Ordr + Check Point

Ordr and Check Point’s joint solution provides the most effective technology to identify, classify, regulate, and secure IoT and digital OT devices.

LESEN SIE DEN LÖSUNGSÜBERBLICK VIDEO ANSEHEN

Ordr logo with tagline

Ordr and Check Point’s Integrated Solution

Ordr and Check Point offer a joint security solution for different IoT environments, including  industrial, healthcare, smart office/building. The Ordr Systems Control Engine (SCE) combined with Check Point’s security gateways and management enable organizations to identify, classify, regulate, and secure IoT/OT devices from cyber-attacks.

How the solution works:

  • Passively discovers every connected device with high-definition detail and without agents
  • Automatically classifies IoT/OT assets in Check Point Security Management and maintains membership
  • Rapidly deploys zone-based segmentation per NIST and IEC 62443 with AI-created policies for Check Point Security Gateways
  • Continuously monitors device security risk, application, and behavior; vulnerable and compromised devices are quickly spotted so they can be quarantined
  • Enables Virtual Patching — Deployment of Check Point IPS signatures relevant to connected IoT assets
  • Verifies segmentation policy is effective using simple, graphical tools

Learn How The Solution Works

Ordr Video Screen Capture

Watch the video to learn how the integrated solution passively discovers:

  • Every connected device,
  • Classifies IoT/OT assets and
  • Monitors device security risk

The most effective means to protect IoT and digital OT devices is through zone-based segmentation and Zero Trust policy rules. Check Point Security Gateways provide scalable policy enforcement and zone controls for the enterprise. Ordr Systems Control Engine discovers, classifies and groups all devices and automatically maps them into their respective zones, areas, and cells using Check Point IoT Asset groups, and then dynamically generates Security Gateway policy rules based on these groups to deliver streamlined microsegmentation.

For example, building automation devices are seamlessly mapped to the Facilities Zone and facility devices within this zone are further segmented from each other. Security policy rules are enforced by Security Gateways to restrict access between zones, areas, and cells based on the minimum access required to allow devices to properly function while protecting them from insider or outsider attack. An HVAC system can talk with a trusted smart-building controller using approved protocols and applications such as BACnet, but blocked from communicating to the Internet or to another HVAC system.

Ordr SCE integrates natively with Check Point Security Management for multi-gateway policy enforcement. Security Gateways enforce zone-based segmentation policy to protect all devices inclusive of IoT and digital OT in the enterprise campus or manufacturing plant, the data center, as well as securing communications traversing the Internet edge. When new devices are connected to the network, they are automatically classified and updated in Check Point Security Management and Security Gateways with the proper IoT Asset membership. Through its network and device awareness, Ordr SCE maintains current IP addressing for IoT Assets in all Security Gateways.

Ready to Experience Check Point IoT Security Solution?

×
  Feedback
Diese Website verwendet Cookies für ihre Funktionalität sowie für Analyse- und Marketingzwecke. Mit der weiteren Nutzung der Webseite stimmen Sie der Verwendung von Cookies zu. Weitere Informationen finden Sie in unserem Cookies Hinweis.
OK