Medigate + Check Point

Medigate and Check Point offer a joint security solution for medical devices and healthcare IoT tailored to the unique security needs of hospitals and clinics.


Learn How the Solution Works

Featured IoT Partner

Watch the video to learn how the integrated solution discovers medical devices and healthcare IoT in a clinical network, and enforces a context-aware policy based on these devices’ attributes.

Medigate’s passive platform is easily installed within a hospital’s network and integrates with Check Point’s R80 management system and Security Gateways. Once connected, Medigate’s medical device security platform shares identified device and application information with Check Point’s SmartConsole. This enables an all-in-one viewing experience for complete device visibility information generated by both platforms, creating a seamless experience.

It all starts with granular visibility of every medical device on the network. Utilizing deep packet inspection, Medigate provides fingerprinting of a device’s unique identifiers, including: configuration, utilization, performance and location. Integrating the two systems enables the data from both systems to be displayed within the Check Point SmartConsole, removing the needed to flip back and forth between dashboards.

Having the ability to tag medical devices by functionality type, vendor and model name enables more granular policy management capabilities. Medigate also makes sure that the tags stay current by constantly monitoring changes in the device’s network properties, such as IP address and software version.

Four types of security policies through Check Point’s Security Gateways:

  1. Network Segments Restriction
    Authorize and block access between network segments tailored by device types / other device clustering logic (e.g. restrict medical device of a particular manufacturer access to Internet domains).
  2. Port Restriction
    Leverage Medigate’s clinical domain expertise to control a device’s authorized ports and enforce only vendor-approved communications.
  3. Protocol Restriction
    Reach the deepest level of network traffic inspection, authorizing only proprietary device protocols and block threatening communication methods
  4. Group to Group Restriction
    Authorize connections between specific devices, such as an infusion pump and its dedicated gateway and server, while blocking all communication out of manufacturer scope.

Ready to Experience Check Point IoT Security Solution?

This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.