www.armis.com Open in urlscan Pro
104.254.140.248  Public Scan

Submitted URL: https://email.armis.com/NjQ1LVBEQy0wNDcAAAGRTcN1sKMfhDZ_1A8-v4_Hiea8wrmp9tr9ZIsakPLuRgyoiJB74pJeuP-554iMM-WpIIXUAdI=
Effective URL: https://www.armis.com/blog/armis-expands-platform-with-ai-threat-intelligence-solution?utm_campaign=24-02-28-we---rede...
Submission: On February 16 via manual from ID — Scanned from DE

Form analysis 4 forms found in the DOM

GET

<form id="lang-switcher" method="get"><select name="lang" id="lang-select">
    <option value="https://www.armis.com/blog/armis-expands-platform-with-ai-threat-intelligence-solution/" selected="selected">EN</option>
  </select></form>

GET https://www.armis.com/

<form action="https://www.armis.com/" class="search-form" method="get" role="search">
  <label>
    <span class="screen-reader-text">Search for:</span>
    <input type="text" title="Search for:" name="s" value="" id="s" placeholder="Search …" class="search__field">
  </label>
  <button type="submit" class="search__btn"> Search </button>
</form>

<form id="mktoForm_1035" novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft cookie-autofill-data-loading" style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); width: 1601px;">
  <style type="text/css">
    .mktoForm .mktoButtonWrap.mktoSimple .mktoButton {
      color: #fff;
      border: 1px solid #75ae4c;
      padding: 0.4em 1em;
      font-size: 1em;
      background-color: #99c47c;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#99c47c), to(#75ae4c));
      background-image: -webkit-linear-gradient(top, #99c47c, #75ae4c);
      background-image: -moz-linear-gradient(top, #99c47c, #75ae4c);
      background-image: linear-gradient(to bottom, #99c47c, #75ae4c);
    }

    .mktoForm .mktoButtonWrap.mktoSimple .mktoButton:hover {
      border: 1px solid #447f19;
    }

    .mktoForm .mktoButtonWrap.mktoSimple .mktoButton:focus {
      outline: none;
      border: 1px solid #447f19;
    }

    .mktoForm .mktoButtonWrap.mktoSimple .mktoButton:active {
      background-color: #75ae4c;
      background-image: -webkit-gradient(linear, left top, left bottom, from(#75ae4c), to(#99c47c));
      background-image: -webkit-linear-gradient(top, #75ae4c, #99c47c);
      background-image: -moz-linear-gradient(top, #75ae4c, #99c47c);
      background-image: linear-gradient(to bottom, #75ae4c, #99c47c);
    }
  </style>
  <div class="mktoFormRow">
    <div class="mktoFieldDescriptor mktoFormCol" style="margin-bottom: 10px;">
      <div class="mktoOffset" style="width: 10px;"></div>
      <div class="mktoFieldWrap mktoRequiredField"><label for="Email" id="LblEmail" class="mktoLabel mktoHasWidth" style="width: 100px;">
          <div class="mktoAsterix">*</div>
        </label>
        <div class="mktoGutter mktoHasWidth" style="width: 10px;"></div><input id="Email" name="Email" placeholder="Email Address" maxlength="255" aria-labelledby="LblEmail InstructEmail" type="email"
          class="mktoField mktoEmailField mktoHasWidth mktoRequired" aria-required="true" style="width: 150px;"><span id="InstructEmail" tabindex="-1" class="mktoInstruction"></span>
        <div class="mktoClear"></div>
      </div>
      <div class="mktoClear"></div>
    </div>
    <div class="mktoClear"></div>
  </div>
  <div class="mktoFormRow"><input type="hidden" name="utm_source__c" class="mktoField mktoFieldDescriptor mktoFormCol" value="mkto" style="margin-bottom: 10px;">
    <div class="mktoClear"></div>
  </div>
  <div class="mktoButtonRow"><span class="mktoButtonWrap mktoSimple" style="margin-left: 120px;"><button type="submit" class="mktoButton">Submit</button></span></div><input type="hidden" name="formid" class="mktoField mktoFieldDescriptor"
    value="1035"><input type="hidden" name="munchkinId" class="mktoField mktoFieldDescriptor" value="645-PDC-047"><i class="fa fa-5x fa-cog fa-spin"></i>
</form>

<form novalidate="novalidate" class="mktoForm mktoHasWidth mktoLayoutLeft" style="font-family: Helvetica, Arial, sans-serif; font-size: 13px; color: rgb(51, 51, 51); visibility: hidden; position: absolute; top: -500px; left: -1000px; width: 1600px;">
</form>

Text Content

A New Era for Armis: Turning the Hunter into the Hunted

Learn More

 * Attack Surface Management Trends
 * Support
 * Armis University

EN
 * Platform
   
   ARMIS PLATFORM
   
    * Armis Centrix™
    * Armis Centrix™ for Asset Management and Security
    * Armis Centrix™ for OT/ IoT Security
    * Armis Centrix™ for Medical Device Security
    * Armis Centrix™ for Vulnerability Prioritization and Remediation
    * Armis Managed Threat Services
   
   CAPABILITIES
   
    * See
    * Protect
    * Manage
   
   DATA SOURCES
   
    * Armis Asset Intelligence Engine
    * Telemetry Intelligence
    * Integrations

 * Industries
   
   INDUSTRIES
   
    * Manufacturing
    * Information Technology
    * Telecommunications and Media
    * Retail
    * Hospitality
    * Transportation and Logistics
    * Energy and Utilities
    * Health and Medical
    * Financial Services
   
   PUBLIC SECTOR
   
    * Government
    * Defense
    * Federal Government
    * State and Local Government
    * Higher Education
    * K-12 School Districts
   
   ARMIS LAUNCHES FEDERAL ADVISORY BOARD TO ACCELERATE PUBLIC SECTOR MOMENTUM

 * Solutions
   
   ASSET MANAGEMENT AND SECURITY
   
    * Full Asset Inventory and CMDB Enrichment
    * Attack Surface Management and Security Posture
    * IT and Security Hygiene and Gap Analysis
    * Compliance Reporting
    * Network Segmentation and Enforcement
    * Threat Detection and Response
   
   OT/ IOT SECURITY
   
    * Deep OT Visibility
    * OT/ IoT Environment Hygiene
    * Bridge the IT/ OT Gap
    * Monitor and Protect OT Networks
    * Process Integrity
   
   MEDICAL DEVICE SECURITY
   
    * Visibility and Security Across the Entire Medical Fleet
    * IoMT/ IT Convergence Management
    * Asset Behavior Monitoring and Compliance
    * Vulnerability and Threat Monitoring
    * FDA Recall and Security Advisories Management
    * Automated Network Segmentation and Enforcement
   
   VULNERABILITY PRIORITIZATION AND REMEDIATION
   
    * Fill Coverage Gaps in Vulnerability Detection
    * Vulnerability Data Enrichment
    * Vulnerabilty Prioritization
    * Vulnerability Remediation
    * Track Progress and Process Management
   
   COMPLIANCE FRAMEWORKS
   
    * CIS Critical Security Controls
    * MITRE ATT&CK for ICS
    * NIS2
    * NIST
    * Zero Trust

 * Resources
   
   RESOURCES
   
    * Resource Center
    * Case Studies
    * FAQ
    * IoMT Playbook
    * Converge IT/OT Cybersecurity Playbook
   
   ARMIS
   
    * Blog
    * Podcasts
    * Armis Labs Research
    * Armis University
   
   GLOBAL ATTACK SURFACE MANAGEMENT ORGANIZATION TRENDS AND CHALLENGES

 * Partners
   
   PARTNERS
   
    * Partner Programs
    * Technology Partners
    * Service Providers
   
   PARTNER CENTER
   
    * Partner Center Login

 * Company
   
   ABOUT US
   
    * Company Overview
    * Newsroom
    * Analyst Relations
    * Investor Relations
    * Awards
    * Leadership
   
   CONNECT WITH US
   
    * Careers
    * Events
    * Contact Us

Search for: Search
Request a DemoFree Trial

 * Home
 * Blogs
 * Armis Expands Platform with AI Threat Intelligence Solution

FEB 14, 2024


TURNING THE HUNTER INTO THE HUNTED: SPECIALIZED AI AND DARK WEB INTELLIGENCE
REDEFINES THREAT HUNTING TACTICS

BY NADIR IZRAEL

Co-Founder and CTO



Through its acquisition of CTCI, an AI-powered pre-attack threat hunting
technology company, Armis enters a new era in security strategy and
capabilities, shifting the paradigm from reactive threat response to proactive
threat hunting, leveraging AI and dark web intelligence to pre-empt attacks
before they happen.

Integrating CTCI’s technology into Armis Centrix™ revolutionizes security early
warning intelligence systems globally. In today’s highly dynamic cyber risk
environment, organizations need to adopt a new security posture to solve for
threats that can significantly impact their organizations. By harnessing the
power of AI, dark web “chatter”, dynamically generated honeypots, and human
intelligence, Armis Centrix™ for Actionable Threat Intelligence transcends
traditional security measures, proactively identifying preparatory indicators of
attacks and exploits.

The Armis Asset Intelligence Engine boasts over 4 billion asset profiles, as
well as millions of attack surface models. With this trove of intelligence,
Armis provides real-time situational awareness and redefines active threat
hunting capabilities with new predictive AI technology. Armis can now generate
thousands of honeypots that are optimized to the actual attack surface,
scrutinizing attack behaviors and tactics as early as the reconnaissance stage,
often months before an attack is launched. Armis Centrix™ for Actionable Threat
Intelligence empowers organizations to flip the script, turning the hunter into
the hunted.

The proactive defense mechanisms employed by Armis Centrix™ for Actionable
Threat Intelligence are multifaceted, drawing insights from various sources
including:

 1. Dynamic Honeypots Deployment: Armis Centrix™ dynamically deploys
    purpose-configured honeypots into potential “hotspots,” allowing for the
    observation of malicious behaviors and techniques.
 2. Dark Web Intelligence: By scouring the deep and dark web for pertinent
    “chatter,” Armis Centrix™ gains valuable intelligence into nascent cyber
    threats, enabling preemptive action.
 3. Human Intelligence Integration: Leveraging human intelligence through
    strategic feeds, reverse engineering, and “listen posts,” Armis Centrix™
    ensures unparalleled coverage and accuracy in threat detection.

By tracking potential incidents in real time and preemptively mitigating risks,
Armis empowers organizations and government agencies to stay ahead of the curve
in an ever-evolving threat landscape.

We at Armis have set our sights high. Our five-year plan is simple: become the
leading force in cyber exposure management and asset intelligence. The
acquisition of CTCI marks a turning point, signaling a paradigm shift in how we
approach cybersecurity. We’re moving beyond traditional defense to a proactive,
AI-powered future. Our innovative Armis Centrix™ platform isn’t just for
defense, it’s for actionable threat intelligence – jumping ahead of threats with
unparalleled insight and preemptive counterstrikes.

As cyberattacks evolve, their complexity grows. We understand the dangers, and
Armis Centrix™ offers a dynamic shield. It empowers organizations to protect
their critical assets and build resilience in the ever-shifting threat
landscape. Forget reactive measures, we’re about taking control and reclaiming
the initiative. This is the new era of cybersecurity, and we’re leading the
charge.





Register for the Webinar to Learn More

SHARE THIS ARTICLE

 * 
 * 
 * 
 * 

GET UPDATES

Sign up to receive the latest from Armis.

*





Submit



Armis, the asset intelligence cybersecurity company.

 * 
 * 
 * 
 * 

 * 

© 2024 Armis Inc. All Rights Reserved.

PLATFORM

 * Armis Centrix™
 * Attack Surface Visibility
 * Attack Surface Protection
 * Attack Surface Management
 * Armis Asset Intelligence Engine
 * Telemetry Intelligence
 * Integrations

INDUSTRY

 * Manufacturing
 * Information Technology
 * Telecommunications and Media
 * Retail
 * Hospitality
 * Transportation and Logistics
 * Energy and Utilities
 * Health and Medical
 * Financial Services
 * Government
 * Defense
 * Federal Government
 * State and Local Government
 * Higher Education
 * K-12 School Districts

SOLUTIONS

 * Armis Centrix™ for Asset Management and Security
 * Armis Centrix™ for OT/ IoT Security
 * Armis Centrix™ for Medical Device Security
 * Armis Centrix™ for Vulnerability Prioritization and Remediation
 * Armis Managed Threat Services

FRAMEWORKS

 * CIS Critical Security Controls
 * MITRE ATT&CK for ICS
 * NIS2
 * Zero Trust
 * NIST

PARTNERS

 * Partner Programs
 * Technology Partners
 * Service Providers
 * Partner Login

RESEARCH

 * Crit.IX
 * TLStorm
 * PwnedPiper
 * ModiPwn
 * NAT Slipstreaming v2.0
 * ETHEROOPS
 * CDPWN
 * URGENT/11
 * BLEEDINGBIT
 * BlueBorne

COMPANY

 * Company Overview
 * Newsroom
 * Analyst Relations
 * Investor Relations
 * Events
 * Awards
 * Our Leadership
 * Careers
 * Legal and Compliance
 * Contact Us

RESOURCES

 * Resource Center
 * Analyst Reports
 * Blog
 * Case Studies
 * Research
 * Solution Briefs
 * Webinars
 * White Papers