Quick and easy deployment
SNOK™ is deployed in a quick and easy process either as a virtual machine on your hardware or as part of bundles with hardware from our partners. In addition to providing the SNOK™ User Interface, security event information and other data can be sent to SIEM systems or other monitoring systems of your choice.
Situational awareness of OT systems
The SNOK™ family of products keeps an eye on your OT system. Our portfolio is comprehensive yet flexible and can be tailored to your needs. We design for early detection regardless if the attack is launched from interfacing IT systems or endpoints deep in the control network.
Network Intrusion Detection System (IDS)
The SNOK™ Network Intrusion Detection System (IDS) monitors internal and external communications of a controls system. It detects viruses, malware and sophisticated attacks (Advanced Persistent Threats), including those that are undetectable by conventional security tools. The SNOK™ Network IDS can be placed at the perimeter of the network, or at strategic internal points to monitor the data traffic between critical components.
PLC Threat Detection
Reduce your blind spots
A combination of all available products in the SNOK™ Cybersecurity Monitoring System family provides the best security by combining information from different sources and reducing the blind spots of your infrastructure.
Topology and details of communication on the network that can be used to determine current vulnerability and plan how a SNOK™ Cybersecurity Monitoring system deployment should look like as well as other security measures such as network segmentation. SNOK™ Asset Discovery will also help you determine if your infrastructure is compliant with current security policies.
Built for industry
SNOK® unique abilities to uncover blindspots is achieved because it is built for industry:
- Non-intrusive: does not disturb the industrial process
- No maintenance required: once installed there is no need for signature updates or similar to keep detecting new attacks.
- Tiny footprint: use few resources on the industrial infrastructure.
- Backwards compatible: SNOK® can look after unsupported devices in your legacy systems.
Early attack detection
SNOK® monitors your blindspots for subtle traces of attacks. Attacks can enter your infrastructure through networks as well as endpoints – SNOK® makes sure you are looking both places, correlating and interpreting what you see.
Today, more than 50% of attacks are non-malware – these are non-detectable using traditional malware signature detection methods. SNOK® uses anomaly based detection capable of detecting all types of intrusions: those using malware, those using malware never seen before and non-malware attacks.