Argus
Beyond monitoring. Complete cyber defence.
SIEM, GRC, AI-powered threat analysis, Security Awareness Training, Phishing Simulation, Penetration Testing management, and Network Monitoring — unified in one platform. Named after Argus Panoptes, the all-seeing guardian, Argus gives you complete visibility across your entire security landscape with multi-platform agents for every device in your organisation.
At a Glance
One Platform, Complete Security
Organisations juggle multiple disconnected security tools — each with its own dashboard, licensing, and integration headaches. Critical gaps appear between systems, and the true security posture remains invisible.
Tool Sprawl
SIEM from one vendor, GRC from another, awareness training from a third, phishing simulation from a fourth. Each tool solves one piece of the puzzle while creating integration overhead and blind spots between systems.
No Unified View
When compliance tracking doesn't connect to endpoint monitoring, and threat intelligence doesn't inform training priorities, you're flying blind. Security decisions are made on incomplete data.
Argus: Everything Unified
One platform that combines SIEM, GRC, AI analysis, security training, phishing simulation, penetration testing, and network monitoring. Every module shares data, every insight informs every other — complete visibility from a single pane of glass.
Security Information & Event Management
Multi-source log aggregation, real-time event correlation, and automated alerting. From syslog ingestion to active response — your security events, centralised and actionable.
Log Aggregation
Collect logs via Syslog UDP/TCP from any device or application. Parse, normalise, and store events for real-time analysis and historical investigation. Scale to thousands of events per minute.
Alert Rules
Define custom alert rules with configurable thresholds, severity levels, and notification channels. Detect failed login patterns, service changes, firewall modifications, and anomalous behaviour automatically.
Active Response
Automated response actions triggered by alert conditions. From notifications to script execution, Argus can respond to threats in real time without waiting for human intervention.
Daily Statistics
Automated daily aggregation of security events with trending analysis. Track patterns over time, identify recurring issues, and measure security posture improvement through comprehensive reporting.
Complete Endpoint Visibility
Native agents for every major platform — Windows, macOS, Linux, iOS, and Android. Each agent collects comprehensive telemetry while maintaining minimal resource footprint.
Desktop & Server
Windows, macOS & Linux Agents
Purpose-built native agents for each platform. The Windows agent (.NET 8) provides the deepest telemetry — system info, services, firewall, antivirus status, software inventory, compliance checks, SMART monitoring, and more. macOS (Swift) and Linux (Python) agents deliver platform-appropriate monitoring.
- Windows: .NET 8 Windows Service (~50-80 MB RAM)
- macOS: Native Swift agent
- Linux: Python 3.x daemon
- 5-minute heartbeat interval
- Circuit breaker prevents server flooding
- Automatic registration on first run
Mobile
iOS & Android Agents
Extend visibility to mobile devices with native agents. Monitor device status, enforce compliance policies, and maintain inventory — complementing MDM solutions like Microsoft Intune for complete device management.
- iOS: Native Swift agent
- Android: Native Kotlin agent
- Device status monitoring
- Compliance policy enforcement
- Integration with Intune MDM
- Lightweight with minimal battery impact
Governance, Risk & Compliance
ISO 27001:2022 framework with 93 controls pre-mapped. Manage your ISMS documents, track compliance baselines, generate reports, and maintain a complete audit trail — all integrated with your endpoint data.
ISO 27001:2022 Framework
93 controls from Annex A pre-mapped and ready to assess. Track implementation status, assign ownership, and monitor compliance progress across your entire organisation with real-time scoring.
ISMS Document Management
Complete document lifecycle management — creation, review, approval, and version control. Maintain your Information Security Management System documentation with full audit trail and approval workflows.
Compliance Reporting
Generate compliance reports in PDF and CSV format. Track compliance baselines per endpoint, visualise your compliance matrix, and capture point-in-time snapshots for auditors and stakeholders.
Intelligent Threat Detection
Claude-powered AI analysis integrated directly into your security workflow. From threat classification to executive summaries — AI that understands your security context.
Threat Analysis
AI-powered classification of security events, vulnerabilities, and alerts. Move beyond rule-based detection to contextual understanding of threats, with severity assessment and recommended response actions.
Compliance Gap Analysis
Automated analysis of your compliance posture against ISO 27001 and other frameworks. AI identifies gaps, suggests remediation priorities, and generates actionable improvement plans.
Natural Language Queries
Ask questions about your security posture in plain language. 'What are our highest risk endpoints?' 'Which departments have the most failed phishing tests?' Get instant, data-driven answers.
Educate Your Workforce
Built-in course management with pre-built security awareness content, quizzes, department-based assignments, and PDF certificate generation. No separate SAT subscription required.
Create
Build courses with modules covering phishing awareness, password security, social engineering defence, and more. Include multiple choice and true/false quizzes to verify comprehension.
Assign
Enrol employees individually or by department. Set deadlines, track enrolment status, and send reminders. Mandatory assignments ensure organisation-wide coverage.
Track
Monitor completion rates, quiz scores, and progress across the organisation. Identify departments or individuals who need additional attention. Full reporting for compliance evidence.
Certify
Generate PDF certificates upon course completion. Maintain training records for audit purposes. Demonstrate compliance with security awareness requirements to auditors and regulators.
Test Your Human Firewall
Launch realistic phishing campaigns, track who clicks, who reports, and who needs additional training. Automatic enrolment in awareness courses for employees who fail — closing the loop between testing and education.
Campaign Management
Create and schedule phishing campaigns with customisable email templates. Import targets via CSV, define sending schedules, and track every interaction — opens, clicks, and credential submissions.
Click & Report Tracking
Tracking pixels detect email opens. Link tracking captures clicks and form submissions. A built-in reporting mechanism lets employees flag suspicious emails — rewarding vigilance and measuring security culture.
Auto-Remediation
Employees who fall for simulated phishing are automatically enrolled in targeted training courses. Repeat offender identification helps focus resources where they're needed most. Close the loop between testing and education.
Managed Pentest Workflows
Structured penetration testing management with authorisation workflows, scope definition, distributed probes, and findings tracking. From request to remediation — every step documented.
Authorisation & Scope
Formal authorisation request and approval workflow. Define scope, timeline, and rules of engagement. Maintain a complete audit trail from initial request through executive sign-off.
Scan Execution
Deploy distributed probes for network scanning and service discovery. Quick, Standard, and Full scan types. Phase-based testing methodology with structured findings entry and severity classification.
Findings Management
Document vulnerabilities with severity ratings, affected assets, evidence, and remediation recommendations. Track remediation status through to resolution and verification.
Reporting
Generate comprehensive penetration testing reports. Executive summaries, technical details, remediation timelines, and compliance impact — ready for stakeholders at every level.
Beyond Endpoints
SNMP network monitoring, Microsoft Intune MDM integration, and IP camera management. Extend visibility beyond traditional endpoints to your entire infrastructure.
Network
SNMP & Network Monitoring
Discover and monitor network devices via SNMP v1/v2c/v3. Track interface metrics, handle SNMP traps, and visualise your network topology with interactive diagrams and group-based organisation.
- SNMP v1/v2c/v3 device discovery
- Interface monitoring and metrics
- SNMP trap handling
- Network topology visualisation
- Interactive node and edge diagrams
- Group-based device organisation
Devices
MDM & Camera Integration
Integrate with Microsoft Intune for mobile device management — compliance policies, app inventory, and device status. ONVIF integration for IP camera discovery, stream management, and status monitoring.
- Microsoft Intune REST API integration
- iOS and Android device management
- Compliance policy enforcement
- ONVIF IP camera discovery
- Stream management and monitoring
- Unified device inventory
Built for Service Providers
Complete tenant isolation with per-tenant user management, configuration, and dashboards. Ideal for MSSPs, IT consultancies, and organisations managing security for multiple entities.
Tenant Isolation
Complete data segregation between tenants. Each tenant has its own users, settings, endpoints, alerts, and compliance data. No cross-tenant data leakage — ever.
Per-Tenant Management
Individual dashboards, statistics, and reporting for each tenant. Manage multiple client environments from a single Argus instance while maintaining strict isolation and independent configuration.
Enterprise-Grade Security
Multi-factor authentication, role-based access control, encrypted agent communication, and complete audit logging. Security built into every layer.
Authentication
Access Control & MFA
User authentication with MFA support via TOTP. Role-based access control ensures users see only what they need. Session management with configurable timeout. API key authentication for agent communication.
- MFA via TOTP (authenticator apps)
- Role-based access control (RBAC)
- Session management and timeout
- Login attempt monitoring
- API key authentication for agents
Infrastructure
Secure by Design
Encrypted credential storage for agents, HTTPS with certificate validation, and Traefik SSL/TLS termination. Every agent runs as a system service with circuit breaker protection against network issues.
- Encrypted credential storage
- HTTPS with cert validation
- Traefik SSL/TLS termination
- Circuit breaker on all agents
- Configurable communication ports
Technical Foundation
526+ API endpoints across 50 route modules. 49 data models, 47 frontend pages, 33 backend services. A production-grade platform built for scale.
FastAPI
Async Backend
React 18
Frontend UI
PostgreSQL 16
Database
.NET 8
Windows Agent
Docker
Deployment
Connect Everything
From Microsoft Intune to MITRE ATT&CK, Argus integrates with the tools and standards your security operations depend on.
Device & Network
Microsoft Intune REST API for MDM. SNMP v1/v2c/v3 for network devices. ONVIF/SOAP for IP cameras. Syslog UDP/TCP for log aggregation from any source.
Threat Intelligence
NVD/CVE databases for vulnerability data. MITRE ATT&CK framework mapping for threat classification. Anthropic Claude API for AI-powered analysis and natural language security queries.
Communication
SMTP for email notifications and phishing campaigns. Webhook support for custom integrations with ticketing systems, chat platforms, and automation tools. WordPress REST API for website monitoring.
Deployment Options
Single-server deployment handling 300+ endpoints. Your data stays on your infrastructure.
Option A
On-Premise
Deploy Argus on your own infrastructure with complete data sovereignty. A single Ubuntu server handles 300+ endpoints comfortably. Direct database access and full control over updates and configuration.
- Ubuntu 24.04 recommended
- 4GB+ RAM, 50GB+ disk
- Single server for 300+ endpoints
- Full data sovereignty
- We provide installation support
Option B
Managed Deployment
We deploy, configure, and maintain everything. VPS provisioning, domain, SSL, agent distribution assistance, and ongoing support — focus on security operations while we handle the platform.
- VPS, domain, SSL included
- Agent distribution assistance
- Automated backups
- Regular updates and maintenance
- Priority support
Consolidate Your Security Stack
Stop paying for — and integrating between — multiple disconnected tools. Argus replaces or augments the functionality of several product categories in one unified platform.
Security Monitoring
Replace standalone SIEM solutions with Argus's integrated event management. Log aggregation, correlation, alerting, and active response — connected directly to your endpoint data, compliance tracking, and threat intelligence.
GRC & Training
Replace separate GRC platforms and Security Awareness Training subscriptions. ISO 27001 compliance tracking, ISMS document management, and employee training — all sharing data and informing each other.
Testing & Simulation
Replace standalone phishing simulation tools and external penetration testing management platforms. Run campaigns, manage pentest workflows, and track remediation — all within the same platform your SOC team uses daily.
Pricing Structure
Argus pricing is based on the number of monitored endpoints, modules required, and deployment model. Volume discounts are available for larger deployments.
- Base platform licence
- Per-endpoint pricing for agents
- Optional modules available separately
- Annual maintenance and support
- Volume discounts for 100+ endpoints
Contact us for a custom quote tailored to your organisation.
Ready for complete cyber defence?
See how Argus can consolidate your security operations, eliminate tool sprawl, and give you complete visibility across your organisation — endpoints, network, compliance, and human risk — from a single platform.