Check Point

09 November 2021

Nine in 10 respondents in a Check Point survey said their networks had shadow IoT devices – and 44% said half were connected without their knowledge. As a result, seven out of 10 reported IoT-related incidents.

The company says IoT Protect, part of its Infinity security architecture, features zero-trust policies that use device-specific attributes and risk profiles to shield networks from known vulnerabilities with virtual patching before they can be exploited.

Check Point says its Infinity architecture uses continuously updated threat intelligence from the company’s ThreatCloud, which aggregates threat intelligence from hundreds of millions of sensors worldwide.

The company says IoT Protect automatically identifies and classifies every IoT device and its risk profile using discovery engines and creates perfectly suited policies with the industry’s broadest application control. And it says IoT devices can be “virtually patched” to fix security flaws, even those with unpatchable firmware or legacy operating systems. IoT Defense Nano-Agent can also be embedded on devices.