SNOK™ is a cybersecurity monitoring and detection system tailored for industrial networks and control systems. SNOK™ detects targeted industrial attacks such as espionage, sabotage, malware, and other security interruptions in control systems. SNOK™ uniquely combines network and endpoint monitoring of components such as PLC’s, HMI’s, Servers etc.
Quick and easy deployment
SNOK™ is deployed in a quick and easy process either as a virtual machine on your hardware or as part of bundles with hardware from our partners. In addition to providing the SNOK™ User Interface, security event information and other data can be sent to SIEM systems or other monitoring systems of your choice.
Situational awareness of OT systems
The SNOK™ family of products keeps an eye on your OT system. Our portfolio is comprehensive yet flexible and can be tailored to your needs. We design for early detection regardless if the attack is launched from interfacing IT systems or endpoints deep in the control network.
Network Intrusion Detection System (IDS)
The SNOK™ Network Intrusion Detection System (IDS) monitors internal and external communications of a controls system. It detects viruses, malware and sophisticated attacks (Advanced Persistent Threats), including those that are undetectable by conventional security tools. The SNOK™ Network IDS can be placed at the perimeter of the network, or at strategic internal points to monitor the data traffic between critical components.
PLC Threat Detection
Reduce your blind spots
A combination of all available products in the SNOK™ Cybersecurity Monitoring System family provides the best security by combining information from different sources and reducing the blind spots of your infrastructure.
In the initial phase of securing your asset, or if you are wondering where to start, SNOK™ can be deployed in SNOK™ Asset Discovery mode on relevant network segments and endpoints of concern. Let it run for a while, then extract the collected information. You will get a report showing:
Topology and details of communication on the network that can be used to determine current vulnerability and plan how a SNOK™ Cybersecurity Monitoring system deployment should look like as well as other security measures such as network segmentation. SNOK™ Asset Discovery will also help you determine if your infrastructure is compliant with current security policies.
SNOK™ is designed and built bottom up for industrial purposes. It gives you visibility at the various attack entry points that exists in an OT environment and is designed to fit in an industrial settings. Without disturbing the industrial process, SNOK™ detects cyber attacks and errors at the control layer of your industrial network.
Early Attack Detection
SNOK™ monitors your blindspots for subtle traces of attacks. Attacks can enter your infrastructure through networks as well as endpoints – SNOK™ makes sure you are looking both places, correlating and interpreting what you see.
Today, more than 50% of attacks are non-malware – these are non-detectable using traditional malware signature detection methods. SNOK uses anomaly based detection capable of detecting all types of intrusions: those using malware, those using malware never seen before and non-malware attacks.
Built for Industry
SNOK™’s unique abilities to uncover blind spots are achieved because it is built for industry.
- Non-intrusive: does not disturb the industrial process.
- No maintenance required: once installed it does not need signature updates or similar to keep detecting new attacks.
- Backwards compatible: