RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Check Point IoT Protect

Product
Developers: Check Point Software Technologies
Date of the premiere of the system: 2020/07/17
Technology: Firewall,  cybersecurity - Information loss preventions,  cybersecurity - Information management and events in a security system (SIEM),  Internet of Things of Internet of Things (IoT)

Main article: Information security of Internet of Things (Internet of Things)

2020: Announcement of the solution for protection of devices and IoT networks

On July 17, 2020 the Check Point Software Technologies company presented the solution for protection of devices and IoT networks. The solution is suitable for protection of the organizations from the most different spheres, for protection of the smart cities and smart buildings against different cyberthreats of the Sixth generation (Gen VI). IoT Protect prevents threats and allows to manage security to block even unknown cyber attacks both at the level of IoT network, and at the level of smart devices, using the investigation of threats and the innovation security services specific to IoT.

Check Point IoT Protect

According to the company, most the organizations in the most different sectors – commercial, industrial, public health and utility already implemented IoT-solutions and operational technologies (OT). All this increased their cyberrisks. For July, 2020 many IoT-devices, first, have vulnerabilities which cannot be corrected, and secondly, can use unsafe protocols of communication. Besides, often the organizations use devices from different suppliers. Many solutions are shadow (these are those devices about which use does not know IT department) – they are not controlled IT department and are connected to networks without authorization, so, the organizations cannot trace each attached device and cannot control all risks.

The recent research of Check Point among 400 IT and cybersecurity specialists confirmed these problems worldwide: 90% of respondents reported that their organizations have shadow IoT-devices in the networks, at the same time 44% said that at least a half of their IoT-devices was connected without the knowledge of IT specialists or security services. Only 11% of respondents said that they completely implemented the solution of security for IoT. 52% of the polled organizations did not take care of IoT security system at all.

As a result of 67% of large enterprises and 82% of medical institutions faced the incidents connected with IoT. The growing attacks on devices and IoT networks in combination with the transition to remote work caused by Covid-19 pandemic require complex structure of security which can reveal vulnerable smart devices, apply protective measures and prevent invasions.

File:Aquote1.png
The number of the IoT-devices connected to network for July, 2020 continues to grow. By 2025 the number of smart devices will make 41.6 billion in all industries, they will equip medical also research establishments, industrial buildings, offices. All of them are the desired purposes for cybercriminals therefore security becomes a priority task for the enterprises. Considering the volume and a variety of smart devices, the easy way of system deployment of security is necessary for the organizations. The solution Check Point IoT Protect Security uses automation and the analysis of threats. It simplifies risks assessment of devices, segmentation of network and prevention of threats, at the same time providing protection against difficult cyber attacks.

Robin Vestervelt, the director of research of IDC, Security & Trust told
File:Aquote2.png

Check Point IoT Protect provides management of security policies at the level of network together with gateways of security Check Point and nanoagents of IoT Protect which provide protection on the device. IoT Protect is integrated with different platforms of detection of assets of IoT in sectors of health care, the industry, smart offices and smart buildings, ensuring safety of hundreds of thousands of IoT devices.

The solution provides:

  • Complete analysis of IoT-devices and their risks: weak passwords, outdated built in software and the known vulnerabilities. The solution identifies and classifies each IoT device in any network by means of integration into the leading mechanisms of detection.
  • Elimination of vulnerabilities and prevention of threats of zero day even on not updated devices: all structures of Internet of Things can be "actually propatchena" for security remedial action, even those which have nepropatchenny microprograms or outdated operating systems. IoT Protect for July, 2020 contains 60 security services specific to IoT, for identification and prevention of unauthorized access and traffic on devices and servers and also for prevention of all attacks of the malware aimed at IoT. The nano-agent of IoT Defense can be also built in devices to provide the built-in protection against zero day.
  • Intuitive segmentation and network management of Zero Trust: the solution applies and implements safety rules for all network IoT on the basis of attributes of devices, risks and protocols and supports complete management of security policies on a uniform panel both for IT networks, and for IoT networks.

File:Aquote1.png
Many smart devices are inherently vulnerable and it is easy to crack them. It can be IP cameras, smart elevators, medical devices and industrial controllers. It is difficult to protect these growing networks of devices because of their variety, and it means that the organizations are vulnerable for the attacks.

Itay Greenberg, the vice president for Check Point product management told
File:Aquote2.png

IoT Protect offers an ecosystem of detection of IoT for protection of smart devices. Check Point supports open structure of the technology partners specializing in detection and classification of IoT devices in different areas. With some of which the agreements allowing clients of Check Point to receive the complete solution were signed. These partners for July, 2020 are Armis, MediGate, Claroty and Ordr. IoT Protect supports over 1600 protocols, applications and the IoT commands and operational technologies (OT) and also provides methods of compliance to regulatory requirements, including HIPAA, NERC CIP, GDPR and many others.