It is time to take a quantum leap in IoT cybersecurity

Issue 8 2022 Information Security, IoT & Automation

Year after year, more IoT devices are manufactured and connected. According to a report by Meticulous Research, the IoT security market is expected to grow at a CAGR of 21.2% from 2022–2029, and to reach $59.16 billion by 2029.


Fred Mitchell.

IoT has become integrated everywhere, including enterprises. While it offers many benefits, such as increased productivity and the rollout of mission critical applications, it can also lead to (enterprise) cyber-attack vulnerabilities.

Take Verkada, the US-based IoT building security start-up that was hacked in 2021, exposing footage from over 150,000 connected surveillance cameras belonging to 95 customers including enterprises, schools, police, and hospitals.

To this end, Check Point Software has introduced Quantum IoT Protect, which automatically creates and autonomously enforces zero-trust network (ZTN) access profiles for IoT assets, protecting it against known and unknown cyber threats.

In addition, Check Point also protects the IoT devices by analysing and safeguarding the device’s firmware.

Quantum IoT Protect leverages threat intelligence, over 300 IPS signatures, firmware scanning, on-device run-time protection, and a single management console to protect all enterprises against known and unknown IoT cyberattacks.

Check Point Quantum IoT Protect features:

Autonomous Zero Trust Protection – it automatically builds and enforces ZTN profiles for an enterprise’s entire inventory of connected assets on their Quantum Security Gateways. The autonomous ZTN profiles, built on advanced AI technology, research, and behaviour analytics to extend zero-trust practices into IoT assets.

IoT and OT environments change frequently and it is important that your IoT security solution can automatically adapt in real-time to secure these devices.

Advanced network threat prevention – it blocks attempts to exploit known IoT vulnerabilities in real-time. Check Point offers over 10 000 protection options for IT and IoT-related vulnerabilities as well as several hundred targeted at Industrial Control Systems.

These can be applied as virtual patches, which is a huge benefit in a world where IoT device patches are near impossible to complete because of difficult-to-reach device locations, mission critical runtime, complex protocols, standards, etc.

Pre-emptive on-device security – the security is built directly into the IoT devices’ firmware, scanning it for vulnerabilities, and blocking any threats in real-time.

The solution continuously monitors the device’s firmware to ensure security is always up to date. With Quantum IoT Protect, Check Point is offering on-device runtime protection for device manufacturers to develop connected IoT devices with built-in firmware security.

Unified Management Console – offering IoT discovery, protection, policy creation, event analysis, and much more as an end-to-end solution through a single management console with Quantum IoT Protect.

Quantum IoT Protect is the only autonomous IoT solution that proactively prevents cyber threats at the device and network level. The reality is that enterprises require not only attack discovery, but also technology that can prevent it.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Highest increase in global cyberattacks in two years
Information Security News & Events
Check Point Global Research released new data on Q2 2024 cyber-attack trends, noting a 30% global increase in Q2 2024, with Africa experiencing the highest average weekly per organisation.

Read more...
Upgrade your PCs to improve security
Information Security Infrastructure
Truly secure technology today must be designed to detect and address unusual activity as it happens, wherever it happens, right down to the BIOS and silicon levels.

Read more...
Open source code can also be open risk
Information Security Infrastructure
Software development has changed significantly over the years, and today, open-source code increasingly forms the foundation of modern applications, with surveys indicating that 60 – 90% of the average application's code base consists of open-source components.

Read more...
DeepSneak deception
Information Security News & Events
Kaspersky Global Research & Analysis researchers have discovered a new malicious campaign which is distributing a Trojan through a fake DeepSeek-R1 Large Language Model (LLM) app for PCs.

Read more...
SA’s strained, loadshedding-prone grid faces cyberthreats
Power Management Information Security
South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Survey highlights cost of cyberdamage to industrial companies
Kaspersky Information Security News & Events
The majority of industrial organisations estimate their financial losses caused by cyberattacks to be over $1 million, while almost one in four report losses exceeding $5 million, and for some, it surpasses $10 million.

Read more...
Digital economy needs an agile approach to cybersecurity
Information Security News & Events
South Africa is the most targeted country in Africa when it comes to infostealer and ransomware attacks. Being at the forefront of the continent’s digital transformation puts South Africa in the crosshairs for sophisticated cyberattacks

Read more...
SIEM rule threat coverage validation
Information Security News & Events
New AI-detection engineering assistant from Cymulate automates SIEM rule validation for SecOps and blue teams by streamlining threat detection engineering with automated testing, control integrations and enhanced detections.

Read more...
Cybersecurity a challenge in digitalising OT
Kaspersky Information Security Industrial (Industry)
According to a study by Kaspersky and VDC Research on securing operational technology environments, the primary risks are inadequate security measures, insufficient resources allocated to OT cybersecurity, challenges surrounding regulatory compliance, and the complexities of IT/OT integration.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.