Introduction
ARIA Zero Trust PROTECT (AZT PROTECT™) is an advanced endpoint security solution designed for critical operational technology (OT) environments, providing protection against a full range of cyber threats, including zero-day attacks, malware, ransomware, and supply chain vulnerabilities. It proactively prevents attacks before any damage occurs by continuously verifying the trustworthiness of all applications on an endpoint. AZT uses a Trust Agent to establish an ARIA TrustID for each application, ensuring it remains unaltered and approved by the AZT Trust Center. Once verified, AZT enforces strict "zero trust" policies, blocking any untrusted or modified applications, thereby ensuring seamless and secure operations without downtime. Further, AZT countermeasures are behavioral security contols that prevent malicious activity detected on endpoints such as memory attacks, code tampering, malicious content, trust violations and system integrity.
Trust Center
The Trust Center is the central management server and administrative control plane for the AZT platform. It is a Linux based virtual machine that provides the AZT dashboard for monitoring alerts, managing endpoints, setting enforcement policies and proving trust workflows. Administrators and view-only users access this via a web browser. The Trust Center can export its information via syslog to 3rd party tools or via API integration as required for monitoring and control.
AZT Agent
The AZT Agent is the primary kernel-mode endpoint enforcement component (Ring 0) deployed on protected systems. It monitors application lifecycle events, detects advanced threats, and enforces process, network and execution policies. The agent consisst of a Windows/Linux driver and service.
Trust Point
The Trust Point is a multi-level management layer that organizes distributed deployments of Trust Centers. It provides hierarchical, multi-site oversight of a fleet of Trust Centers
Was this article helpful?
That’s Great!
Thank you for your feedback
Sorry! We couldn't be helpful
Thank you for your feedback
Feedback sent
We appreciate your effort and will try to fix the article