Cyberthreats are among the biggest risks to our security as individuals, corporations and as a nation. Cybersecurity is by far one of the most detrimental problems faced by the public at-large, with concern, and risk, growing by the day. As technology grows, so does the threat envelope.
As an industry-leading, international technology firm, SNC’s cyber protection teams are truly on the cutting edge of Information Operations.
Our team is composed of the top computer science and electrical engineers who work in tandem with our electronic warfare experts, intelligence analysts and system engineers to build custom network, mobile and information system security platforms. These teams are supported by a substantial research and development division that is dedicated to ensuring that our cyber solutions are able to disrupt and upset even the most adversarial systems, all while protecting the customer’s network integrity. Solutions include byte-by-byte protection for SCADA and industrial control networks to ensure only safe message traffic reaches critical systems.
SCADA Solutions - Binary Armor®
Our Binary Armor® SCADA Network Guard provides critical, real-time, endpoint cybersecurity for Supervisory Control and Data Acquisition (SCADA) network systems. It is designed for in-line installation between PLCs, remote terminal units, intelligent electronic devices or controllers and the WAN/LAN, to provide bi-directional security across all communication layers. Binary Armor supports TLS encryption on both high (protected) and low (external) networks and cannot be modified or reconfigured while operational without physical access to the system.
This visionary, patented system works by processing every byte of every message with a dynamic “state-based” rule-set that processes messages based on system control logic. This process ensures only safe message traffic reaches these critical SCADA systems.
Detect, Analyze & Report Threats (DART)
DART leverages leading-edge, open source technologies to provide visibility of unknown threats and increase productivity in both cybersecurity and business processes. DART centralizes and automates the capture, triage and detection of cyber threats so operators can search, visualize, report and respond to them efficiently and with greater accuracy. DART gives security teams centralized visibility into all network and security data to enable rapid analytic, detection and reporting capabilities – essential in today’s fight against advanced threats and determined threat actors. DART scales to any size organization, and can ingest more than 20 terabytes of data per day from multiple data sources including firewall logs, intrusion detection logs, intrusion prevention logs, proxy logs, email logs, netflow, packet capture logs, threat intelligence feeds and much more. DART centralizes, indexes, normalizes and correlates this data at the time of ingestion, delivering comprehensive reports and visualizations in seconds.
DART provides actionable information to improve your security posture with applied analytics and artificial intelligence (AI)/machine learning (ML) analysis across multiple data points. DART is a unique cybersecurity intelligence tool that maps and fuses an organization’s infrastructure with known cyber-attack patterns of foreign adversaries. It is the clear choice for companies looking to centralize their cybersecurity strategies. Key capabilities include:
- Data Ingestion in near real-time
- Cyber battlespace awareness for threat data
- Ultra-high-speed data discovery
- Cyber visualizations in near real-time
- Advanced cyber analytics with applied AI/ML
Contact us at MST@sncorp.com to learn more about our DART solution.
Associated Business Areas & Subsidiaries
Associated Products, Services & Programs