ULTIME NEWS: Gyala riconosciuta Sample Vendor nel documento “Emerging Tech: AI in CPS Security” di Gartner Leggi

Technology

Cyber Physical Security (CPS)

Thanks to its ability to meet the security needs of complex and critical OT/IoT infrastructures and ensure the security of CPS through sophisticated AI algorithms derived from military applications, Gyala has been recognized as a Sample Vendor in Gartner’s report “Emerging Tech: AI in CPS Security.”

Agger technology includes a protection system specifically designed for OT infrastructures, which remotely monitors the availability and integrity of PLCs and can restore them by reloading the original software and configurations.
Depending on the OT device to be protected, we can operate in active or passive mode.

Technology
OT monitoring modality

Depending on the OT apparatus to be monitored, we can operate in active or passive mode

Passive Monitoring

Based on network traffic duplication and interception, this approach gathers information on the behavior, performance, and security of OT devices. It collects and analyzes the network communications of an OT system or device without interfering with its normal operation.

The Agger Network Security module of our solution can decode hundreds of standard OT protocols (e.g., S7, MMS, DNP3, OPC, MODBUS, PROFINET) and can be extended with custom plugins for proprietary protocols.

Active Monitoring

This approach involves direct interaction with the OT device using the interfaces and protocols it exposes on the network. By obtaining more detailed information, it can detect potential alterations to internal configurations made directly on the physical device.

The Agger OT Defence module actively queries connected OT devices over the network, sending periodic requests using standard protocols (e.g., S7, MMS, SNMP) and can be extended with custom plugins for proprietary protocols.

Technology

Extended Detection & Response

AGGER is much more than an XDR.

Agger leverages sophisticated and unique Machine Learning algorithms to create maps that describe normal system behavior. Its distinctive feature lies in combining detection, identification, and threat response capabilities (average reaction time: 0 seconds) with the unique ability to customize detection and reaction rules for each device/endpoint.

The solution is supported by the most extensive Threat Intelligence available on the market, integrating data from 72 of the most well-known antivirus programs.

Technology

Network Security

Agger monitors and analyzes all IT and OT network traffic from layer 2 to layer 7 of the ISO/OSI stack, detecting any potential anomaly using machine learning algorithms to create reference behavioral models.

TECNOLOGIA

Risk management

Agger creates a formal description of the IT/OT/IoT infrastructure, calculates the impact on services based on the likelihood and scope of potential threats, and defines a risk mitigation plan, evaluating its effectiveness.