Our Products

SNOK is a cybersecurity monitoring detection system tailored for industrial networks and control systems

SNOK™ is a cybersecurity monitoring and detection system tailored for industrial networks and control systems. SNOK™ detects targeted industrial attacks such as espionage, sabotage, malware, and other security interruptions in control systems. SNOK™ uniquely combines network and endpoint monitoring of components such as PLC’s, HMI’s, Servers etc.

Quick and easy deployment

SNOK™ is deployed in a quick and easy process either as a virtual machine on your hardware or as part of bundles with hardware from our partners. In addition to providing the SNOK™ User Interface, security event information and other data can be sent to SIEM systems or other monitoring systems of your choice.

abstract technology illustration

Situational awareness of OT systems

The SNOK™ family of products keeps an eye on your OT system. Our portfolio is comprehensive yet flexible and can be tailored to your needs. We design for early detection regardless if the attack is launched from interfacing IT systems or endpoints deep in the control network.

Network Intrusion Detection System (IDS)

The SNOK™ Network Intrusion Detection System (IDS) monitors internal and external communications of a controls system. It detects viruses, malware and sophisticated attacks (Advanced Persistent Threats), including those that are undetectable by conventional security tools. The SNOK™ Network IDS can be placed at the perimeter of the network, or at strategic internal points to monitor the data traffic between critical components.

Endpoint Monitoring

SNOK™ Endpoint Monitoring monitors Windows and Linux endpoints such as HMIs, SCADA, Servers, Historians, Engineering stations, including unsupported legacy versions. By closely monitoring endpoints from anomalies, SNOK™ will give an early warning of malicious activity whether it is originating from outside the infrastructure or from an insider that unknowingly or knowingly launch an attack from an endpoint.

PLC Threat Detection

Programmable Logic Controllers, PLCs, are the workhorses of most modern factories and plants. PLCs are rugged, reliable devices used to control often critical processes and activities performed by robotic devices. Unfortunately these are traditionally not designed with security in mind and are becoming increasingly more vulnerable as the networks they operate in are increasingly inter-connected. SNOK™ PLC Threat Detection will monitor for abnormal behavior, configuration changes and reprogramming of PLCs giving instant alerts upon detection.

Enterprise Solution

When looking for a way of securing a portfolio of industrial assets/plants, the SNOK™ Enterprise Solution is flexible and can be deployed according to your needs. In addition to a local solution on each site/asset this solution includes the SNOK™ Detection Server that aggregate information across sites and assets. The SNOK™ Detection Server is typically installed at your central Operations Center or Control Center and provides you with full flexibility in deciding if security events should be alerted to local personnel on the various sites or assets, or to a central group or both.

Reduce your blind spots

A combination of all available products in the SNOK™ Cybersecurity Monitoring System family provides the best security by combining information from different sources and reducing the blind spots of your infrastructure.

Asset Discovery

In the initial phase of securing your asset, or if you are wondering where to start, SNOK™ can be deployed in SNOK™ Asset Discovery mode on relevant network segments and endpoints of concern. Let it run for a while, then extract the collected information. You will get a report showing:

Topology and details of communication on the network that can be used to determine current vulnerability and plan how a SNOK™ Cybersecurity Monitoring system deployment should look like as well as other security measures such as network segmentation. SNOK™ Asset Discovery will also help you determine if your infrastructure is compliant with current security policies.

Trial Program

Secure-NOK™ offers a SNOK™ Trial Program. The SNOK™ solution is deployed, either as an Appliance or Virtual Machine on selected parts of the control system, for example a selected production line, subsystem or small site. The trial SNOK™ runs for a period of for example 30 days and includes an Analysis Report.

The benefits

SNOK™ is designed and built bottom up for industrial purposes. It gives you visibility at the various attack entry points that exists in an OT environment and is designed to fit in an industrial settings. Without disturbing the industrial process, SNOK™ detects cyber attacks and errors at the control layer of your industrial network.

Early Attack Detection

SNOK monitors your blindspots for subtle traces of attacks. Attacks can enter your infrastructure through networks as well as endpoints – SNOK makes sure you are looking both places, correlating and interpreting what you see.

Beyond Signatures

Today, more than 50% of attacks are non-malware – these are non-detectable using traditional malware signature detection methods. SNOK uses anomaly based detection capable of detecting all types of intrusions: those using malware, those using malware never seen before and non-malware attacks.

Built for Industry

SNOK™’s unique abilities to uncover blind spots are achieved because it is built for industry.

  • Non-intrusive: does not disturb the industrial process.
  • No maintenance required: once installed it does not need signature updates or similar to keep detecting new attacks.
  • Tiny footprint: uses few resources on the industrial infrastructure.
  • Backwards compatible: looks after unsupported devices in your legacy systems.