Check Point Software’s New Rugged Gateway Secures Industrial Control Systems and Critical Infrastructures Against The Most Advanced Cyber-Threats

By : Krishna Anindyo | Thursday, June 18 2020 - 15:00 IWST

Check Point Software Technologies (Images by Acclaim)
Check Point Software Technologies (Images by Acclaim)

INDUSTRY.co.id - Singapore – Check Point Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cybersecurity solutions globally, has announced the new 1570R rugged security gateway to protect networks in critical infrastructure, Industrial Control Systems (ICS) and SCADA systems against all types of advanced Gen V cyber-threats.

The 1570R delivers unrivalled performance, threat prevention security technology, ease of deployment and control, and reliability to the most demanding industrial settings such as power plants, automated factories and maritime fleets.

Securing today’s critical infrastructure, ICS and SCADA systems against cyber-attacks is more challenging than ever before as they are connected to complex, distributed networks and smart IoT devices using specialised protocols.

IBM’s 2020 Threat Intelligence Index showed that targeted attacks against ICS and SCADA assets increased over 2,000% in 2019, often involving nation-states or using ransomware to damage operations. The SANS 2019 State of OT/ICS Cybersecurity Survey showed that 61% of incidents disrupted operational technology (OT).

This expanded attack surface, the move to Industry 4.0 automation, and the rapid shift to remote working enforced by Covid-19 lockdowns, demands the most advanced, comprehensive security to stop threats propagating from employees’ laptops and mobiles to infect OT systems.

“During the Covid-19 pandemic, attacks have increased against the OT networks and ICS/SCADA systems that manage critical infrastructure for energy, manufacturing, transportation, and utilities. The disruption these attacks caused has made security a higher priority – but it must also be easy for organisations to deploy, with automated protection that does not impact day-to-day operations,” said Robyn Westervelt, IDC’s Research Director, Security & Trust. Thursday (6/18/2020).

“Check Point’s ICS Security solution and 1570R gateways couple network segmentation with automation and threat intelligence to protect critical infrastructure and prevent even the most sophisticated cyber-attacks from impacting production operations.”

Industry-leading performance and protection: 400 Mbps of Threat Prevention performance with over 60 security services to stop even zero-day attacks from disrupting operations. It enforces complete segmentation between IT and OT networks, and gives granular control across the OT environment.

Complete security for complex SCADA & ICS environments: it identifies and secures over 1,500 leading SCADA and ICS protocols and commands used in the utility and energy sectors, manufacturing, building management systems and IoT devices.

The 1570R flexibly supports wired, Wi-Fi or LTE modem network connections, enabling easy, flexible security for smart city applications (smart parking meters, bus stops, smart lighting, environmental sensors) and smart grids (smart meters, substation automation).

Rugged form factor: the 1570R’s solid-state form factor enables an extreme operational range from -40C to +75C. It is certified to the most stringent specifications (IEEE 1613 and IEC 61850-3) for heat, vibration, and immunity to electromagnetic interference.

"Targeted attacks against critical infrastructure and ICS increased by 20x during 2019 and have spiked again this year during the Covid-19 lockdowns, as hackers look to exploit remote-working vulnerabilities. The ‘Industry 4.0’ revolution is already well advanced, and will be further accelerated in response to the pandemic, so it is vital that we protect these infrastructures, from the shop floor and field to the cloud,” said Aviv Abramovich, head of security services management at Check Point.

"The 1570R gateway is optimised to deliver and automate that protection in the harshest industrial environments and remote locations, to prevent even advanced attacks from causing disruption and damage."

The 1570R complements Check Point’s existing range of security gateways that deliver full visibility and granular control of all network traffic to prevent attacks on networks, devices and logical processes.

These security appliances are managed via the latest R80 Security Management software, which supports zero-touch deployment and centralised network management via its intuitive web-based user interface.

News Comment

Today's Industry

Ian Hall - Asia-Pacific Client Services Manager, at Synopsys Software Integrity Group

Senin, 26 Oktober 2020 - 11:00 WIB

4 Steps for CISOs to Improve Their Organisation’s Application Security Program

Synopsys recently published its annual BSIMM report, created to help organisations plan, execute, measure, and improve their software security initiatives

Friedhelm Best - Vice President Asia Pacific, HIMA (Photo by HIMA)

Jumat, 23 Oktober 2020 - 14:30 WIB

Farm & Food 4.0: How Technology Is Transforming an Industry

Digitization has affected different industries, and especially now, the food and farming industries as well.

Rena Chua, Bug Bounty Advisor at HackerOne (Photo by Linkedin)

Jumat, 23 Oktober 2020 - 11:35 WIB

3 Key Problems Security Professionals Have With Traditional Penetration Testing

Based on customer interviews, the study identifies 3 key problems with traditional pentesting solutions and evaluates the benefits of time-bound testing using ethical hackers.

The Pacific Asia Travel Association (PATA)

Jumat, 23 Oktober 2020 - 11:20 WIB

PATA Embarks On Governance Reorganisation

The Pacific Asia Travel Association (PATA) has taken the bold move to make significant changes to the design of its organisational governance at the recent Board Meeting and Annual General Meeting…

Yaffa Finkelstein - Product Marketing Manager, Check Point Software Technologies (Photo by Linkedin)

Kamis, 22 Oktober 2020 - 10:35 WIB

Secure Your Containers Like Your Apps Depend On It

Today we’ll share some of the container security concerns which you might not have considered until now, and we’ll explain how to mitigate those risks, without imposing on your agile DevOps…