What is Argos?
The Argos platform is a solution for continuous monitoring of companies from the perspective of an
external attacker. The platform collects various data about the targets, evaluates them and
automatically launches non-intrusive attacks. The primary focus of the platform is to give trained
personnel a comprehensive insight into the company's IT security. This happens, for example, with
the help of classic vulnerability scans, but also with the help of specific attacks that the
platform carries out automatically.
The fact is that no automatic tool can replace a creative attacker! Argos therefore also includes access to our team of IT security experts who are able to analyze anomalies and, if necessary, escalate them to real, critical security gaps. The platform provides important data that can, for example, facilitate and optimize phishing and spear phishing attacks as well as red teaming in general.
Argos is fully automated, but we still check with each customer whether it makes sense to expand the predefined scope if necessary. Argos also offers modules for this.
Free initial analysis
A simple (non-intrusive) proof of concept is better than any marketing material - contact us and we'll show you how to use Argos efficiently. Before we do anything, we will contact you first!
Argos offers a variety of real attacker methods that allow a comprehensive overview of the infrastructure. Here you can see from the attacker's perspective how the infrastructure is structured, how it is connected and which areas could be particularly interesting. Especially with complex infrastructure, it is important to keep an overview in order to be able to react accordingly.
Collecting data is one thing - understanding and analyzing it is another. Argos was extensively tested and optimized during various red teaming missions. It is also continuously tested by experienced bug bounty hunters against hardened infrastructure. The data it collects is regularly used to find critical security gaps in companies such as PayPal or Tesla.
Configurable & Flexible
Argos is able to make decisions fully automatically and, for example, adapt scans depending on the target, in order to stay "under the radar" but also to increase efficiency. The user can also freely configure the platform at any point and adapt each module/scan down to the last detail.
If you don't know what IT assets you own, you will never be able to truly defend them. Especially during bug bounty hunting, it is important to quickly and continually find new assets and, for example, to assign IP addresses in the cloud to companies or to identify newly registered domains. Often the company's IT department does not know what assets exist and how they are related. Argos defines an asset here as a domain, subdomain, IP, ASN/CIDR, cloud asset, third party service, a person or their information or a combination of these.
Find and monitor your assets to ensure the security of your business.
Basic level of security
Argos can help you achieve and maintain a basic level of security.
Bug bounty preparations
If you are planning your own bug bounty program, Argos can help you prepare for it.
Argos monitors parts of the internet for leaks that could affect your organization.
Reducing the attack surface
The primary goal should always be to minimize the attack surface - Argos can help here.
Mergers & Acquisitions
Argos helps you understand the IT infrastructure of M&A and classify it into your risk profile.
Automated bug bounty hunter
Argo's functionality is very similar to a Bug Bounty Hunter. Just automated.
Argos helps to understand and minimize the risk of external attacks.