How can I help you? Start Chat

US Phone: 1-866-488-6691
International Phone: +44-2036087492

  • E-Mail
  • Facebook
  • LinkedIn
  • Twitter

Critical Infrastructure & ICS/SCADA

Protecting critical infrastructure from cyberattacks poses unique challenges. The environments can be harsh and systems often use specialized protocols. Check Point’s ICS/SCADA cyber security solutions provide advanced threat prevention paired with ruggedized appliance options and comprehensive protocol support to ensure vital assets such as power generation facilities, traffic control systems, water treatment systems and factories are never compromised.

Check Point’s ICS/SCADA cyber security solutions video Check Point’s ICS/SCADA cyber security solutions video



How We Can Help

Full visibility and granular control of SCADA traffic

  • Our Next-Generation Firewall enables granular functional control of SCADA protocols
  • Log SCADA protocols, including commands and parameters for forensic analysis of incidents in your operation networks
  • Create a baseline of known/legitimate traffic to identify and prevent deviations and anomalies
  • Monitor your compliance to major regulations such as NERC CIP v5 using the Compliance Software Blade


Comprehensive security with SCADA-aware threat detection and prevention

  • Deploy the industry’s most extensive support of ICS/SCADA-specific protocols including BACNet, DNP3, IEC-60870-5-104, IEC 60870-6 (ICCP), IEC 61850, MMS, Modbus, OPC, Profinet, S7 (Siemens) and many others
  • Detect and prevent exploits of ICS vulnerabilities with SCADA IPS signatures, closing the window of exposure between vulnerable and patched systems
  • Leverage our full range of threat prevention capabilities including firewall, IPS, anti-malware, and sandboxing to detect and prevent inbound threats to SCADA networks
  • Our complete IT-OT security solution protects the corporate perimeter, the bridge between IT and OT networks and operator workstations and SCADA devices within the OT network
  • Quickly analyze risk through specialized threat reports in our Next-Generation SmartEvent
  • Maintain current, up-to-date threat protection platforms even in a highly regulated and/or offline environment with Private ThreatCloud


Deliver all security functions with ruggedized appliances

  • Our specialized appliances are designed for the extreme conditions of process control environments while integrating next-generation threat prevention including our Firewall, Application Control, Antivirus, Anti-Bot and SandBlast Zero-Day Protection (sandboxing)
  • Operates in extreme temperatures from -40°C to 75°C in a compact fan-less design with no moving parts
  • Complies with industrial specifications IEEE 1613 and IEC 61850-3 and certified for maritime operation per IEC-60945 and IACS E10, complies with DNV 2.4