iot is coming! are you ready for it? · 2020. 7. 1. · iot is coming! are you ready for it? itzik...
TRANSCRIPT
‹#›©2020 Check Point Software Technologies Ltd. ©2020 Check Point Software Technologies Ltd.
IoT is Coming!
Are You Ready for It?
Itzik Feiglevitch | IoT Cyber Security Product Manager
‹#›©2020 Check Point Software Technologies Ltd.
IOTIS COMING
… OR IS IT ALREADY HERE?
©2020 Check Point Software Technologies Ltd. 2
‹#›©2020 Check Point Software Technologies Ltd.
How many IoT devices are
deployed inside your network?
©2020 Check Point Software Technologies Ltd. 3
‹#›©2020 Check Point Software Technologies Ltd.
20,000IoT DEVICES
ENTERPRISE
10,000 employees
10,000IoMT DEVICES
HOSPITAL
500 beds
5,000IIoT DEVICES
FACTORY
2,000 workers
IoT IS ALL AROUND US
©2020 Check Point Software Technologies Ltd. 4
‹#›©2020 Check Point Software Technologies Ltd.
IoT Devices are Hard to Secure
No Security-by-Design
Default Passwords
Unmanaged & Invisible
©2020 Check Point Software Technologies Ltd. 5
‹#›©2020 Check Point Software Technologies Ltd.
BACKDOOR FOR HACKERS
©2020 Check Point Software Technologies Ltd. 6
‹#›©2020 Check Point Software Technologies Ltd. ©2020 Check Point Software Technologies Ltd. 7
‹#›©2020 Check Point Software Technologies Ltd. ©2020 Check Point Software Technologies Ltd. 8
‹#›©2020 Check Point Software Technologies Ltd. ©2020 Check Point Software Technologies Ltd. 9
‹#›©2020 Check Point Software Technologies Ltd. ©2020 Check Point Software Technologies Ltd. 10
‹#›©2020 Check Point Software Technologies Ltd.
IoT VULNERABILITIES ARE ALL AROUND US
©2020 Check Point Software Technologies Ltd. 11
‹#›©2020 Check Point Software Technologies Ltd. ©2020 Check Point Software Technologies Ltd. 12
‹#›©2020 Check Point Software Technologies Ltd.
Autonomous IoT Security for Every Device in Any Environment
MULTI-LAYER IoT
THREAT PREVENTION
REAL-TIME
IoT RISK ANALYSIS
ZERO-TRUST
IoT SEGMENATION
Check PointIoT Cyber Security
©2020 Check Point Software Technologies Ltd. 13
‹#›©2020 Check Point Software Technologies Ltd.
Prevent unauthorized access and malicious intent from reaching IoT devices
Protect Your IoT Devices | Protect Your Network
xv
Prevent infected devices from compromising other network elements
x
Check PointIoT Cyber Security
©2020 Check Point Software Technologies Ltd. 14
‹#›©2020 Check Point Software Technologies Ltd.
AUTOMATICALLY DISCOVER
EVERY IoT DEVICE IN THE NETWORK
Granular information per device
©2020 Check Point Software Technologies Ltd. 15
‹#›©2020 Check Point Software Technologies Ltd.
Identify and Analyze IoT Security Risks
KNOW WHAT YOU DON’T KNOW
©2020 Check Point Software Technologies Ltd. 16
‹#›©2020 Check Point Software Technologies Ltd.
SERIOUSLY ?!!
MANUALPOLICY ?
©2020 Check Point Software Technologies Ltd. 17
‹#›©2020 Check Point Software Technologies Ltd.
with Automated IoT Policy
SAVE TIME AND EFFORT
IoT Policy
Builder
IoTIntelligence Cloud
©2020 Check Point Software Technologies Ltd. 18
‹#›©2020 Check Point Software Technologies Ltd.
BE PREPARED FOR THE
KNOWN & THE UNKNOWN
with Automated IoT Protections
©2020 Check Point Software Technologies Ltd. 19
‹#›©2020 Check Point Software Technologies Ltd.
make Every IoT Device ‘Safe-to-Use’
EMBEDDED NANO AGENTS
Analyze device firmware1
2
3
Automatically generate
tailored Nano Agent
On-Device Runtime Protection
©2020 Check Point Software Technologies Ltd. 20
‹#›©2020 Check Point Software Technologies Ltd.
CHECK POINT
IoT CYBER SECURITYAutonomous Security Built for IoT
©2020 Check Point Software Technologies Ltd. 21
‹#›©2020 Check Point Software Technologies Ltd. ©2020 Check Point Software Technologies Ltd.
THANK YOU