Call a Specialist Today! (02) 9388 1741
Free Delivery! Free Delivery!

The Latest Check Point News
Product and Solution Information, Press Releases, Announcements

Check Point Software Technologies revolutionizes IoT Cyber Security
Posted: Thu Nov 14, 2019 09:22:04 AM
 

Acquired ground-breaking on-device IoT security technology to Protect Against 5th and 6th Generation Cyber Attacks

SAN CARLOS, CA — Thu, 14 Nov 2019

Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, today announces a new IoT cyber security technology. Check Point is the first vendor to provide a consolidated security solution that hardens and protects the firmware of IoT devices and makes them secure against the most sophisticated attacks.

The technology is provided through the acquisition of Cymplify, a startup based in Tel Aviv. The new technology will be integrated into Check Point’s Infinity architecture.

The proliferation of Internet-of-things (IoT) devices in Consumer, Enterprise, Industrial and Healthcare organizations, and their inherent security weaknesses, have created a security blind spot where cybercriminals launch 5th and 6th generation of cyber attacks to breach devices (IP camera surveillance), manipulate their operation (medical device infiltration) or even take over critical infrastructure (manufacturing plant) to generate colossal damage.

With the technology, it is now possible to take an IP camera, a Smart TV, an elevator controller or a medical device such as an infusion pump, and in a rapid manner, harden and protect it against advanced zero day attacks.

”Today’s announcement represents our continuous effort to provide the best cyber security on all digital platforms” said Dr. Dorit Dor, Check Point’s VP Products. “The 5th and 6th generations of cyber threats are leveraging the growing usage of new and developing platforms, including IoT devices which require extending cyber security solutions capabilities. Incorporating Cymplify into Check Point’s Infinity architecture will strengthen our ability to reduce our customers’ exposure to the IoT cyber risk, and proactively tackle IoT related threats and vulnerabilities without disrupting critical operations”.

 
« Return to News List