ETFOptimize | High-performance ETF-based Investment Strategies

Quantitative strategies, Wall Street-caliber research, and insightful market analysis since 1998.


ETFOptimize | HOME
Close Window

ARIA Cybersecurity Adds Features To Expand AZT PROTECT(TM) Into the Embedded IIOT Market

AZT Feature Set Allows ARIA to Target the Industrial Internet of Things Market with on Device Embedded Application Lockdown and Cyberattack Protection

LOWELL, MA / ACCESS Newswire / October 30, 2025 / ARIA Cybersecurity, a CSPi business (NASDAQ: CSPI) today announced a new feature set that allows OEMs to integrate patented AZT PROTECTinto their products to provide a level of protection that up until today was not available on embedded RTU routers, IOT gateways, Smart Meters and other intelligent edge devices that make up the distributed control points in expanding world of connected things.

Today's IIOT device market is protected primarily by firewalling and network-based Denial of Service suppression solution. Acknowledged as vital, but in no way sufficient to provide the level of protection required to stop today's attacks targeting the device applications and OS.

ARIA in response to feedback from device manufacturers created a version of AZT that would be able to run on ARM core and other distributed device chip-set environments running specialized embedded Linux distributions as well embedded Windows OS versions.

The IIOT market is seeking solutions like ARIA's AZT PROTECT, which provides:

  • Simple deployment and operation: An easy-to-operate OS and application lockdown solution that prevents unscheduled service disruptive updates

  • Reliable cyberattack protection: Security that does not require security updates, never needs remote truck rolls, and will provide sustainable protection for the life of the device.

  • Simple deployment and operation: An easy to install and operate system - that auto installs and can run fully monitored or completely autonomous on a standalone device-by-device deployment. One that ranges from always connected to one that is never connected but always fully protected - Supporting a full range of application use cases.

  • Extended system life: Safeguards older OS based systems that are difficult to - or can't be patched, protecting the OS and application from exploits.

  • Scalable: Works easily in small standalone remote deployments to 10s of thousands of connected devices.

"We are very pleased with ARIA's AZT solution which worked with the vendor of our tower monitoring gateways to provide critical defense in depth capabilities" said the spokesperson at an African cell tower operator "We have been looking for an on-device approach to lock down the OS and applications from unscheduled updates and cyberattacks. We can't control which contractors from wireless providers have access into the towers and need to protect from network and well as locally introduced supply chain attacks. Sometimes the wrong application updates can be applied, and this can take tower operations down. AZT PROTECT stops both from happening."

AZT PROTECT provides a lock-down approach to protecting critical infrastructure applications from unintended updates as well as attacks such as stopping all forms of malware, ransomware, and nation-state backed attacks on these applications and the operating systems on which they run. In addition, AZT stops code-based exploits that previously had to be stopped by OS based security patches, thus extending the useful life of such legacy operating system-based production systems - once such patches are no longer provided by the vendor.

The solution utilizes patented reactive AI-based countermeasures to stop the attacks as they land on an operation's most vulnerable critical production control systems. These countermeasures lock down critical applications from unscheduled updates and adulteration while stopping code-based attacks, such as malware and ransomware, from executing. Further, they disrupt the techniques nation-state-backed attackers utilize to land, expand, and then escalate privileges to take control of such systems.

To learn more about the capabilities between Acronis and ARIA's AZT PROTECT, visit: www.ariacybersecurity.com/aria-azt-protect/

About ARIA Cybersecurity
ARIA Cybersecurity, a business of CSPi Inc. (NASDAQ: CSPI), recognizes that better, stronger, more effective cybersecurity starts with a smarter approach. Our solutions provide new ways for organizations to protect their most critical assets-they can shield their critical applications from attack with our AZT PROTECT solution, while monitoring internal traffic, device-level logs, and alert output with our ARIA ADR solution to substantially improve threat detection and surgically disrupt cyberattacks and data exfiltration. Customers in a range of industries rely on our solutions to protect their most critical assets and applications-no matter where they are stored, used, or accessed. Learn more at ARIACybersecurity.com.

ARIA Cybersecurity Media Contact
Gary Southwell
info@ariacybersecurity.com

SOURCE: CSP, Inc.



View the original press release on ACCESS Newswire

Recent Quotes

View More
Symbol Price Change (%)
AMZN  218.51
+1.37 (0.63%)
AAPL  270.62
+4.37 (1.64%)
AMD  202.00
-4.02 (-1.95%)
BAC  51.31
+0.31 (0.62%)
GOOG  296.53
+6.55 (2.26%)
META  590.55
+1.40 (0.24%)
MSFT  471.95
-6.48 (-1.35%)
NVDA  179.34
-1.30 (-0.72%)
ORCL  197.88
-12.81 (-6.08%)
TSLA  395.39
+0.16 (0.04%)
Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the Privacy Policy and Terms Of Service.


 

IntelligentValue Home
Close Window

DISCLAIMER

All content herein is issued solely for informational purposes and is not to be construed as an offer to sell or the solicitation of an offer to buy, nor should it be interpreted as a recommendation to buy, hold or sell (short or otherwise) any security.  All opinions, analyses, and information included herein are based on sources believed to be reliable, but no representation or warranty of any kind, expressed or implied, is made including but not limited to any representation or warranty concerning accuracy, completeness, correctness, timeliness or appropriateness. We undertake no obligation to update such opinions, analysis or information. You should independently verify all information contained on this website. Some information is based on analysis of past performance or hypothetical performance results, which have inherent limitations. We make no representation that any particular equity or strategy will or is likely to achieve profits or losses similar to those shown. Shareholders, employees, writers, contractors, and affiliates associated with ETFOptimize.com may have ownership positions in the securities that are mentioned. If you are not sure if ETFs, algorithmic investing, or a particular investment is right for you, you are urged to consult with a Registered Investment Advisor (RIA). Neither this website nor anyone associated with producing its content are Registered Investment Advisors, and no attempt is made herein to substitute for personalized, professional investment advice. Neither ETFOptimize.com, Global Alpha Investments, Inc., nor its employees, service providers, associates, or affiliates are responsible for any investment losses you may incur as a result of using the information provided herein. Remember that past investment returns may not be indicative of future returns.

Copyright © 1998-2017 ETFOptimize.com, a publication of Optimized Investments, Inc. All rights reserved.