Armis Wins 2024 Frost & Sullivan Technology Innovation Award for Global Healthcare Cybersecurity

Learn More

Armis Centrix™ for Actionable Threat Intelligence

Revolutionary AI technology that leverages dark web, smart honeypots and HUMINT to stop attacks before they impact your organization.

silhouette of an archer on his knee drawing his bow

Early Warning Threat Alerts

Early warning intelligence gives you the time to harden your environment before an attack is ever launched.

CrowdStrike Windows IT Outage
Flash Alert
Flash Alert
The CrowdStrike update is linked to major IT outages worldwide.
CrowdStrike is actively working with customers impacted by the defect found in a single content update for Windows hosts. Mac and Linux hosts are not impacted. This is not a security incident or cyberattack. Crowdstrike has pulled this update, but organizations worldwide are already affected. The fix requires manual intervention, as the Windows machines are experiencing a looping Blue Screen of Death (BSOD). Armis can help streamline your journey back to normal operations ASAP:
  1. Identify affected systems (Armis can help with queries to uncover affected systems and the most critical assets to recover first).
  2. Combine this data with the switch and port information to create a laundry list of assets that need fixing.  Manage this process from this query.
  3. If you have shadow IT within an organization, it can be hard to find. Armis can help you find these assets by reviewing the connections that are trying to communicate with services that are not available. This will help you find these shadow IT servers and then have someone manually fix them.
Please contact Armis directly for Recommended Manual Remediation Steps for Impacted Systems. For more information, click here.
OpenSSH Vulnerability
(CVE-2024-6387 regreSShion)
Early Warning
Not yet published on CISA KEV
Armis Centrix™ for Actionable Threat Intelligence has been reviewing any potential exploitation in the wild of vulnerability (CVE-2024-6387 regreSShion). The exploit requires 10,000 attempts and specific conditions related to the GNU C Library (glibc), making widespread exploitation unlikely. However, targeted attacks, specifically for IoT, OT and Medical Devices remain a major concern. Immediate Steps for Protection:
  • Update Now: The most effective way to mitigate this risk is to update OpenSSH to version 9.8 or later.
  • Temporary Mitigation: If immediate updating is impossible, set LoginGraceTime to 0 in sshd_config to reduce RCE risk.
  • Implement Stricter Access Controls: Tighten SSH access control using firewalls and other network security tools.
NextGen Mirth Connect Remote Code Execution Vulnerability
(CVE-2023-43208)
Early Warning
64 Days Earlier
Armis Centrix™ for Actionable Threat Intelligence identified threat actors leveraging vulnerability (CVE-2023-43208) which can lead to critical medical devices being taken offline, putting patients' lives in danger! This is an easily exploitable unauthenticated remote code execution vulnerability affecting NextGen HealthCare’s Mirth Connect data integration platform. Armis identified this risk 64 days earlier for our customers:
  • CISA KEV Date: 20th of May 2024
  • Armis Labs: 17th of March 2024
 

Just imagine…

  • What if you could buy two more months to act in order to handle an attack like log4J?
  • What if you could be ahead of CISA KEV by 11 months?
  • What if you could get early warnings to any potential threats before they impact your environment?
banner gradient background

Redefining Vulnerability Management Status Quo

See how proactive vulnerability Intelligence is powered with the help of Armis Labs, a world-class research practice.
Engineers walking in digitized factory

Redefining Security By Preempting the Attack

Keeping an organization secure from attacks has been a reactive effort.
Until Now.
An attack is launched and organizations are faced with having to react to it in real time. The result?

  • Reputations are damaged
  • Customer trust is shaken
  • Infrastructure is affected sometimes beyond repair
  • And it all impacts the bottom line

Take a Proactive Approach

Armis introduces a revolutionary way of identifying and arresting threats before they are even launched. Leveraging a combination of AI and machine learning that scours the dark web, Armis Centrix™ for Actionable Threat Intelligence is an early warning system that empowers you with actionable intelligence before a vulnerability is announced, before an attack is launched and before your organization is impacted.

hooded hacker working on multiple computer monitors

With Armis Centrix™ for Actionable Threat Intelligence You Get

  • Attacker Focused Insights that enables contextual risk determination and possible countermeasure actions.
  • Proactive Response that gives you time to harden your environment before an attack is ever launched and before any damage has ever occurred.
  • Threat Hunting Redefined by redefining identifying CVE gaps and vulnerabilities that are still undetected.

How does it work?

Through groundbreaking technology that begins with proprietary AI/ML technology, we turn the hunter into the hunted by:

Smart Honeypots

Attract threat actors to burn exploits

  • Dynamically deploys purpose-configured honeypots into potential “hotspots”
  • Allows for the observation of malicious behaviors and techniques
  • Validates that the exploit is successful
Dark Web & Forums
  • Leverages proprietary AI to gain valuable intelligence into threats still in the formulation stage
  • Enables preemptive threat mitigation actions
Armis Labs

Human Intelligence (HUMINT)

  • Targeting the humans behind the keyboard, HUMINT captures threat activity
  • Understands 200 different languages specifically about exploitation of vulnerabilities

Armis Centrix™ for Actionable Threat Intelligence is a paradigm shift. Ordinary security goes to work when an attack is launched. Armis Centrix™ advances attack surface management by finding potential threats before they are ever launched and before your environment is ever impacted. In many cases, months early.

attack preemption timeline diagram

In fact, Armis has hundreds of instances where customers were proactively alerted to a threat before NIST issued a CVE

alert timeline chart

Key Challenges Solved

Threats and risks are dynamic. And by the time an attack is launched, the hacker has a two to four month headstart.

The Threats That Matter

How do you identify and prioritize which threats to go after first, which patches to deploy and what policies to adjust. Playing security “whack-a-mole” is an unwinnable pursuit.

Vulnerability Prioritization

CVSS and risk scores only tell you part of the story. It leaves out which vulnerabilities are being exploited, and what might have the most impact on your business. Simply put CVSS scores do not give a representation of what is happening in the real world.

Proactive Threat Hunting

Attempting to be proactive has traditionally meant being well networked, knowing (and staying) up to date with your system, defense posture and security status on the ground. This is both a labor intensive process that often only results in reactive hit or miss mitigation techniques.

Business Outcomes That Deliver

  • 98% reduction in the number of vulnerabilities organization’s need to worry about.
  • Over 620 times where Armis CentrixTM for Actionable Threat Intelligence has been ahead of CISA KEV
  • Over 1,400 vulnerabilities detected by Armis CentrixTM for Actionable Threat Intelligence that CISA KEV doesn’t know about

 

banner gradient background
Armis Centrix™ for Actionable Threat Intelligence
It’s time to stop reacting to threats. Take a proactive approach to the threat before it impacts your organization.

Additional Resources

Solution Brief: Armis Centrix™ for Actionable Threat Intelligence

Read this solution brief to learn how Armis Centrix™ for Actionable Threat Intelligence offers AI technology that leverages dark web, dynamic honeypots and HUMINT to stop attacks before they impact your organization.

Redefining the Security Status Quo With Armis Centrix™️ for Actionable Threat Intelligence

It’s time to stop attacks before they impact your organization with Armis Centrix™️ for Actionable Threat Intelligence. View the infographic.

Brochure: Armis Centrix™ for Actionable Threat Intelligence

Read the brochure to learn how Armis Centrix™ provides unparalleled coverage and accuracy, enabling you to stay ahead of evolving cyber threats and protect critical assets.