ULTIME NEWS: Gyala riconosciuta Sample Vendor nel documento “Emerging Tech: AI in CPS Security” di Gartner Leggi

Reacting in Zero Seconds: Automated Intelligence at the Core of the cyber defence

In the world of critical infrastructures, every second counts.

Gyala’s Italian approach with the Agger platform introduces a technological breakthrough that challenges traditional IT/OT security models.

Waiting for an alert to respond is no longer effective, and manually analyzing every log, packet, or suspicious activity is no longer sustainable. We live in an era of hybrid warfare and silent attacks, where an effective response must occur long before human reaction.
This is the principle behind Agger, the cybersecurity platform – made in Italy and designed by Gyala – that can see, decide, and act autonomously faster than any analyst ever could.
But this is not just a technical achievement; it is a new strategic vision where IT/OT resilience becomes imperative, along with digital sovereignty.

The Context: New Threats, Legacy Architectures

As the concept of “critical infrastructure” expands to include everything that can threaten a nation’s well-being, the truth remains that most digital systems supporting energy, water, transport, healthcare, and defense are still based on legacy architectures.
These systems are robust, but were built in an era when network connectivity was the exception, not the rule.
The shift to IT – and later to the cloud – has dramatically widened the attack surface of OT environments. The problem is not just exposure, but also the lack or inadequacy of responses: too slow, overly standardized (and often impractical), or even dangerous.


The IT/OT Challenge: An Inevitable, Yet Incomplete Union

The convergence of IT and OT is not an academic topic; it’s an operational necessity. From healthcare to manufacturing, from water networks to power plants, the interconnection between information systems and industrial devices is a reality.
However, most cybersecurity solutions still treat IT and OT as two separate worlds, each with different metrics, protocols, timing, and priorities. This creates gray areas, protection gaps, and no defense against lateral movements. This is exactly where Agger steps in with a radical vision: to treat the entire ecosystem as a single, connected, and interoperable system.


Digital Sovereignty: A Strategic, Not Ideological Matter

Control over data and cyber response is not just a matter of privacy—it is national strategy. In a world where even security technologies can be affected by geopolitical interference, using solutions developed and managed abroad becomes a risk.


Our cyber security product, Agger, is Italy’s answer to this challenge.
Entirely developed in Italy, without foreign code and with Italian personnel, it is already deployed in sectors ranging from defense to healthcare, naval, industrial, banking, public administration, and utilities.


Agger:
A Modular System That Integrates

  • Endpoint Detection and Response & OT Defence
  • Network Security
  • Risk Management
  • Correlation

All powered by military-grade artificial intelligence capable of dynamically modeling behavior, detecting anomalies in real time, and autonomously responding.
The result? Zero seconds of latency between threat detection and its neutralization.


Distributed Intelligence: Every Agger Agent Is a Thinking Sentinel
One of Agger’s most revolutionary features is its ability to push intelligence to the network’s edge.
It’s not just the central server making decisions—each Agger agent, installed on endpoints or operating agentless on OT devices, can:

  • detect suspicious behaviors,
  • apply custom rules,
  • communicate with other agents,
  • activate countermeasures without waiting for central instructions.

This enables decentralized reactivity, which is crucial in environments where every second lost can lead to serious damage or service disruption.


Healthcare, Energy, Water: Where Agger Makes a Difference
Agger is already operational in critical environments such as:

  • Hospitals and local health authorities, protecting non-upgradable biomedical devices without compromising certifications.
  • Power plants and smart grids, analyzing OT traffic in real time and responding even in air-gapped environments.
  • Water utilities, integrating security with environmental sustainability by supporting consumption management and service continuity.

These sectors cannot afford delays or unnecessary complexity. Agger delivers transparent, automated, and customizable cyber defense.


Lightening the Load, Increasing Value: Real Support for Experts
Compared to traditional models, Agger offers another strategic advantage: it doesn’t replace human experts—it empowers them.
By relieving cybersecurity personnel of repetitive tasks, it allows them to focus on:

  • strategic analysis,
  • threat intelligence,intelligence,
  • rule enhancement,
  • training.

This translates into up to 80% lower management costs, as shown by operational data from real-world deployments.


No Infrastructure Left Behind: Legacy, Cloud, On-Prem, Segregated Networks
Agger is designed to adapt to any environment:

  • Legacy systems (even Windows XP),
  • Cloud, on-prem, and hybrid infrastructures,
  • Non-virtualizable and isolated OT networks.

Even where agent installation is not possible, Agger operates passively and actively in agentless mode, querying OT devices directly using industrial protocols (S7, OPC, Modbus, etc.).


In Conclusion:
Digital transformation requires solid foundations.
Agger is not a security upgrade—it is a paradigm shift, blending automated intelligence, operational flexibility, and technological sovereignty.
Because in a world where every millisecond counts, we can no longer afford to think before we react.