Recent Posts

“The Internet of Things is not a concept; it is a network, the true technology-enabled network of all networks.” – Edewede Oriwoh

The IoT is an exciting technology, allowing companies to see, measure, and control almost every action that takes place in their extended enterprises. Companies in all industries are employing a growing amount of unmanaged operating systems that are riddled with vulnerabilities and traditional threat detection mechanisms are not enough to secure them. Combine that with remote access by product vendors with no cyber security skills and you have a recipe for a serious cyber event, impacting production and building operations alike. An attack on the Operations Technology, Industrial Control System, and Building Automation Networks threatens the viability of manufacturing and production companies and could render modern buildings paralyzed.


We at Blackpoint recognize this challenging security issue and have just released our Networked Industrial Control Operations Security (NICOS) module. For the first time, both your traditional corporate IT infrastructure and your Operations Technology (OT) networks can be visualized, live-monitored, and protected with SNAP-Defense; our Next Generation Threat Hunt and Respond platform. SNAP’s IoT security software allows users to visualize and monitor every device that makes up a company’s infrastructure. This includes, but is not limited to: building automation, alarm systems, security cameras, lighting controls, irrigation controls, access controls, and more.

SNAP already protects the core networks, using its patented Live Network Map to identify the threat behavior used in every recent major network breach and insider attack. SNAP alerts on two types of behavior in real time: network enumeration (the process of discovering a network layout) and lateral movement across the network, particularly with the use of privileged credentials. SNAP’s new IoT software identifies new classes of devices and monitoring traffic into the core network; examples include RDP calls by HVAC and physical access vendors. In doing so, SNAP bridges the gap from the cyber world to the physical. For example, SNAP can identify when a field tech, in the daily course of business, routes a cable around a network firewall thereby exposing the network assets to serious harm.

SNAP’s Live Network Map enables you to know, accurately, what is currently active in your network. SNAP then focuses on the behavior that matters from both external and insider threats: network enumeration, lateral movement, and system administration tradecraft. Finally, SNAP delivers the threats to your desktop with all relevant information on the suspected endpoint or credential. With full information, it’s a one-minute decision process and if warranted, a one-click detainment of the threat. SNAP also provides an advantage in speed-of-defense, deploying automatically in a few hours - making it relevant in incident response - making sure the “doors are shut” in that critical moment before forensic analysis has even started. If you would like to learn more or setup a demo of how it all works, please contact us at or fill out a contact form at



Tags: News, Blogs, building automation, cyber, cyber attack, cyber security, data security, industrial control, information security, internet of things, iot, lateral movement, network security, next generation, operations technology, software, technology, threat hunting, threat response