Intel Chooses Check Point for IoT Security

Intel® Pathfinder for RISC-V is a new platform for SoC (system on a chip) architects and system software developers who are building new IoT products.

Check Point Quantum IoT Protect provides on-device run-time protection against sophisticated zero day attacks. Check Point will enable IoT device manufacturers using the Intel® Pathfinder for RISC-V platform, to easily integrate state of the art security without impacting product performance.

LEARN MORE SOLUTION BRIEF

intel pathfinder floater

“Intel Pathfinder for RISC-V represents our ongoing commitment to accelerate the adoption of RISC-V and catalyze the ecosystem around an open-source and standards-based vision. We wanted to ensure this was done with state-of-the-art security, which is why we partnered with Check Point.”

Vijay Krishnan, General Manager
RISC-V Ventures from Intel

intel logo 1

Quantum IoT Protect

Revolutionary on-device runtime protection enables you to develop connected IoT devices with built-in firmware security that defends against the most sophisticated cyber attacks.

Inspection Icon

Assess Risk

Uncover security risks in your
IoT firmware

Built to prevent icon

Harden

Harden device with on-device runtime protection to prevent zero-day attacks

Globe Icon

Control

Define and enforce policies per device for ongoing network access

Benefits of Delivering Secure IoT

The axiom that one is only as secure as the weakest link highlights the need to make sure that every IoT device or sensor is secure. Check Point is ready to assist vendors with their IoT device security needs with an innovative and proven on-device embedded security solution.

On-device runtime protection blocks known and unknown (zero-day) cyberattacks

Lightweight, non-intrusive architecture means minimal impact on device performance

Cutting edge control flow integrity (CFI) technology and lightweight deployment

Consolidated management, visibility, and logging with Check Point Infinity Portal or API

100% firmware coverage (including 3rd-party components)

Comply with the top standards and regulations for IoT security (NIST, CISA, UL, ETSI)

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK