ULTIME NEWS: Gyala riconosciuta Sample Vendor nel documento “Emerging Tech: AI in CPS Security” di Gartner Leggi

Why Choose Agger Naval Cyber Resilience?

Contesto

The technological integration on modern ships resembles that of a floating smart city.
The obsolescence of onboard IT and automation systems (OT), combined with interconnection through satellite and terrestrial networks, creates fertile ground for hacker attacks that can compromise the entire ship, jeopardizing its physical safety, cargo, and the logical security of information.

Obiettivo
  • Ensure the resilience and operability of ships, avoiding, among other consequences, downtime costs.
  • Achieve compliance with IACS UR-E26 and UR-E27 standards for the cyber resilience of ships and onboard systems.
Why Choose Us

Agger was developed for naval protection, granting us deep expertise in IT/OT/IoT infrastructures.
It is fully compatible with OT onboard systems for monitoring and, in authorized cases, reaction. It utilizes minimal satellite bandwidth for remote management, supports local operations, and enables centralized fleet management. With the ability to autonomously perform detection and reaction in 0 seconds, 24/7, it addresses the lack of cybersecurity specialists onboard while supporting those already present.

Uniqueness

We automate Detection and Reaction processes at individual agents/endpoints, ensuring the ship’s resilience.

Compliance

Enabling technology for compliance with UR-E26 (Cyber Resilience of Ships) and UR-E27 (Cyber Resilience of On-Board Systems and Equipment) standards, defined by the International Association of Classification Societies (IACS).
Agger is also compliant with AgID, GDPR, NIS, ACN, and NIS2.

Our Approach

Our experts assess the infrastructures to be protected and their operational logic, install agents or probes, and, where installation is not possible, operate in agentless mode. We collaborate with the technical manager to define reaction rules and train personnel for operational autonomy.

What Sets Us Apart
Detection
Customizable

Customizable Detection & Reaction rules for each IT endpoint or OT device, with full support for all systems, including legacy ones.

AI
AI

AI algorithms derived from military technology, supporting innovative solutions.

Threat
Threat Intelligence

One of the most extensive Threat Intelligence systems available on the market.

Integrabile
Integration

Fully integrable with other cybersecurity solutions.

supporto on premise
Support on premise

Installation options include on-premise, segregated networks, or cloud deployment.

legacy small
Legacy

Full support for all systems, including legacy ones.

Active or passive OT monitoring mode

To ensure a complete monitoring of OT infrastructures, Agger offers two types of monitoring modes: active or passive, which allow detailed information on the behaviour and safety of devices, Providing advanced protection without compromising the device’s operations.

Find out more