Custom Solution

Argus

Beyond monitoring. Complete cyber defence.

SIEM, GRC, AI-powered threat analysis, Security Awareness Training, Phishing Simulation, Penetration Testing management, and Network Monitoring — unified in one platform. Named after Argus Panoptes, the all-seeing guardian, Argus gives you complete visibility across your entire security landscape with multi-platform agents for every device in your organisation.

At a Glance

526+
API Endpoints
5
Platform Agents
ISO 27001
Ready
AI
Powered

One Platform, Complete Security

Organisations juggle multiple disconnected security tools — each with its own dashboard, licensing, and integration headaches. Critical gaps appear between systems, and the true security posture remains invisible.

Tool Sprawl

SIEM from one vendor, GRC from another, awareness training from a third, phishing simulation from a fourth. Each tool solves one piece of the puzzle while creating integration overhead and blind spots between systems.

No Unified View

When compliance tracking doesn't connect to endpoint monitoring, and threat intelligence doesn't inform training priorities, you're flying blind. Security decisions are made on incomplete data.

Argus: Everything Unified

One platform that combines SIEM, GRC, AI analysis, security training, phishing simulation, penetration testing, and network monitoring. Every module shares data, every insight informs every other — complete visibility from a single pane of glass.

Security Information & Event Management

Multi-source log aggregation, real-time event correlation, and automated alerting. From syslog ingestion to active response — your security events, centralised and actionable.

Log Aggregation

Collect logs via Syslog UDP/TCP from any device or application. Parse, normalise, and store events for real-time analysis and historical investigation. Scale to thousands of events per minute.

Alert Rules

Define custom alert rules with configurable thresholds, severity levels, and notification channels. Detect failed login patterns, service changes, firewall modifications, and anomalous behaviour automatically.

Active Response

Automated response actions triggered by alert conditions. From notifications to script execution, Argus can respond to threats in real time without waiting for human intervention.

Daily Statistics

Automated daily aggregation of security events with trending analysis. Track patterns over time, identify recurring issues, and measure security posture improvement through comprehensive reporting.

Complete Endpoint Visibility

Native agents for every major platform — Windows, macOS, Linux, iOS, and Android. Each agent collects comprehensive telemetry while maintaining minimal resource footprint.

Desktop & Server

Windows, macOS & Linux Agents

Purpose-built native agents for each platform. The Windows agent (.NET 8) provides the deepest telemetry — system info, services, firewall, antivirus status, software inventory, compliance checks, SMART monitoring, and more. macOS (Swift) and Linux (Python) agents deliver platform-appropriate monitoring.

  • Windows: .NET 8 Windows Service (~50-80 MB RAM)
  • macOS: Native Swift agent
  • Linux: Python 3.x daemon
  • 5-minute heartbeat interval
  • Circuit breaker prevents server flooding
  • Automatic registration on first run

Mobile

iOS & Android Agents

Extend visibility to mobile devices with native agents. Monitor device status, enforce compliance policies, and maintain inventory — complementing MDM solutions like Microsoft Intune for complete device management.

  • iOS: Native Swift agent
  • Android: Native Kotlin agent
  • Device status monitoring
  • Compliance policy enforcement
  • Integration with Intune MDM
  • Lightweight with minimal battery impact

Governance, Risk & Compliance

ISO 27001:2022 framework with 93 controls pre-mapped. Manage your ISMS documents, track compliance baselines, generate reports, and maintain a complete audit trail — all integrated with your endpoint data.

ISO 27001:2022 Framework

93 controls from Annex A pre-mapped and ready to assess. Track implementation status, assign ownership, and monitor compliance progress across your entire organisation with real-time scoring.

ISMS Document Management

Complete document lifecycle management — creation, review, approval, and version control. Maintain your Information Security Management System documentation with full audit trail and approval workflows.

Compliance Reporting

Generate compliance reports in PDF and CSV format. Track compliance baselines per endpoint, visualise your compliance matrix, and capture point-in-time snapshots for auditors and stakeholders.

Intelligent Threat Detection

Claude-powered AI analysis integrated directly into your security workflow. From threat classification to executive summaries — AI that understands your security context.

Threat Analysis

AI-powered classification of security events, vulnerabilities, and alerts. Move beyond rule-based detection to contextual understanding of threats, with severity assessment and recommended response actions.

Compliance Gap Analysis

Automated analysis of your compliance posture against ISO 27001 and other frameworks. AI identifies gaps, suggests remediation priorities, and generates actionable improvement plans.

Natural Language Queries

Ask questions about your security posture in plain language. 'What are our highest risk endpoints?' 'Which departments have the most failed phishing tests?' Get instant, data-driven answers.

Educate Your Workforce

Built-in course management with pre-built security awareness content, quizzes, department-based assignments, and PDF certificate generation. No separate SAT subscription required.

1

Create

Build courses with modules covering phishing awareness, password security, social engineering defence, and more. Include multiple choice and true/false quizzes to verify comprehension.

2

Assign

Enrol employees individually or by department. Set deadlines, track enrolment status, and send reminders. Mandatory assignments ensure organisation-wide coverage.

3

Track

Monitor completion rates, quiz scores, and progress across the organisation. Identify departments or individuals who need additional attention. Full reporting for compliance evidence.

4

Certify

Generate PDF certificates upon course completion. Maintain training records for audit purposes. Demonstrate compliance with security awareness requirements to auditors and regulators.

Test Your Human Firewall

Launch realistic phishing campaigns, track who clicks, who reports, and who needs additional training. Automatic enrolment in awareness courses for employees who fail — closing the loop between testing and education.

Campaign Management

Create and schedule phishing campaigns with customisable email templates. Import targets via CSV, define sending schedules, and track every interaction — opens, clicks, and credential submissions.

Click & Report Tracking

Tracking pixels detect email opens. Link tracking captures clicks and form submissions. A built-in reporting mechanism lets employees flag suspicious emails — rewarding vigilance and measuring security culture.

Auto-Remediation

Employees who fall for simulated phishing are automatically enrolled in targeted training courses. Repeat offender identification helps focus resources where they're needed most. Close the loop between testing and education.

Managed Pentest Workflows

Structured penetration testing management with authorisation workflows, scope definition, distributed probes, and findings tracking. From request to remediation — every step documented.

Authorisation & Scope

Formal authorisation request and approval workflow. Define scope, timeline, and rules of engagement. Maintain a complete audit trail from initial request through executive sign-off.

Scan Execution

Deploy distributed probes for network scanning and service discovery. Quick, Standard, and Full scan types. Phase-based testing methodology with structured findings entry and severity classification.

Findings Management

Document vulnerabilities with severity ratings, affected assets, evidence, and remediation recommendations. Track remediation status through to resolution and verification.

Reporting

Generate comprehensive penetration testing reports. Executive summaries, technical details, remediation timelines, and compliance impact — ready for stakeholders at every level.

Beyond Endpoints

SNMP network monitoring, Microsoft Intune MDM integration, and IP camera management. Extend visibility beyond traditional endpoints to your entire infrastructure.

Network

SNMP & Network Monitoring

Discover and monitor network devices via SNMP v1/v2c/v3. Track interface metrics, handle SNMP traps, and visualise your network topology with interactive diagrams and group-based organisation.

  • SNMP v1/v2c/v3 device discovery
  • Interface monitoring and metrics
  • SNMP trap handling
  • Network topology visualisation
  • Interactive node and edge diagrams
  • Group-based device organisation

Devices

MDM & Camera Integration

Integrate with Microsoft Intune for mobile device management — compliance policies, app inventory, and device status. ONVIF integration for IP camera discovery, stream management, and status monitoring.

  • Microsoft Intune REST API integration
  • iOS and Android device management
  • Compliance policy enforcement
  • ONVIF IP camera discovery
  • Stream management and monitoring
  • Unified device inventory

Built for Service Providers

Complete tenant isolation with per-tenant user management, configuration, and dashboards. Ideal for MSSPs, IT consultancies, and organisations managing security for multiple entities.

Tenant Isolation

Complete data segregation between tenants. Each tenant has its own users, settings, endpoints, alerts, and compliance data. No cross-tenant data leakage — ever.

Per-Tenant Management

Individual dashboards, statistics, and reporting for each tenant. Manage multiple client environments from a single Argus instance while maintaining strict isolation and independent configuration.

Enterprise-Grade Security

Multi-factor authentication, role-based access control, encrypted agent communication, and complete audit logging. Security built into every layer.

Authentication

Access Control & MFA

User authentication with MFA support via TOTP. Role-based access control ensures users see only what they need. Session management with configurable timeout. API key authentication for agent communication.

  • MFA via TOTP (authenticator apps)
  • Role-based access control (RBAC)
  • Session management and timeout
  • Login attempt monitoring
  • API key authentication for agents

Infrastructure

Secure by Design

Encrypted credential storage for agents, HTTPS with certificate validation, and Traefik SSL/TLS termination. Every agent runs as a system service with circuit breaker protection against network issues.

  • Encrypted credential storage
  • HTTPS with cert validation
  • Traefik SSL/TLS termination
  • Circuit breaker on all agents
  • Configurable communication ports

Technical Foundation

526+ API endpoints across 50 route modules. 49 data models, 47 frontend pages, 33 backend services. A production-grade platform built for scale.

FastAPI

Async Backend

React 18

Frontend UI

PostgreSQL 16

Database

.NET 8

Windows Agent

Docker

Deployment

Connect Everything

From Microsoft Intune to MITRE ATT&CK, Argus integrates with the tools and standards your security operations depend on.

Device & Network

Microsoft Intune REST API for MDM. SNMP v1/v2c/v3 for network devices. ONVIF/SOAP for IP cameras. Syslog UDP/TCP for log aggregation from any source.

Threat Intelligence

NVD/CVE databases for vulnerability data. MITRE ATT&CK framework mapping for threat classification. Anthropic Claude API for AI-powered analysis and natural language security queries.

Communication

SMTP for email notifications and phishing campaigns. Webhook support for custom integrations with ticketing systems, chat platforms, and automation tools. WordPress REST API for website monitoring.

Deployment Options

Single-server deployment handling 300+ endpoints. Your data stays on your infrastructure.

Option A

On-Premise

Deploy Argus on your own infrastructure with complete data sovereignty. A single Ubuntu server handles 300+ endpoints comfortably. Direct database access and full control over updates and configuration.

  • Ubuntu 24.04 recommended
  • 4GB+ RAM, 50GB+ disk
  • Single server for 300+ endpoints
  • Full data sovereignty
  • We provide installation support

Option B

Managed Deployment

We deploy, configure, and maintain everything. VPS provisioning, domain, SSL, agent distribution assistance, and ongoing support — focus on security operations while we handle the platform.

  • VPS, domain, SSL included
  • Agent distribution assistance
  • Automated backups
  • Regular updates and maintenance
  • Priority support

Consolidate Your Security Stack

Stop paying for — and integrating between — multiple disconnected tools. Argus replaces or augments the functionality of several product categories in one unified platform.

Security Monitoring

Replace standalone SIEM solutions with Argus's integrated event management. Log aggregation, correlation, alerting, and active response — connected directly to your endpoint data, compliance tracking, and threat intelligence.

GRC & Training

Replace separate GRC platforms and Security Awareness Training subscriptions. ISO 27001 compliance tracking, ISMS document management, and employee training — all sharing data and informing each other.

Testing & Simulation

Replace standalone phishing simulation tools and external penetration testing management platforms. Run campaigns, manage pentest workflows, and track remediation — all within the same platform your SOC team uses daily.

Pricing Structure

Argus pricing is based on the number of monitored endpoints, modules required, and deployment model. Volume discounts are available for larger deployments.

  • Base platform licence
  • Per-endpoint pricing for agents
  • Optional modules available separately
  • Annual maintenance and support
  • Volume discounts for 100+ endpoints

Contact us for a custom quote tailored to your organisation.

Request a Quote

Ready for complete cyber defence?

See how Argus can consolidate your security operations, eliminate tool sprawl, and give you complete visibility across your organisation — endpoints, network, compliance, and human risk — from a single platform.

Request a Demo Back to All Products