Check Point + Tenable.ot

Check Point and Tenable.ot (powered by Indegy) secure ICS and OT networks with ICS-specific asset discovery, passive OT monitoring and zero-trust segmentation for efficient and effective OT security.

Tenable.ot and Check Point's Integrated Solution

OT systems and ICS networks are vulnerable to threats. An approach that provides real-time visibility and security, while addressing the unique technical and operational requirements of these networks is needed.
Check Point and Tenable have partnered to provide customers with a seamless offering to increase visibility into ICS and OT networks as well as to protect them from cyber threats.

Tenable.ot’s advanced OT-specific asset discovery and tracking capabilities integrate with Check Point’s proven security gateways to dynamically populate security policy assets with ICS and OT attribute tags. Tenable.ot continuously updates discovered assets such as IP address, device type, vendor and model in the OT network and dynamically applies these insights to the security policy, saving firewall administrators time and improving overall cybersecurity posture.

How the Solution Works

  • Get detailed visibility across IT and OT devices, their attributes and risk level
  • Get an in-depth view of external and internal threats targeting OT environments
  • Automate asset discovery, classification, tracking and application of firewall protections
  • Apply policies for every device in the IT and OT networks based on risk level
  • Apply virtual patching using Check Point Next Generation Firewalls

Ready to Experience Check Point IoT Security Solution?

This website uses cookies to ensure you get the best experience. Got it, Thanks! MORE INFO