-driven approach, and that’s what Armis Centrix™ is – the AI that powers a suite of powerful tools for managing cyber risk exposure.”

Armis Centrix™ helps organizations see, protect and manage their entire attack surface, continuously safeguarding their mission-critical assets from cyber threats. Born in the cloud and fueled by AI, only Armis Centrix™ delivers a truly modular approach to cyber exposure management covering the most critical cybersecurity needs for our clients across 4 solutions:

  • OT/IOT security – See and secure OT/IOT networks and physical assets, ensure uptime and build an effective & comprehensive security strategy.
  • Medical device security – Complete visibility and security for all medical devices, clinical assets and the entire healthcare ecosystem – with zero disruption to patient care.
  • Asset management and security – Complete asset inventory of all asset types allowing any organization to see and secure the attack surface.
  • Vulnerability prioritization and remediation – Consolidate, prioritize and remediate all vulnerabilities; improve mean time to remediation (MTTR) with automatic remediation and ticketing workflows.

“This is a revolutionary advancement that will change the way in which companies answer key questions regarding their cybersecurity posture,” said Dana Gilboa, Chief Product Officer, Armis. “Armis can help organizations mitigate their cyber asset risks and protect the entire attack surface by providing the needed intelligence to align security and business efforts. With this approach, we can ultimately provide organizations with the peace of mind they need, allowing them to see, protect and manage all their critical assets.”

Armis Centrix™ is industry-agnostic, allowing Manufacturing, Health and Medical, Information Technology, Energy and Utilities, Financial Services, Transportation, Telecommunications and Media, Public Sector and many more to benefit from its capabilities. Additionally, Armis collaborates with the world’s premier global technology vendors to ensure its customers can seamlessly integrate Armis Centrix™ with existing IT and security stacks.

CSA Editorial

Launched in Jan 2018, in partnership with Cyber Security Malaysia (an agency under MOSTI). CSA is a news and content platform focusing on key issues in cybersecurity in the region. CSA is targeted to serve the needs of cybersecurity professionals, IT professionals, Risk professionals and C-Levels who have an obligation to understand the impact of cyber threats.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *