Integrated Network Security for All Environments

COVERAGE FOR IT, OT, ICS, & BAS

IoT-style networks are becoming commonplace in many different industries, but are rarely – if ever – adequately secure. Obtain complete IoT security with our Networked Industrial Control Operations Security (NICOS) appliance, a truly integrated IT/OT threat detection and response platform.

Traditional Endpoint detection is no longer enough.

A modern "smart" building, typically has nothing more than a firewall to protect the growing list of IP network-connected devices. NICOS was built to solve the problem with modern IoT Security.

Lighting Control

Backup Power

Elevator Control

Access Control

Irrigation Conrol

Fire alarm

HVAC Control

Security Cameras

Integrated IT/OT/IOT protection by NICOS

Introducing the Networked Industrial Control Operations Security (NICOS) module, addressing the growing trend of convergence between IoT, ICS, and OT networks. When paired with SNAP-Defense, NICOS provides the first truly integrated IT/OT threat detection and response platform, capable of detecting and stopping both IT and OT attacks as well as those that cross the boundary.

A SOLUTION TO SOLVE REAL
WORLD INDUSTRIAL IoT SECURITY ISSUES.

OT Systems and Sensors will be installed for decades – business/operations will likely dictate the need for remote or direct network access. Below are a few real world examples of cyber security issues happening today.

Port automation

Food and beverage
Manufacturing

power generation
and transmission

pharmaceutical
Manufacturing

oil exploration
and production

Ransomware

remote access
tool

malicious
insider

supply chain
compromise

Destructive
Malware

Threat actor locks control of crane, trapping operator; unions halt work until cranes are safe.

Threat actor sends commands; destroying sensitive equipment.

Insider removes over-speed protection on turbine causing significant damage.

Compromise of supply chain results in production of defective batch of medication.

Malware alters parameters on a semi-submersible rigs station keeping system causing collision.

Operational
halt

Loss of capital
investment

Diminished
generation capacity

DoJ initiates criminal investigation

Damage to rig
and reputation

Managed Detection and Response (MDR) 24/7 Integrated IT OT IOT Protection

OBTAIN COMPLETE IoT SECURITY

Managed Detection and Response (MDR) 24/7 Integrated IT OT IOT Protection

smart threat intelligence framework

  • Known Bad Traffic
  • Unusual Domains
  • Obfuscated/Anonymous Traffic (TOR)
  • Port Scanning Detection

Asset Visibility

  • Up-to-Date Inventory on OT/IOT/ICS Devices
  • Contextualized Alerts with Mapping and Network Device Collection
  • Remote Management and Access
  • SSH, RDP, VNC, TeamViewer, Ammy Admin

Lateral Spread Detection

NICOS

HOW IT WORKS

NICOS combines Blackpoint’s network-based threat detection and monitoring software with a commercial hardware appliance.

Live Asset Visibility

Visualize DEVICES ACROSS YOUR Entire INFRASTRUCTURE

NICOS provides asset discovery and visibility across the infrastructure.

Automatically detects a newly discovered device, it will send the related meta-data to the SNAP-Defense portal.

If a threat originates from a previously unknown or undetected device, the SNAP-Defense system will create an “unknown” device based on the originator’s IP address.

START SECURING THE INDUSTRIAL IoT WITH THESE GREAT FEATURES

REMOTE ACCESS MONITORING

Monitor and detect connections from protocals such as SSH, RDP, VNC, TeamViewer, and Ammy Admin.

MALICIOUS NETWORK TRAFFIC​

NICOS consumes daily threat intelligence feeds to identify known bad domains as well as infrequent or unusual domains.

NETWORK ENUMERATION

Detects malicious actors trying to enumerate the environment, access critical infrastructure, or laterally spread their command and control (C2) or malware throughout the infrastructure.​

DARK WEB USAGE

Detect obfuscated or anonymous traffic (e.g., TOR) which malicious actors and software often use to hide their command and control and data exfil activities.

port scanning attempts

Many malicious toolsets utilize port scanning to enumerate the environment, identify running services, and fingerprint devices.

EXTENSIBILITY​ WITH PLUGINS

Extremely flexible allowing users to identify suspicious traffic, protocols, ports, sources, and destinations.

ARE YOU A LARGE ENTERPRISE?

You can also purchase our patented Security Operations and Incident Response platform for use
in your own SOC.
Request a demo today.

Integrated network and endpoint security with automated orchestration in one platform?

REQUEST A DEMO >>>