CIO Influence
CIO Influence News Cloud Security

Argo Edge from CISO Global Successfully Sustains More than 125,000 Cyberattacks at DEF CON

Argo Edge from CISO Global Successfully Sustains More than 125,000 Cyberattacks at DEF CON

CISO Global, Inc., an industry leader as a managed cybersecurity and compliance provider, successfully tested the effectiveness of its Argo Edge security solution at DEF CON, the premier cybersecurity and hacker convention in Las Vegas last week.

The conference attracts hackers from across the globe to compete and show off their skills through hacking competitions. Many security vendors test their products every year, taking advantage of the collective cyber hacking talent.

Recommended: We Need to Think Differently – Your Hybrid Connectivity Isn’t Really Hybrid

In its first external test, the Argo Edge cloud security platform was deployed by the CISO Global incident response team, Team Hades, on an Intel NUC computer with a standard operating system installed, connecting it to the public WiFi in Caesar’s Forum from August 10 to 13. Over the course of the event, hackers attacked it more than 127,000 times, ranging from backdoor attacks to adware to data stealing software, and numerous malware and ransomware types.

None were successful in impacting the device’s operating system, including encryption and takeover attempts; Argo Edge’s capabilities allowed it to learn from each of the 127,000 attempts to continuously improve.

“This successful real-world test validates our latest platform, which has been developed over the past two years,” said David Jemmett, CEO of CISO Global. “Argo Edge has demonstrated its ability to coordinate multiple, layered security solutions to maximize resiliency against an attack. This test at DEF CON shows that a properly integrated, managed and deployed set of security solutions offers real defense against today’s most aggressive threat actors.”

Argo Edge, innovating at the edge to stop cyberthreats
As a cloud security platform, Argo Edge was designed to enhance a network’s external security, as well as improve internal network resiliency to attacks, specifically ransomware. With this successful trial, its security capabilities have now been demonstrated to be effective for attack types beyond ransomware.

In addition, Argo Edge identifies IP addresses associated with each attack, adding to its list of known-bad IP addresses. Each known-bad IP is automatically added to the cloud-based platform, allowing all other networks or devices on which Argo Edge is deployed to benefit. Argo Edge also maintains logs of each security event to support forensics processes if, and, when needed.

Deployed on select commercial and government networks by CISO Global for the past two years, Argo Edge has proven effective against all current known ransomware v******, including the most prolific and costly variants. According to IBM’s latest Cost of a Data Breach Report, the average price tag of a breach is USD $4.45 million in 2023, a figure which does not include the cost of the ransom, itself.

Latest ITechnology News: Japan-based Construction Tech Company Log Build Chooses Vonage To Enhance Customer Experience

With its unique approach, Argo Edge layers together pre-configured, pre-integrated technologies that include cloud firewall as a service (FaaS), secure internet gateway, secure authentication, secure service edge (SSE), and containerized internet browser sessions for each user. This solution provides Zero Trust Network Access (ZTNA), Cloud Access Security Broker (CASB) and Data Loss Protection (DLP) capabilities across an organization’s cloud applications and environment, and overall improved network performance. The AI component of Argo Edge further hardens networks by learning from each blocked attack and applying this new knowledge to unaffected environments as a forward-thinking, protective functionality.

Argo Edge was recently independently valued at $49 million, and its data visualizations will be delivered through Argo Security Management, an umbrella platform that aggregates and visualizes key security data across client environments.

Latest ITechnology News: Teradek To Integrate With Sony’s Ci, Allowing Filmmakers And Broadcasters To Accelerate Secure Camera-to-Cloud Workflow

[To share your insights with us, please write to sghosh@martechseries.com]

Related posts

IBM Brings Generative AI Commentary and AI Draw Analysis to the Wimbledon Digital Experience

PR Newswire

Assura and Stellar Cyber Announce Partnership and Benefits to Assura’s Security Operations Portfolio

Business Wire

CAST Expands Ecosystem to Help Accelerate Application Modernization for Cloud