MENU

Check Point acquires ‘groundbreaking’ on-device IoT security technology

Check Point acquires ‘groundbreaking’ on-device IoT security technology

Business news |
By Rich Pell



The technology, says the company, is provided through the acquisition of Israel-based embedded security startup Cymplify, and will be integrated into its Infinity cybersecurity architecture.

“[This] announcement represents our continuous effort to provide the best cyber security on all digital platforms,” says Dr. Dorit Dor, Check Point’s VP Products. “The 5th and 6th generations of cyber threats are leveraging the growing usage of new and developing platforms, including IoT devices, which require extending cyber security solutions capabilities. Incorporating Cymplify into Check Point’s Infinity architecture will strengthen our ability to reduce our customers’ exposure to the IoT cyber risk, and proactively tackle IoT related threats and vulnerabilities without disrupting critical operations.”

The proliferation of IoT devices in consumer, enterprise, industrial and healthcare organizations, and their inherent security weaknesses, says the company, have created a security blind spot where cybercriminals launch 5th- and 6th-generation cyber attacks to breach devices (IP camera surveillance), manipulate their operation (medical device infiltration), or even take over critical infrastructure (manufacturing plant) to generate colossal damage.

With the new technology, says the company, it is now possible to take an IP camera, a Smart TV, an elevator controller or a medical device such as an infusion pump, and in a rapid manner, harden and protect it against advanced zero day attacks. The company’s multilevel security architecture – “Infinity Total Protection with Gen V advanced threat prevention” – is designed to defend an enterprise’s cloud, network, and mobile devices.

Cymplify developed a firmware analysis engine combined with an on-device software security hardening module for IoT Security. Highly detailed cybersecurity posture reports are yielded to an on-device agent, which optimizes the agent’s protection controls, and provides a tailor-made, embedded security suite for every device, protecting from known vulnerabilities and zero-day exploits.

Check Point says it currently protects over 100,000 organizations of all sizes.

Check Point Software Technologies

Related articles:
Protecting IoT devices from cyberattacks: A critical missing piece
Hardware-based cybersecurity startup raises funds to safeguard the IoT
Silicon-based security-as-a-service platform protects IoT edge devices
IoT security solution makes protecting edge devices easy

If you enjoyed this article, you will like the following ones: don't miss them by subscribing to :    eeNews on Google News

Share:

Linked Articles
10s