AGGER

Agger is the only Made in Italy All-in-one cyber security platform for any type of device and operating system, which, thanks to its military-derived sophisticated artificial intelligence algorithms for supervision and automatic reaction purposes, can prevent, identify, and automatically manage every IT threat and anomaly, no matter the time of day, to maximise IT/OT resilience.

TRANSPARENCY

Full transparency of the active rules and coverage data: the client is provided with clear Agger security rules, and this transparency allows the same to define custom response rules.

CUSTOMIZATION

In addition to the set of system-predefined rules, Agger
provides the option to
customise the automatic response actions during the setup phase, even at agent
level, to make the response
consistent with the typical nature of the network and the sector to which it belongs

AUTONOMIA
e 24/7

• Detection
Endpoint-Network e device OT

• Orchestration
integration with pre-existing
systems

• Reaction
Automatic and customisable

• Investigation
NIS and ACN compliance

ALL IN ONE

Our platform lets the client cover all their corporate security assets without having to integrate different technologies.

• 24/7 uniform and constant detection

• Predefined automatic reactions based on the risk analysis

• Reduced operational costs by replacing the use of highly skilled experts

Despite Agger being an all-in-one system, we are fully aware of the fact that companies are usually already organised and have purchased and implemented third-party systems to protect themselves. Agger, therefore, can also be integrated with existing systems, , e.g. SIEM, by collecting data through the agents and probes, or even integrated with other systems or products, such as SEM - SCADA client - SCADA servers and SOCs.

Some problems this Platform helps solve:

ERRORS AND
SLOWNESS

Incident detection and management is entrusted exclusively to human beings.
To support cyber experts, Agger checks, analyses and applies the reaction rules in zero time, thus resolving or mitigating the attack.

STAFF
SHORTAGE

With a system like Agger, in-house experts will be able to understand what happened, which rules have been applied and use the logs to check for any other anomalies to implement further activities within the infrastructure or correct its weaknesses.

COMPLIANCE

Our flexible solution can support any legacy system – protecting those systems, as is often the case for the biomedical sector, which cannot be updated at the risk of losing compliance.

LEGACY

Agger can support any Legacy system at OT level: we currently support Windows, Linux and MacOS systems. We also develop agents and connection interfaces for specific needs.

AN ALL-IN-ONE PLATFORM

Our ALL-IN-ONE platform covers all of a client's corporate security assets without having to integrate different technologies from the various vendors, and can also be integrated with existing technologies, allowing for further security enhancement.

DETECTION

It uses Artificial Intelligence algorithms to detect behavioral anomalies in processes and network traffic, by means of agents and probes.

ORCHESTRATION

It continuously analyses the status and configuration of each of the IT/OT infrastructure's clients, servers and devices, and applies detection and reaction rules both globally and for each individual endpoint

REACTION

Automatically apply real-time counterattack actions based on its infrastructure knowledge and the services it provides. Reactions can be customised by the client.

INVESTIGATION

Collects and synthesises information on the behaviour of the monitored infrastructure, which is then made available for
post-analysis by experts.

Want more info?

MARKETS

We chose the following markets after carefully researching the problems frequently encountered by these sectors. We quickly realised that maximising resilience to their infrastructure was vital. We have therefore transformed our experience in the military field into Agger; a stable, high-performing solution made available to companies.

One platform: 5 modules

We do this through agents, available for all operating systems, which are powered by Machine Learning algorithms to create maps that describe the systems' normal behaviour. As a result, we can detect any anomaly or potential security incident and automatically perform the most appropriate actions to contain the incident.

The NSA module monitors and analyses all IT and OT network traffic from layers 2 to 7 of the ISO/OSI stack. It uses machine learning algorithms to create behavioural models which allow for any type of potential anomaly to be detected.

The Risk Management module, on the other hand, can be used to create a formal description of the IT and OT infrastructure, calculate the impact on services based on the probability and extent of the impact of each potential threat and, finally, define the risk mitigation plan by assessing its effectiveness.

This function is used to collect, filter and analyse all events generated by Agger modules to help understand their correlations and, if necessary, generate alerts that the Agger server uses to implement further reactions.

We boast a dedicated OT Defence module, i.e. a specific security system
for OT infrastructures which remotely controls the availability and integrity of the PLCs and is able to restore them by reloading their original software
and configuration.
As far as the probe level is concerned, we work at the level of the Standard 3 layer IT network.

We do this through agents, available for all operating systems, which are powered by Machine Learning algorithms to create maps that describe the systems' normal behaviour. As a result, we can detect any anomaly or potential security incident and automatically perform the most appropriate actions to contain the incident.

The NSA module monitors and analyses all IT and OT network traffic from layers 2 to 7 of the ISO/OSI stack. It uses machine learning algorithms to create behavioural models which allow for any type of potential anomaly to be detected.

The Risk Management module can be used to create a formal description of the IT and OT infrastructure, calculate the impact on services based on the probability and extent of the impact of each potential threat and, finally, define the risk mitigation plan by assessing its effectiveness.

This function is used to collect, filter and analyse all events generated by Agger modules to help understand their correlations and, if necessary, generate alerts that the Agger server uses to implement further reactions.

We boast a dedicated OT Defence module, i.e. a specific security system for OT infrastructures which remotely controls the availability and integrity of the PLCs and is able to restore them by reloading their original software and configurations.
As far as the probe level is concerned, we work at the level of the Standard 3 layer IT network.