Agilicus

Zero-Trust Secure Connectivity for Critical Infrastructure and Industrial Control Systems

Agilicus enables any user, on any device, secure connectivity to any resource they need—without a client or VPN. Whether that resource is a web application, a programmable logic control, or a building management system, Agilicus can secure it with multi-factor authentication while keeping the user experience simple with single sign-on.

Fine-grained access control and audit on a per-resource basis. No broad-access VPN risks. No end-user software to install.

The effectiveness of an air gap with the simplicity of the Internet. No inbound IP or connectivity needed.

Any resource: PLC, Building Management System, Database, Share, Desktop. No integration required.

People are working and connecting from anywhere. That means traditional and legacy perimeter-based approaches to secure access and network security just don’t cut it anymore.

VPNs have a lot of overhead and require significant time and resources to maintain, secure, and manage placing undue burden on your IT teams.

Hackers target VPNs and public gateways. They expose your organisation to risks like lateral network traversal and ransomware.

VPN technology is over 25 years old and no longer serves your business. Security measures are front and center, hindering employee experience.

Agilicus introduces a cloud-native Zero Trust Network Access platform that removes the complexity of extending secure access to employees and non-employees. With federated identity and single sign-on, you can maintain your native active directory and identity providers allowing users to easily self-onboard.

Spanning the gamut from simple web applications to complex critical-infrastructure industrial control system components like an HMI, a PLC, SCADA, a Building Management System BMS, we handle it all.

The Agilicus platform provides a simple means of federating any identity provider, public or private. Enable single sign-on and use your Azure Active Directory in unison with a partner company or integrate with your native identity provider (Google, Apple, Okta, Microsoft). This provides the most natural sign-in experience for the end-users where security can be enriched with multi-factor authentication – all without the need for new passwords or user ids.

With Agilicus you can quickly and easily segment users and manage their privileges to web applications, remote desktops, shares, applications, and databases whether they are on-premise, working remotely, or external to your organisation.

Enable simple, secure access for any user, on any device, anywhere in the world – in just a few clicks.

Make IT security invisible to your employees with Agilicus so your users can focus on getting the job done. Enable simple, secure remote access for any user, from any device, anywhere in the world.

Re-imagine the airgap. Operational Technology components as first class citizens in a single-sign-on world with multifactor. Vendors act as peer to staff without shared passwords. Improve efficiency: access that HMI from anywhere, on any device, without VPN or pre-installed software.

Keep your web applications off the public internet without limiting access to employees and extended teams. With an Identity Aware Web Application Firewall, access to web application resources such as intranet, training, payroll, administrative services, and SCADA systems can be made accessible to your workforce without the risk of unauthorized access. 

Protect your online resources top-down and extend identity throughout the system with Agilicus so that employees, vendors, contractors, and suppliers can get their job done without sacrificing security.

Extend secure access to data and file shares across your entire organisation while protecting your most valuable asset: corporate information.

Share access can be segmented on a per user basis ensuring only the right person has access to the right files and drive shares when they need them. 

Granular auditing capabilities give you complete visibility into who is accessing what, when, and for how long.

Leverage the benefits of working in the cloud to digitally enable your modern workforce while eliminating an attacker’s ability to move laterally through your network.

Agilicus enables remote desktop access through Zero Trust, significantly reducing the attack vectors that would otherwise leave your corporate resources exposed. Quickly and easily enact strict, least privilege access policies and set per-user authorizations across remote desktops and host machines.

Whether it’s a server, virtual environment, or physical desktop device hosting a legacy application, or a SCADA system, ensure your organisation has the granular security control and visibility needed to protect remote resources and the networks they connect to.

There are numerous applications and desktop software that must connect to a database, which is usually done through a VPN. This method tends to introduce numerous problems and risks spanning from disruption of workday activities like video conferencing, all the way to malicious actors gaining unauthorized access.

Using Zero Trust Network Access, you can securely connect applications and resources with their respective databases and enable least privilege access to authorized users. That means your organisation can get resources online without exposing them to the public internet, making them available to any user on any device without the hassle of a VPN.

Manage Cyber Risk – Make the switch with an easy path to migration and avoid the cost of becoming the next data breach news headline.

Rein in Spend – Reduce the fixed costs of licensing, bandwidth, administration, and IT support. Minimize CAPEX for appliances and maintenance and achieve scalability in IT security.

Rapid Deployment – Respond to changing business conditions and scale access according to demand.

Orient for Growth – Replace the traditional network edge with identity-based access for mobile and remote workforces. Your teams want to work from anywhere. With Agilicus, they can.

There are numerous applications and desktop software that must connect to a database, which is usually done through a VPN. This method tends to introduce numerous problems and risks spanning from disruption of workday activities like video conferencing, all the way to malicious actors gaining unauthorized access.

Using Zero Trust Network Access, you can securely connect applications and resources with their respective databases and enable least privilege access to authorized users. That means your organisation can get resources online without exposing them to the public internet, making them available to any user on any device without the hassle of a VPN.

Zero Trust. Critical Infrastructure. Industrial Control Systems. Any User, Any Application, Any Device, Any Network. No VPN.

We believe enhanced security should be simple and economical for organizations of all sizes. Through the Agilicus AnyX platform, we are helping businesses increase security while delivering an invisible IT security experience to their users with a Zero Trust Network Architecture.

Adopt cloud-native security and let your authorized users get simple, secure access to applications, desktops, shares, and other corporate resources and services.

Organisations shouldn’t be forced to choose between enabling their people, securing corporate and customer data, or reducing the cost of cyber security. At Agilicus our goal is to ensure modern, cloud-native security can be adopted quickly and effectively.

As a SaaS provider of Zero Trust Network Architecture, Agilicus enables secure access to any application, from any network, for any user on any device, without the need for a VPN or a client.

Don  Bowman

Don Bowman

  • Chief Executive Officer (CEO)
  • Founder
Nicolas  St-Pierre

Nicolas St-Pierre

  • CTO: Chief Technology Officer
This text is displayed if your browser does not support the Canvas HTML element.