“The Internet of Things is not a concept; it is a network, the true technology-enabled network of all networks.” – Edewede Oriwoh
Are Industrial Internet of Things networks at risk?
Industrial Internet of Things (IIoT) is an exciting technology, allowing companies to see, measure, and control almost every action that takes place in their extended enterprises.
Companies in all industries are employing a growing amount of unmanaged smart connected devices that are riddled with vulnerabilities and traditional threat detection mechanisms are not enough to secure them properly.
Combine that with remote access by product vendors with no cyber security skills and you have a recipe for a serious cyber event, impacting production and building operations alike.
An attack on the Operations Technology, Industrial Control System, and Building Automation Networks threatens the viability of manufacturing and production companies and could render modern buildings paralyzed.
A focused IIoT cyber security solution
We at Blackpoint recognize this challenging security issue and have created a solution to this problem – our Networked Industrial Control Operations Security (NICOS) module.
For the first time, both your traditional corporate IT infrastructure and your Operations Technology (OT) networks can be visualized, live-monitored, and protected with SNAP-Defense; our Next Generation Threat Hunt and Respond platform. Start mapping your connected network assets including:
- Lighting Control
- Backup Power
- Elevator Control
- Access Control
- Irrigation Control
- Fire Alarm
- HVAC Control
- Security Cameras
SNAP’s IoT security software allows users to visualize and monitor every device that makes up a company’s infrastructure. This includes, but is not limited to: building automation, alarm systems, security cameras, lighting controls, irrigation controls, access controls, and more.
SNAP already protects the core networks, using its patented Live Network Map to identify the threat behavior used in every recent major network breach and insider attack.
SNAP alerts on two types of behavior in real time: network enumeration (the process of discovering a network layout) and lateral movement across the network, particularly with the use of privileged credentials.
SNAP’s new IoT software identifies new classes of devices and monitoring traffic into the core network; examples include RDP calls by HVAC and physical access vendors.
In doing so, SNAP bridges the gap from the cyber world to the physical.
For example, SNAP can identify when a field tech, in the daily course of business, routes a cable around a network firewall thereby exposing the network assets to serious harm.
SNAP’s Live Network Map enables you to know, accurately, what is currently active in your network.
SNAP then focuses on the behavior that matters from both external and insider threats: network enumeration, lateral movement, and system administration tradecraft.
Finally, SNAP delivers the threats to your desktop with all relevant information on the suspected endpoint or credential.
With full information, it’s a one-minute decision process and if warranted, a one-click detainment of the threat.
SNAP also provides an advantage in speed-of-defense, deploying automatically in a few hours – making it relevant in incident response – making sure the “doors are shut” in that critical moment before forensic analysis has even started.
Learn more about how NICOS works to protect your smart network.