Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Average Ratings 0 Ratings

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Description

SNOK™ is a specialized system designed for monitoring and detecting cybersecurity threats within industrial networks and control systems. It identifies specific industrial threats, including espionage, sabotage, malware, and various interruptions to security within control systems. What sets SNOK™ apart is its integrated approach that combines monitoring both networks and endpoints, which encompass components like PLCs, HMIs, and servers. With a team of cybersecurity specialists focused on industrial automation and control systems, we provide expert assistance in securing essential infrastructure and production facilities. Our professionals also offer training for your staff to adopt secure operational practices. While hacking, malware, and viruses have long posed risks to IT systems, the rising tide of cyberattacks now endangers critical industrial infrastructure too. This shift raises important questions about the evolving nature of threats and the strategies needed for effective protection. Notably, assets within the Oil & Gas sector present particularly enticing targets for cybercriminals, which could lead to catastrophic outcomes if not properly safeguarded.

Description

The Symantec Web Application Firewall (WAF) and Reverse Proxy, which leverage the advanced ProxySG platform, are designed to both secure and enhance the performance of mobile and web applications. As web and mobile platforms become integral to various business processes, serving as vital spaces for essential applications, the underlying web server infrastructures are increasingly confronted with intricate threats that traditional security measures like Intrusion Prevention Systems, Load Balancers, and Next-Generation Firewalls struggle to mitigate. Thankfully, the Symantec WAF and Reverse Proxy effectively address these emerging challenges by employing advanced content detection engines, ensuring high-speed content delivery, and simplifying operations. With a robust proxy architecture, these solutions empower organizations to safeguard and optimize their web and mobile applications for end users, clients, staff, and partners alike. Moreover, this comprehensive approach not only protects assets but also enhances the overall user experience in today's fast-paced digital landscape.

API Access

Has API

API Access

Has API

Screenshots View All

Screenshots View All

Integrations

AWS WAF
CA Auditor for z/OS

Integrations

AWS WAF
CA Auditor for z/OS

Pricing Details

$0.01
Free Trial
Free Version

Pricing Details

No price information available.
Free Trial
Free Version

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Deployment

Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Customer Support

Business Hours
Live Rep (24/7)
Online Support

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Types of Training

Training Docs
Webinars
Live Training (Online)
In Person

Vendor Details

Company Name

SecureNok

Founded

2011

Country

Norway

Website

www.securenok.com

Vendor Details

Company Name

Broadcom

Founded

1991

Country

United States

Website

www.broadcom.com/products/cyber-security/network/gateway/web-application-firewall-reverse-proxy

Product Features

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

Network Security

Access Control
Analytics / Reporting
Compliance Reporting
Firewalls
Internet Usage Monitoring
Intrusion Detection System
Threat Response
VPN
Vulnerability Scanning

Product Features

Web Application Firewalls (WAF)

Access Control / Permissions
Alerts / Notifications
Automate and Orchestrate Security
Automated Attack Detection
DDoS Protection
Dashboard
IP Reputation Checking
Managed Rules
OWASP Protection
Reporting / Analytics
Secure App Delivery
Server Cloaking
Virtual Patching
Zero-Day Attack Prevention

Alternatives

Alternatives

A10 Thunder ADC Reviews

A10 Thunder ADC

A10 Networks