Medigate + Check Point

Medigate and Check Point offer a joint security solution for medical devices and healthcare IoT tailored to the unique security needs of hospitals and clinics.

ソリューション概要を読む 動画を見る

Learn How the Solution Works

Featured IoT Partner

Watch the video to learn how the integrated solution discovers medical devices and healthcare IoT in a clinical network, and enforces a context-aware policy based on these devices’ attributes.

Medigate’s passive platform is easily installed within a hospital’s network and integrates with Check Point’s R80 management system and Security Gateways. Once connected, Medigate’s medical device security platform shares identified device and application information with Check Point’s SmartConsole. This enables an all-in-one viewing experience for complete device visibility information generated by both platforms, creating a seamless experience.

It all starts with granular visibility of every medical device on the network. Utilizing deep packet inspection, Medigate provides fingerprinting of a device’s unique identifiers, including: configuration, utilization, performance and location. Integrating the two systems enables the data from both systems to be displayed within the Check Point SmartConsole, removing the needed to flip back and forth between dashboards.

Having the ability to tag medical devices by functionality type, vendor and model name enables more granular policy management capabilities. Medigate also makes sure that the tags stay current by constantly monitoring changes in the device’s network properties, such as IP address and software version.

Four types of security policies through Check Point’s Security Gateways:

  1. Network Segments Restriction
    Authorize and block access between network segments tailored by device types / other device clustering logic (e.g. restrict medical device of a particular manufacturer access to Internet domains).
  2. Port Restriction
    Leverage Medigate’s clinical domain expertise to control a device’s authorized ports and enforce only vendor-approved communications.
  3. Protocol Restriction
    Reach the deepest level of network traffic inspection, authorizing only proprietary device protocols and block threatening communication methods
  4. Group to Group Restriction
    Authorize connections between specific devices, such as an infusion pump and its dedicated gateway and server, while blocking all communication out of manufacturer scope.

Ready to Experience Check Point IoT Security Solution?

×
  フィードバック
このWebサイトは、機能性と分析およびマーケティングの目的でCookieを使用しています。Webサイトを引き続きご利用いただくことで、Cookieの使用に同意したことになります。詳細については、Cookieに関する通知をお読みください。
OK