SNOK™ is a cybersecurity monitoring and detection system tailored for industrial networks and control systems. SNOK™ detects targeted industrial attacks such as espionage, sabotage, malware, and other security interruptions in control systems. SNOK™ uniquely combines network and endpoint monitoring of components such as PLC’s, HMI’s, Servers etc.
Reduce your blind spots
A combination of all available products in the SNOK™ Cybersecurity Monitoring System family provides the best security by combining information from different sources and reducing the blind spots of your infrastructure.
In the initial phase of securing your asset, or if you are wondering where to start, SNOK™ can be deployed in SNOK™ Asset Discovery mode on relevant network segments and endpoints of concern. Let it run for a while, then extract the collected information. You will get a report showing:
Topology and details of communication on the network that can be used to determine current vulnerability and plan how a SNOK™ Cybersecurity Monitoring system deployment should look like as well as other security measures such as network segmentation. SNOK™ Asset Discovery will also help you determine if your infrastructure is compliant with current security policies.
SNOK™ is designed and built bottom up for industrial purposes. It gives you visibility at the various attack entry points that exists in an OT environment and is designed to fit in an industrial settings. Without disturbing the industrial process, SNOK™ detects cyber attacks and errors at the control layer of your industrial network.
Early Attack Detection
SNOK™ monitors your blindspots for subtle traces of attacks. Attacks can enter your infrastructure through networks as well as endpoints – SNOK™ makes sure you are looking both places, correlating and interpreting what you see.
Today, more than 50% of attacks are non-malware – these are non-detectable using traditional malware signature detection methods. SNOK uses anomaly based detection capable of detecting all types of intrusions: those using malware, those using malware never seen before and non-malware attacks.
Built for Industry
SNOK™’s unique abilities to uncover blind spots are achieved because it is built for industry.
- Non-intrusive: does not disturb the industrial process.
- No maintenance required: once installed it does not need signature updates or similar to keep detecting new attacks.
- Backwards compatible:
Situational awareness of OT systems
The SNOK™ family of products keeps an eye on your OT system. Our portfolio is comprehensive yet flexible and can be tailored to your needs. We design for early detection regardless if the attack is launched from interfacing IT systems or endpoints deep in the control network.
Network Intrusion Detection System (IDS)
The SNOK™ Network Intrusion Detection System (IDS) monitors internal and external communications of a controls system. It detects viruses, malware and sophisticated attacks (Advanced Persistent Threats), including those that are undetectable by conventional security tools. The SNOK™ Network IDS can be placed at the perimeter of the network, or at strategic internal points to monitor the data traffic between critical components.
SNOK™ Endpoint Monitoring monitors Windows and Linux endpoints such as HMIs, SCADA, Servers, Historians, Engineering stations, including unsupported legacy versions. By closely monitoring endpoints from anomalies, SNOK™ will give an early warning of malicious activity whether it is originating from outside the infrastructure or from an insider that unknowingly or knowingly launch an attack from an endpoint.
PLC Threat Detection
Programmable Logic Controllers, PLCs, are the workhorses of most modern factories and plants. PLCs are rugged, reliable devices used to control often critical processes and activities performed by robotic devices. Unfortunately these are traditionally not designed with security in mind and are becoming increasingly more vulnerable as the networks they operate in are increasingly inter-connected. SNOK™ PLC Threat Detection will monitor for abnormal behavior, configuration changes and reprogramming of PLCs giving instant alerts upon detection.
The first step in defending industrial networks, is to be aware of the individual assets making up the system. Upon installation, SNOK™ automatically discovers all nodes in the network and produces an inventory, the SNOK™ Asset List.
The SNOK™ Network IDS uses passive network sniffing to discover and monitor assets. To collect more information about the assets, SNOK™ can be extended with the SNOK™ Asset Scanner module. The Asset Scanner uses active scanning techniques to collect information about assets in a gentle and industrial friendly manner.
Our security Center with competent advisers offers specialist services in OT security.
Health check and security analysis
We offer services to assist our customers in getting the most out of the insight our security solution SNOK provides.
During our health check service, experts review available data about your facility and identifies vulnerabilities and security breaches. We offer monthly or quarterly status reports on the security of your facility.
Our advisers have expertise in OT security and use recognized standards such as IEC 62443 and the NIST Cyber security framework. We carry out GAP analyzes of the security in your facility against best practice OT security.
To get started with safety checks, we offer pilot projects with SNOK, tailored to the company’s needs.