Skip to main content
TrustRadius
SecureNok

SecureNok

Overview

What is SecureNok?

The SNOK™ Cybersecurity Monitoring System, developed by Secure-NOK™ Technology AS, is a solution designed to provide cybersecurity monitoring and detection for industrial networks and control systems. According to the vendor, this system caters to the needs of various professions and industries, including...

Read more
Recent Reviews
TrustRadius

Leaving a review helps other professionals like you evaluate Network Security Software

Be the first one in your network to review SecureNok, and make your voice heard!

Return to navigation

Pricing

View all pricing
N/A
Unavailable

Sorry, this product's description is unavailable

Entry-level set up fee?

  • No setup fee

Offerings

  • Free Trial
  • Free/Freemium Version
  • Premium Consulting/Integration Services

Would you like us to let the vendor know that you want pricing?

Alternatives Pricing

What is Hyper Private Access?

HPA is a Business VPN, or Virtual Private Network, presented as a secret, safe tunnel on the internet that companies can use to keep their online stuff private and secure.

What is Nmap?

Nmap is a free, open source network discovery, mapper, and security auditing software. Its core features include port scanning identifying unknown devices, testing for security vulnerabilities, and identifying network issues.

Return to navigation

Product Details

What is SecureNok?

The SNOK™ Cybersecurity Monitoring System, developed by Secure-NOK™ Technology AS, is a solution designed to provide cybersecurity monitoring and detection for industrial networks and control systems. According to the vendor, this system caters to the needs of various professions and industries, including industrial control systems professionals, cybersecurity professionals, IT professionals, operations managers, and manufacturing companies. It is also adopted by financial institutions, healthcare organizations, government agencies, and e-commerce companies.

Key Features

Asset Discovery: According to the vendor, the system provides visibility of endpoints in the network and their communication patterns, allowing for vulnerability assessment and compliance with security policies.

Real-Time Monitoring: The system monitors industrial networks and endpoints in real-time to detect viruses, malware, and sophisticated attacks, including those undetectable by conventional security tools. According to the vendor, it also provides early warnings of malicious activity from internal or external sources.

Enterprise Solutions: The system can scale hierarchically for large, complex multi-site industrial infrastructures, providing a flexible and comprehensive approach to securing a portfolio of industrial assets, as claimed by the vendor.

Network Intrusion Detection System (IDS): The system monitors internal and external communications of control systems to detect viruses, malware, and sophisticated attacks. According to the vendor, it can be placed at the network perimeter or strategic internal points for effective monitoring.

Endpoint Monitoring: The system monitors Windows and Linux endpoints, such as HMIs, SCADA systems, servers, and engineering stations, to provide early warning of malicious activity originating from these endpoints. It can also detect anomalies and potential security breaches, as claimed by the vendor.

PLC Threat Detection: According to the vendor, the system monitors Programmable Logic Controllers (PLCs) for abnormal behavior, configuration changes, and reprogramming. It provides instant alerts upon potential attacks, ensuring the protection of critical processes and robotic devices.

Asset Scanner: The system collects information about assets in the network using active scanning techniques, enhancing visibility and understanding of assets in the infrastructure, as claimed by the vendor.

Consultancy Services: The vendor offers health check and security analysis services to optimize facility security. Their expert advisers utilize recognized standards to conduct GAP analysis and assist in improving OT security and implementing best practices.

Trial Program: The vendor offers a trial program where the solution can be deployed on selected parts of the control system for a specified period. The trial includes an analysis report to provide insights into system security and allow customers to experience the benefits of the system before committing to a full deployment.

SecureNok Technical Details

Deployment TypesSoftware as a Service (SaaS), Cloud, or Web-Based
Operating SystemsWindows
Return to navigation

Comparisons

View all alternatives
Return to navigation

Reviews

Sorry, no reviews are available for this product yet

Return to navigation