ENG_911991.XML
SINEC Security Monitor is a modular cyber security software for passive, non-intrusive, continuous cyber security monitoring during production on customer premises.
By mirroring and analyzing network traffic, SINEC Security Monitor enables passive, continuous identification of all assets (devices such as PCs, PLCs, network components, etc.) in the network. In addition, targeted active scans with low impact can be initiated as needed. The detected assets are matched against an extensive database of known vulnerabilities to identify devices affected by vulnerabilities. This serves as a starting point for countermeasures such as firmware updates.
In addition, the software is able to learn what normal communication looks like in the network and, with the help of AI-based analysis, it can detect anomalies. By mirroring and analyzing network packets, potential intruders can also be detected. For this purpose, SINEC Security Monitor also contains market-leading databases of known signatures and threats.
The additional options for evaluating data input from distributed sensors and/or agents permit monitoring of highly segmented networks while complying with regulations such as IEC 62443.
The detected vulnerabilities, security events and threats are visualized in an intuitive dashboard that provides a live overview of the current security situation at any time. This dashboard is tailored to the needs of the OT and offers relevant SIEM (Security Information and Event Management) functions. In addition, the software provides an interface to existing SIEM systems.
All components of the software are fully provided on-site and do not require an Internet connection – the data remains on site. Even updates can be installed via a secure USB device.
SINEC Security Monitor is available as a subscription model, including all updates of the software and the intelligence database (database containing vulnerabilities, signatures, etc.). Thanks to the highly modular offering based on the number of assets to be monitored as well as functional requirements, you only purchase exactly what is needed to implement your use cases. Optional services and support for installation, commissioning and optimization of the system can be provided by knowledgeable experts from Siemens Professional Services.
SINEC Security Monitor is more than just cyber security for your business.
Every day, new security vulnerabilities are discovered and cyber criminals develop ways to exploit them. SINEC Security Monitor helps you improve security in your OT network.
With passive and active monitoring capabilities and powerful anomaly and attack detection, you have the tools to identify threats and respond quickly. The findings can be used to harden your network and prevent similar attacks in the future. In addition to its technical functionalities, SINEC Security Monitor is based on Siemens' many years of experience in OT (Operational Technology).
SINEC Security Monitor …
- was developed to help you meet the ever-increasing requirements of official cyber security regulations, such as the EU's NIS2 Directive, the German IT Security Act 2.0, and more.
- is an industrial, non-intrusive cyber security monitoring system designed specifically for OT needs.
- supports OT-specific communication protocols.
- can be implemented in complex, highly segmented network and factory environments to support your use cases.
- does not interfere with ongoing production.
- features data traffic and protocol-based anomaly detection to help you identify potentially harmful activities, e.g. during network communications or software installation, failed logon attempts, or when connecting USB devices to PCs on Windows clients.
- provides a user-friendly interface that ensures ease of use and makes it possible to gather all relevant information at a glance. In addition, integration with an existing IT SIEM infrastructure ensures information transparency at all levels.
By intensifying safety monitoring, SINEC Security Monitor makes a fundamental contribution to avoiding security risks and their consequences, including physical damage, possible reputation damage, and financial losses.