Limited Time Offer!

For Less Than the Cost of a Starbucks Coffee, Access All DevOpsSchool Videos on YouTube Unlimitedly.
Master DevOps, SRE, DevSecOps Skills!

Enroll Now

Ordr and Check Point Team Up in IoT Protect Program

Source: iotevolutionworld.com

According to recent releases from both companies, Ordr, a company offering security for unmanaged devices and enterprise Internet of Things (IoT), has entered into an expanded partnership with Check Point Software and made availabile its products on the Check Point Global Price List.

Ordr Systems Control Engine (SCE) is designed to automatically discover, classify, and behaviorally profile IoT, IoMT, operational technology (OT), and unmanaged devices connected to enterprise networks. Now, the information collected by SCE is sent to Check Point’s IoT Protect Manager for finalization and enforcement through Check Point’s Quantum Security Gateways, the companies announced. The resulting security policies reportedly ensure IoT devices communicate only with approved destinations and services, eliminating the tedious work to manually define, tune and maintain segmentation policies.

“We are excited to bring Ordr SCE to our customers as part of Check Point’s IoT Protect Discovery program,” said Russ Schafer, Head of Product Marketing, Check Point. “The combination of Ordr’s Systems Control Engine and Check Point’s IoT Protect threat prevention solution provides our healthcare customers the visibility, security, and automation to protect networks from emerging IoT threats.”

Visibility into the network has been a major security concern for the IoT for years, and partnerships like this, that are intended to address this vulnerability, are critical to closing this hole.

The IoT Protect solution is designed to secure both IoT devices and networks in smart building, smart city, healthcare, industrial and critical infrastructure environments against all types of advanced Gen VI cyber-threats, Check Point said. A recent Check Point survey reportedly highlighted several security issues: 90 percent of respondents reported their organizations have shadow IoT devices on their networks, with 44 percent stating that at least half of their IoT devices were connected without the IT or security teams’ knowledge. Just 11 percent of respondents stated they had fully implemented an IoT security solution, and 52 percent have no IoT security deployed at all.

“The number of IoT devices connected to the Internet continues to accelerate and will be 41.6 billion by 2025. Cyber criminals are targeting IoT devices across all industries including medical, industrial, smart building, smart office, so enterprises are making security a high priority. Given the huge volume and variety of IoT devices, organizations need an easy way to deploy security.” said Robyn Westervelt, Research Director, Security & Trust, IDC. “Check Point’s comprehensive IoT Protect Security solution uses automation and threat intelligence to provide device risk assessment, network segmentation, and threat prevention from the most sophisticated cyber-attacks.”

Related Posts

Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x
Artificial Intelligence