AGGER
Agger is the only Made in Italy All-in-one cyber security platform for any type of device and operating system, which, thanks to its military-derived sophisticated artificial intelligence algorithms for supervision and automatic reaction purposes, can prevent, identify, and automatically manage every IT threat and anomaly, no matter the time of day, to maximise IT/OT resilience.

TRANSPARENCY
Full transparency of the active rules and coverage data: the client is provided with clear Agger security rules, and this transparency allows the same to define custom response rules.
CUSTOMIZATION
In addition to the set of system-predefined rules, Agger
provides the option to
customise the automatic response actions during the setup phase, even at agent
level, to make the response
consistent with the typical
nature of the network and the sector to which it belongs
AUTONOMIA
e 24/7
• Detection
Endpoint-Network e device OT
• Orchestration
integration with pre-existing
systems
• Reaction
Automatic and customisable
• Investigation
NIS and ACN compliance
ALL IN ONE
Our platform lets the client cover all their corporate security assets without having to integrate different technologies.
• 24/7 uniform and constant detection
• Predefined automatic reactions based on the risk analysis
• Reduced operational costs by replacing the use of highly skilled experts
Despite Agger being an all-in-one system, we are fully aware of the fact that companies are usually already organised and have purchased and implemented third-party systems to protect themselves. Agger, therefore, can also be integrated with existing systems, , e.g. SIEM, by collecting data through the agents and probes, or even integrated with other systems or products, such as SEM - SCADA client - SCADA servers and SOCs.
Some problems this Platform helps solve:

ERRORS AND
SLOWNESS
Incident detection and management is entrusted exclusively to human beings.
To support cyber experts, Agger checks, analyses and applies the reaction rules in zero time, thus resolving or mitigating the attack.

STAFF
SHORTAGE
With a system like Agger, in-house experts will be able to understand what happened, which rules have been applied and use the logs to check for any other anomalies to implement further activities within the infrastructure or correct its weaknesses.

COMPLIANCE
Our flexible solution can support any legacy system – protecting those systems, as is often the case for the biomedical sector, which cannot be updated at the risk of losing compliance.

LEGACY
Agger can support any Legacy system at OT level: we currently support Windows, Linux and MacOS systems. We also develop agents and connection interfaces for specific needs.
AN ALL-IN-ONE PLATFORM
Our ALL-IN-ONE platform covers all of a client's corporate security assets without having to integrate different technologies from the various vendors, and can also be integrated with existing technologies, allowing for further security enhancement.
DETECTION
It uses Artificial Intelligence algorithms to detect behavioral anomalies in processes and network traffic, by means of agents and probes.
ORCHESTRATION
It continuously analyses the status and configuration of each of the IT/OT infrastructure's clients, servers and devices, and applies detection and reaction rules both globally and for each individual endpoint
REACTION
Automatically apply real-time counterattack actions based on its infrastructure knowledge and the services it provides. Reactions can be customised by the client.
INVESTIGATION
Collects and synthesises information on the behaviour of the monitored infrastructure, which is then made available for
post-analysis by experts.
Want more info?
MARKETS
We chose the following markets after carefully researching the problems frequently encountered by these sectors. We quickly realised that maximising resilience to their infrastructure was vital. We have therefore transformed our experience in the military field into Agger; a stable, high-performing solution made available to companies.

Automation

Defense

Energy

Enterprise

Naval

Healthcare
One platform: 5 modules
- 1. ENDPOINT DETECTION AND RESPONSE
- 2. NETWORK SECURITY APPLIANCE
- 3. RISK MANAGEMENT TOOL
- 4. CORRELATION MODULE
- 5. OT DEFENCE
We do this through agents, available for all operating systems, which are powered by Machine Learning algorithms to create maps that describe the systems' normal behaviour. As a result, we can detect any anomaly or potential security incident and automatically perform the most appropriate actions to contain the incident.
The NSA module monitors and analyses all IT and OT network traffic from layers 2 to 7 of the ISO/OSI stack. It uses machine learning algorithms to create behavioural models which allow for any type of potential anomaly to be detected.
The Risk Management module, on the other hand, can be used to create a formal description of the IT and OT infrastructure, calculate the impact on services based on the probability and extent of the impact of each potential threat and, finally, define the risk mitigation plan by assessing its effectiveness.
This function is used to collect, filter and analyse all events generated by Agger modules to help understand their correlations and, if necessary, generate alerts that the Agger server uses to implement further reactions.
We boast a dedicated OT Defence module, i.e. a specific security system
for OT infrastructures which remotely controls the availability and integrity of the PLCs and is able to restore them by reloading their original software
and configuration.
As far as the probe level is concerned, we work at the level of the Standard 3 layer IT network.
- 1. ENDPOINT DETECTION AND RESPONSE
- 2. NETWORK SECURITY APPLIANCE
- 3. RISK MANAGEMENT TOOL
- 4. CORRELATION MODULE
- 5. OT DEFENCE
We do this through agents, available for all operating systems, which are powered by Machine Learning algorithms to create maps that describe the systems' normal behaviour. As a result, we can detect any anomaly or potential security incident and automatically perform the most appropriate actions to contain the incident.
The NSA module monitors and analyses all IT and OT network traffic from layers 2 to 7 of the ISO/OSI stack. It uses machine learning algorithms to create behavioural models which allow for any type of potential anomaly to be detected.
The Risk Management module can be used to create a formal description of the IT and OT infrastructure, calculate the impact on services based on the probability and extent of the impact of each potential threat and, finally, define the risk mitigation plan by assessing its effectiveness.
This function is used to collect, filter and analyse all events generated by Agger modules to help understand their correlations and, if necessary, generate alerts that the Agger server uses to implement further reactions.
We boast a dedicated OT Defence module, i.e. a specific security system for OT infrastructures which remotely controls the availability and integrity of the PLCs and is able to restore them by reloading their original software and configurations.
As far as the probe level is concerned, we work at the level of the Standard 3 layer IT network.