01 · Health
Liveness signal.
CPU%, memory%, disk%, uptime. Tells the portal "the agent stopped" from "the host is genuinely quiet".
Reference · Cyber agent
A plain explanation of the Cyber-mode agent: what it measures, what it produces, where its data lives, and what it deliberately does not touch. No pitch, no pricing — those live elsewhere. This page is here so the technical, security, and compliance reviewers can read what the thing actually does before signing off on a deployment.
01 · What it is
The Horizon Cyber agent is the security-evidence sibling of the Horizon ESG agent. It runs the same lightweight installer and reports into the same portal — but the collector set is rotated. Where the ESG agent measures watts, the Cyber agent measures the things a Cyber Essentials Plus assessor and a CIS-style topology review need to see.
It is observability-only. There is no remote shell, no remote-desktop surface, no autonomous remediation. The agent reads what the host will tell it, posts the readings to the portal, and the portal does the scoring. If a reviewer needs to know "what could this agent do on the host", the answer is "read these eight collector outputs and exit" — and the surfaces that would do anything else are not started.
For the energy / Scope 2 sibling, see the Horizon ESG agent reference. For the full operational agent that adds Proxmox, PBS, AI-model inventory, Hermes and remote support sessions, see the Horizon agent reference.
02 · What it measures
Each one is scoped to a question a security reviewer or a CE+ assessor would otherwise ask out loud.
Eight collectors run on a Cyber-mode agent. Each one is scoped to a question a security reviewer or a CE+ assessor would otherwise ask out loud.
dpkg-query on Debian, rpm on Red Hat) and the equivalent system inventory on Windows and macOS. Feeds the CE+ A6.6 unsupported-software check against the endoflife.date database for fifteen security-critical packages (nginx, openssl, postgresql, openssh, chrome, firefox, and so on).nmap for network exposure, and a CIS-aligned check suite — firewall state, SSH configuration, update posture, sudo logging, key-based authentication.systemctl / ufw / /etc configs on Linux, launchctl and defaults on macOS. Every field is optional with graceful fallback — when a tool isn't installed, the field is null rather than the collector failing.03 · What you get back
The agent emits readings. The artefacts a security lead or CE+ assessor reads live in the Horizon Platform, populated from those readings:
04 · The boundaries
The Cyber-mode agent runs only the eight collectors above. The surfaces below are not loaded — there is no code path on a Cyber-mode host that can emit them, and the server-side ingest discards them if they ever did arrive.
The Trivy and nmap scans are read-only and run against your own perimeter from your own agent — they do not reach outside the host's network reach, and the agent does not act on the findings. The findings are evidence; the operator decides what to do with them.
05 · Data residence
06 · Deployment
The same installer that ships the ESG and full Horizon agents installs the Cyber agent — the mode is selected when the install token is generated, and the collector set is enforced server-side as well as in the agent.
A Cyber-mode agent can be upgraded to a full Horizon agent (or downgraded to ESG) by issuing a new install token — the collector set is enforced from the server side, so the change takes effect on the next agent check-in.
07 · Honest scope
An honest list. We'd rather name the gap than pretend it's solved.
08 · Related reading
The energy & Scope 2 sibling: the same lightweight agent, rotated to a power / sensors / hardware collector set, feeding the ESG Reporting tab.
Read the ESG agent referenceThe full operational agent: everything the Cyber and ESG agents do, plus Proxmox, PBS, AI-model inventory, Hermes, system logs, and operator-initiated remote support sessions.
Read the Horizon agent referenceThe methodology pillar for the sister product: how source telemetry becomes a defensible figure, with disclosed factors and accuracy bands.
Read Measurable AI
Next step
The Cyber agent is one of three modes shipped by the Horizon Platform. See the readiness dashboard, the IASME-shaped PDF export, and where the rest of the platform sits around it.
No deckNo sales pressureWe'll tell you to wait if you should
Or email a workload to hello@althorizon.co.uk — one-page model back in 48h.
Matt Shore
Founder · Alt Horizon
Data residency
Sovereign by default
Self-hosted unless you opt to a cloud option