Aviation Cyber Security

As modern aircraft become increasingly connected, they become more vulnerable to cyber attacks. Today’s modern, e-enabled aircraft come with advanced Ethernet and CAN-based network architectures which drive business but subject airlines and passengers to cyber risks. Argus helps commercial aviation companies to prevent, understand and respond to cyber attacks on connected aircraft.


Make it as hard as possible to penetrate the aircraft with multi-layered cyber security solutions starting with the weakest points on the attack surface of a commercial airliner, the cabin IFE and connectivity systems.


Detect attacks and determine their nature and impact through big data analysis and forensics tools.


Reduce time to mitigation through a security operation center (SOC) built to provide situational awareness of the connected aircraft fleet’s cyber health.


Argus Aircraft Fleet Protection

Argus Aircraft Fleet Protection provides airline security operations centers (SOCs) with the unprecedented ability to monitor aircraft networks, receive detailed alerts of abnormal behavior and start the mitigation process with dedicated tools and procedures using an intuitive and easy-to-use dashboard.

Learn more

Argus IFEC Protection

Argus In-Flight Entertainment and Connectivity (IFEC) Protection defends the cabin’s IFEC systems from internal and external threats, and stops attacks from spreading to the cabin management system or other critical systems.

Learn more

Argus Professional Services

Argus Professional Services enhance usability, functionality, and value for airlines that use the Argus Fleet Protection System and for OEMs. With unparalleled experience in the analysis and monitoring of security logs, we can provide airlines with forensic analysis and mitigation of AC cyber incidents. For OEMs, our team can increase the availability and usefulness of their systems’ security logs. Argus Professional Services add value to these organizations’ investment in Argus Fleet Protection and help them more rapidly identify cyber threats, pinpoint vulnerabilities, and mitigate risk.

Learn more