AGGER

Agger is the only Made in Italy All-in-one cyber security platform for any type of device and operating system, which, thanks to its military-derived sophisticated artificial intelligence algorithms for supervision and automatic reaction purposes, can prevent, identify, and automatically manage every IT threat and anomaly, no matter the time of day, to maximise IT/OT resilience.

TRANSPARENCY

Full transparency of the active rules and coverage data: the client is provided with clear Agger security rules, and this transparency allows the same to define custom response rules.

CUSTOMIZATION

In addition to the set of system-predefined rules, Agger
provides the option to
customise the automatic response actions during the setup phase, even at agent
level, to make the response
consistent with the typical nature of the network and the sector to which it belongs

AUTONOMIA
e 24/7

• Detection
Endpoint-Network e device OT

• Orchestration
integration with pre-existing
systems

• Reaction
Automatic and customisable

• Investigation
NIS and ACN compliance

ALL IN ONE

Our platform lets the client cover all their corporate security assets without having to integrate different technologies.

• 24/7 uniform and constant detection

• Predefined automatic reactions based on the risk analysis

• Reduced operational costs by replacing the use of highly skilled experts

Despite Agger being an all-in-one system, we are fully aware of the fact that companies are usually already organised and have purchased and implemented third-party systems to protect themselves. Agger, therefore, can also be integrated with existing systems, , e.g. SIEM, by collecting data through the agents and probes, or even integrated with other systems or products, such as SEM - SCADA client - SCADA servers and SOCs.

Some problems this Platform helps solve:

ERRORS AND
SLOWNESS

Incident detection and management is entrusted exclusively to human beings.
To support cyber experts, Agger checks, analyses and applies the reaction rules in zero time, thus resolving or mitigating the attack.

STAFF
SHORTAGE

With a system like Agger, in-house experts will be able to understand what happened, which rules have been applied and use the logs to check for any other anomalies to implement further activities within the infrastructure or correct its weaknesses.

COMPLIANCE

Our flexible solution can support any legacy system – protecting those systems, as is often the case for the biomedical sector, which cannot be updated at the risk of losing compliance.

LEGACY

Agger can support any Legacy system at OT level: we currently support Windows, Linux and MacOS systems. We also develop agents and connection interfaces for specific needs.

AN ALL-IN-ONE PLATFORM

Our ALL-IN-ONE platform covers all of a client's corporate security assets without having to integrate different technologies from the various vendors, and can also be integrated with existing technologies, allowing for further security enhancement.

DETECTION

It uses Artificial Intelligence algorithms to detect behavioral anomalies in processes and network traffic, by means of agents and probes.

ORCHESTRATION

It continuously analyses the status and configuration of each of the IT/OT infrastructure's clients, servers and devices, and applies detection and reaction rules both globally and for each individual endpoint

REACTION

Automatically apply real-time counterattack actions based on its infrastructure knowledge and the services it provides. Reactions can be customised by the client.

INVESTIGATION

Collects and synthesises information on the behaviour of the monitored infrastructure, which is then made available for
post-analysis by experts.

Want more info?

MARKETS

We chose the following markets after carefully researching the problems frequently encountered by these sectors. We quickly realised that maximising resilience to their infrastructure was vital. We have therefore transformed our experience in the military field into Agger; a stable, high-performing solution made available to companies.

One platform: 5 modules

Lo facciamo attraverso gli agent, disponibili per tutti i sistemi operativi, che sono potenziati da algoritmi di Machine Learning per creare mappe che descrivono il comportamento normale dei sistemi. Grazie a questo siamo in grado di rilevare qualsiasi anomalia o potenziale incidente di sicurezza e eseguire automaticamente tutte le azioni più appropriate per contenere l’incidente.

The NSA module monitors and analyses all IT and OT network traffic from layers 2 to 7 of the ISO/OSI stack. It uses machine learning algorithms to create behavioural models which allow for any type of potential anomaly to be detected.

Il modulo Risk Management permette di creare una descrizione formale dell’infrastruttura IT e OT, di calcolare l’impatto sui servizi in base alla probabilità e alla portata dell’impatto di ogni potenziale minaccia e, infine, di definire il piano di mitigazione del rischio valutandone l’efficacia.

This function is used to collect, filter and analyse all events generated by Agger modules to help understand their correlations and, if necessary, generate alerts that the Agger server uses to implement further reactions.

We boast a dedicated OT Defence module, i.e. a specific security system
protezione specifico per le infrastrutture OT che controlla da remoto la disponibilità e l’integrità dei PLC ed è in grado di ripristinarli ricaricandone
and configuration.
As far as the probe level is concerned, we work at the level of the Standard 3 layer IT network.

Lo facciamo attraverso gli agent ,disponibili per tutti i sistemi operativi, che sono potenziati da algoritmi di Machine Learning per creare mappe che descrivono il comportamento normale dei sistemi. Grazie a questo siamo in grado di  rilevare qualsiasi anomalia o potenziale incidente di sicurezza ed eseguire automaticamente tutte le azioni più appropriate per contenere l’incidente.

The NSA module monitors and analyses all IT and OT network traffic from layers 2 to 7 of the ISO/OSI stack. It uses machine learning algorithms to create behavioural models which allow for any type of potential anomaly to be detected.

Il modulo Risk Management permette, invece,  di creare una descrizione formale dell’infrastruttura IT e OT, di calcolare l’impatto sui servizi in base alla probabilità e alla portata dell’impatto di ogni potenziale minaccia e, infine, di definire il piano di mitigazione del rischio valutandone l’efficacia.

This function is used to collect, filter and analyse all events generated by Agger modules to help understand their correlations and, if necessary, generate alerts that the Agger server uses to implement further reactions.

Abbiamo un modulo dedicato all’OT Defence. Ovvero un sistema di protezione specifico per le infrastrutture OT che controlla da remoto la disponibilità e l’integrità dei PLC ed è in grado di ripristinarli ricaricandone il software e le configurazioni originali.
As far as the probe level is concerned, we work at the level of the Standard 3 layer IT network.