webvic-c

Check Point Software introduces IoT Protect solution

Security

Check Point Software Technologies, a cybersecurity solutions provider, has introduced its Internet of Things (IoT) Protect solution to secure IoT devices and networks from all types of advanced Gen VI cyber threats in smart building, smart city, healthcare, industrial and critical infrastructure environments

The solution provides capabilities for threat prevention and security management to block even unknown cyber-attacks at IoT network and IoT device level, using threat intelligence and innovative IoT-specific security services.

IoT and Operational Technology (OT) solutions have been deployed by most organisations across the commercial, industrial, healthcare and utility sectors but this has significantly increased their cyber risk. Many IoT devices have vulnerabilities, and can not be patched or use unsafe protocols of communication.

Additionally, organisations have diverse device estates from multiple vendors, with many shadow devices unmanaged and connected to networks without authorisation, thus organisations have limited visibility and control of devices and their associated risks.

“The number of Internet-connected IoT devices is continuing to accelerate and will reach 41.6bn by 2025. Cyber criminals target IoT devices across all industries, including medical, industrial, smart building, smart office, so companies place high priority on security. Given the enormous volume and variety of IoT devices,organisations need an easy way to deploy security,” said Robyn Westervelt, IDC’s research director, security and trust.

Check Point’s IoT Protect Security solution uses automation and threat intelligence to provide device risk assessment, network segmentation, and threat prevention from the most sophisticated cyber-attacks.”

Check Point's IoT healthcare, industrial, smart office Protect, together with Check Point security gateways and IoT Protect Nano-Agents, provide network-level security and policy management, enabling on-device runtime protection.