SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One system, one card
    One system, one card
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One system, one card
    One system, one card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Effective high-security wedge barriers by Delta
    • SCD secures major contract for HD MWIR detectors
    • ASSA ABLOY's Aperio: Revolutionising digital security
    • VIVOTEK supports ecological restoration in Taiwan
    One system, one card
    One system, one card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    One system, one card
    One system, one card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One system, one card
    One system, one card
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One system, one card
    One system, one card
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • Wire-free locks
  • AI special report
  • Cyber security special report
  • Casino security & surveillance
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

Argos Edge offers first fully comprehensive one-stop DRP solution

13 Jul 2021

Argos Edge offers first fully comprehensive one-stop DRP solution
Contact company
Contact Cyberint
icon Add as a preferred source Download PDF version
Related Links
  • What are the security challenges of protecting critical infrastructure?
  • Impact of challenges in the component supply chain on security manufacturers
  • What is the impact of privacy concerns on physical security?

Cyberint has launched the next-generation Digital Risk Protection platform, Argos Edge, a fully SaaS-based solution, to provide real-time responses to cyber threats coming from beyond the traditional security perimeters.  

All-in-one DRP platform

Unlike other solutions, Cyberint's holistic and integrated approach combines external Attack Surface Monitoring (ASM), advanced threat intelligence, extensive phishing detection as well as social media and brand abuse monitoring.

The different modules work together to infuse and enrich the Argos Edge platform, identifying and remediating weaknesses that other solutions cannot detect seamlessly and continuously.

This unique capability makes Argos Edge the most comprehensive and effective all-in-one digital-risk-protection (DRP) platform on the market to date.

Monitoring threat intelligence 

Argos Edge redefines the digital risk protection space by constantly collecting, analysing, and classifying threat intelligence from the widest variety of sources, tracking cybercriminals in the dark and deep web, criminal forums, market places, social media platforms, instant messaging, file sharing repositories and more.

External Attack Surface Mapping

Argos Edge reduces false positives by 99%, providing a combination of External Attack Surface Mapping 

Pin-pointed targeted alerts such as those provided by Argos Edge are known to reduce false positives by 99%, providing the optimum combination of External Attack Surface Mapping of Digital assets, including cloud assets and threat intelligence.

Argos Edge focuses on generating proactive and targeted alerts allowing organisations to take immediate steps to mitigate those incoming threats which pose the greatest potential risk whilst also receiving up-to-date proactive information about global, regional, and vertical threats that may cause a potential breach.

Alert integration

Argos Edge includes one of the most extensive leaked credentials databases, which is comprised of: fusing breached databases, analysis of phishing kits, and highly effective InfoStealers malware's C&C, helping to reduce the risk from this most common attack vector.

The leaked credentials database is also highly effective to B2C organisations helping to reduce account takeover of their customers.

The new platform also enables users, via a state-of-the-art user interface, to immediately use the pin-pointed alerts as well as integrate them into SIEM, SOAR, and ticketing systems like IBM QRadar and Palo Alto's Cortex XSoar and others for swift dissemination and remediation.

Forensic canvas

Argos Edge's unique built-in investigation tool, Forensic Canvas can uncover the relationships between disparate data points, pivot on any IoC, and leverage the massive data lake that Cyberint collects 24/7 to build a quick and up-to-date picture of any threat.

"Only by constant analysis of hundreds of millions of data points of threat intelligence and an ongoing monitoring of their external attack surface can organizations counter the threat actors' constantly evolving threat landscape," says Cyberint CEO Yochai Corem.

Perimeter security features

The Argos Edge platform protects companies from more than 75 different business risks lurking beyond the perimeter

The Argos Edge platform also comprises numerous additional features that enable users to extend their security perimeters to include phishing, social media and fake application takedown support, external source code monitoring, and fraud detection capabilities.

With this launch, organisations have the capabilities to protect themselves from more than seventy-five different business risks lurking beyond the perimeter, such as fraud, phishing, malware, data leakage, vulnerabilities, brand, social media risks, and more.

Users now also have modular options allowing for full flexibility in licensing the platform.

Cyber investigations

Organisations can benefit from Cyberint's deep expertise in specialised services such as Virtual Humint, deep cyber investigations, and interaction with threat actors to identify possible weaknesses.

"With Argos Edge, I have a level of assurance and trust that they are always there for me. The feeling that they always have my back is invaluable has given me the confidence that we have enough visibility and can be proactive in dealing with different cyberthreats," says Mark Frogoso, CISO at GCash.

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Remote surveillance
  • Digital video surveillance
  • Physical security
  • Industrial security
  • Remote security
  • Commercial security
  • Perimeter security
  • Private sector security
  • Security devices
  • Security monitoring system
  • Network monitoring
  • Industrial security systems
  • License plate recognition
  • Security software
  • Industrial surveillance
  • IP security solutions
  • Integration software
  • Cyber security
  • Corporate Security
  • Central Monitoring
  • Data Security
  • Digital Video Recorders
  • Cloud security
  • Related categories
  • CCTV software
  • Access control software
Related white papers
Milestone cloud deployment guide

Milestone cloud deployment guide

Download
Maximising enterprise security systems in the cloud

Maximising enterprise security systems in the cloud

Download
Using artificial intelligence (AI) to automate physical security systems

Using artificial intelligence (AI) to automate physical security systems

Download
Related articles
Looking back at 2020: Cloud systems expand in shadow of COVID

Looking back at 2020: Cloud systems expand in shadow of COVID

What is the cloud? (Can we all agree?)

What is the cloud? (Can we all agree?)

Which security markets are likely to embrace the cloud?

Which security markets are likely to embrace the cloud?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Product news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One system, one card
One system, one card
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec