Check Point and Tenable.ot (powered by Indegy) secure ICS and OT networks with ICS-specific asset discovery, passive OT monitoring and zero-trust segmentation for efficient and effective OT security.READ THE SOLUTION BRIEF
OT systems and ICS networks are vulnerable to threats. An approach that provides real-time visibility and security, while addressing the unique technical and operational requirements of these networks is needed.
Check Point and Tenable have partnered to provide customers with a seamless offering to increase visibility into ICS and OT networks as well as to protect them from cyber threats.
Tenable.ot’s advanced OT-specific asset discovery and tracking capabilities integrate with Check Point’s proven security gateways to dynamically populate security policy assets with ICS and OT attribute tags. Tenable.ot continuously updates discovered assets such as IP address, device type, vendor and model in the OT network and dynamically applies these insights to the security policy, saving firewall administrators time and improving overall cybersecurity posture.