Check Point Software’s new rugged gateway secures industrial control systems and critical infrastructures against the most advanced cyber-threats
Check Point Software Technologies Ltd. has announced the new 1570R rugged security gateway to protect networks in critical infrastructure, Industrial Control Systems (ICS) and SCADA systems against all types of advanced Gen V cyber-threats. The 1570R delivers unrivalled performance, threat prevention security technology, ease of deployment and control, and reliability to the most demanding industrial settings such as power plants, automated factories and maritime fleets.
Securing today’s critical infrastructure, ICS and SCADA systems against cyber-attacks is more challenging than ever before as they are connected to complex, distributed networks and smart IoT devices using specialised protocols. IBM’s 2020 Threat Intelligence Index showed that targeted attacks against ICS and SCADA assets increased over 2,000% in 2019, often involving nation-states or using ransomware to damage operations. The SANS 2019 State of OT/ICS Cybersecurity Survey showed that 61% of incidents disrupted operational technology (OT). This expanded attack surface, the move to Industry 4.0 automation, and the rapid shift to remote working enforced by Covid-19 lockdowns, demands the most advanced, comprehensive security to stop threats propagating from employees’ laptops and mobiles to infect OT systems.
“During the Covid-19 pandemic, attacks have increased against the OT networks and ICS/SCADA systems that manage critical infrastructure for energy, manufacturing, transportation, and utilities. The disruption these attacks caused has made security a higher priority – but it must also be easy for organisations to deploy, with automated protection that does not impact day-to-day operations,” said Robyn Westervelt, IDC’s Research Director, Security & Trust. “Check Point’s ICS Security solution and 1570R gateways couple network segmentation with automation and threat intelligence to protect critical infrastructure and prevent even the most sophisticated cyber-attacks from impacting production operations.”