QUOTE
They don't understand why people don't like the concept of having an agent smith army of thousands (well the subscription limit) of icon agents descend on them. (as that's the logical extension of what he suggests). At that point, mutually assured destruction means, that you need to flood the node w/ your own friendly icons before the other guy does it...
I'm with crizh on this, and I think its fallacious to claim we're saying it because we want to break the game. I play bi-weekly for
fun and have no intention screwing that up. Let me be clear and say I like this game and its rules.
First, please don't claim what other people do and don't understand. What you assert here contains it's own answer..The limitation on multiple independent agents is the subscription limit as under the rules in Unwired, subscription limits the response exactly the same as processing limits (system x2 /system respectively). Processing limit stops you running too many on a given node, subscription limits how many you can reasonably command from remote nodes or how many can Log On to a system. This limitation even applies to spiders and security specialists, as otherwise nothing would stop a big corporation from sending in 50 matrix response personnel either.
But what is really RUNNING the program? The node that the agent originates from. If what you say was to be taken at face value, you break far more of the system than by allowing it, because imagine if I could crash a node simply by sending my agents to log on it via a legit account. 3 agents (with separate access ID's) with a 3-4 program payload can crash anything not military grade or serious R&D (as that is 12-15 processing items rather than 3 subscriptions). How odd that personas don't do the same thing when they Log On, but do take up a subscription.
By virtue of access they've overwhelmed the node you claim is now supporting them. Who needs cybercombat? Also, since by nature of them having to copy over each time, all agents would need Admin (or at least security) access in every case, as allowing them to crash such a node with user access means lets just forget hackers all together. And would that just be a Log On action, or wouldn't they have to perform a Transfer Data action to actually copy themselves?. And how could they Transfer Data before they Log On, and how can they Log On without a Transfer Data? Don't forget they still need to Log Off somewhere too. Are you combining these magically into one action for agents only to Log On?
Better hope every agent has the Edit program too since nothing can be done without the proper program.
As final food for thought, only agents with copy protection cracked would be able to "copy" themselves, so how do legitimate agents do anything at all other than defend the node they're run in? See how it starts to stretch? Loading an agent into a node is completely different than a Log On Agent action into a system. It should work exactly like a Persona.
Even items like Fetch Modules would be meaningless in your interpertation. Why have an alternate module to run a browse agent, without hurting your system resources if the moment it connected on your commlink it would drain on your processing limit along with the Browse program it was running? (note a fetch module specifically uses a subscription and no processing limit).
Spiders and riggers are used not because they can benefit from a separate system when agents can't (and how would that make sense considering they use the same hardware to connect), but because Agents are limited and unreliable. After a certain point, the resources spent on redudancy could be better invested elsewhere in security. The likelyhood of mass agents is the same as mass drones. Each agent would have to have an individual access ID purchased separately (or individually patched). So if you're assuming every corp would just build an agent army, you also assume every corp has the flying cloud of drone doom numbering in equal amounts (which they probably do, but the chances of them sending them all to the same location is ludicrous).
================================================================
To answer the OP and I apologize for the spill over and will gladly remove the above at your request.
I think matrix security outfits exist in both corporate level, and underworld level systems. The idea of Matrix protection (and the flip side of extortion) is evident enough to consider it more on the common side of things. The fact you can rent botnets infers the reverse, you can rent security. Hard reality though, relying on only agents for matrix security is like relying on only drones for physical security. Too easy to bypass without the human overwatch, and the Matrix is BIG. So there has to be numerous outfits dealing with Matrix security and even troubleshooting services.
I doubt they ever enter AA or above status, as no corp big enough to give them that kind of pull is going to outsource something as important as matrix security to another corporation. Least that's my opinion anyway. Since every corp therefore would maintain its own division, and probably outsource to businesses and definitely citizens in its enclave, its safe to assume the competition to the average "start up" is as fiece as it is limiting.
And maintaining a large number of agents requires lots of nodes, and subscriptions. Because ideally you would want max one agent per node to handle any decent payload. Counting subscriptions and cost as limitations, there is a limit to the number of customers you could ideally support. Reaction times would suffer and the ARC at best could put in an alert. I see this as the difference between calling Lone Star or having on site security. Its beneficial to have your own guys to respond quickly, but it's easier on the resources to outsource.