It is time to take a quantum leap in IoT cybersecurity

Issue 8 2022 Cyber Security

Year after year, more IoT devices are manufactured and connected. According to a report by Meticulous Research, the IoT security market is expected to grow at a CAGR of 21.2% from 2022–2029, and to reach $59.16 billion by 2029.

Fred Mitchell.

IoT has become integrated everywhere, including enterprises. While it offers many benefits, such as increased productivity and the rollout of mission critical applications, it can also lead to (enterprise) cyber-attack vulnerabilities.

Take Verkada, the US-based IoT building security start-up that was hacked in 2021, exposing footage from over 150,000 connected surveillance cameras belonging to 95 customers including enterprises, schools, police, and hospitals.

To this end, Check Point Software has introduced Quantum IoT Protect, which automatically creates and autonomously enforces zero-trust network (ZTN) access profiles for IoT assets, protecting it against known and unknown cyber threats.

In addition, Check Point also protects the IoT devices by analysing and safeguarding the device’s firmware.

Quantum IoT Protect leverages threat intelligence, over 300 IPS signatures, firmware scanning, on-device run-time protection, and a single management console to protect all enterprises against known and unknown IoT cyberattacks.

Check Point Quantum IoT Protect features:

Autonomous Zero Trust Protection – it automatically builds and enforces ZTN profiles for an enterprise’s entire inventory of connected assets on their Quantum Security Gateways. The autonomous ZTN profiles, built on advanced AI technology, research, and behaviour analytics to extend zero-trust practices into IoT assets.

IoT and OT environments change frequently and it is important that your IoT security solution can automatically adapt in real-time to secure these devices.

Advanced network threat prevention – it blocks attempts to exploit known IoT vulnerabilities in real-time. Check Point offers over 10 000 protection options for IT and IoT-related vulnerabilities as well as several hundred targeted at Industrial Control Systems.

These can be applied as virtual patches, which is a huge benefit in a world where IoT device patches are near impossible to complete because of difficult-to-reach device locations, mission critical runtime, complex protocols, standards, etc.

Pre-emptive on-device security – the security is built directly into the IoT devices’ firmware, scanning it for vulnerabilities, and blocking any threats in real-time.

The solution continuously monitors the device’s firmware to ensure security is always up to date. With Quantum IoT Protect, Check Point is offering on-device runtime protection for device manufacturers to develop connected IoT devices with built-in firmware security.

Unified Management Console – offering IoT discovery, protection, policy creation, event analysis, and much more as an end-to-end solution through a single management console with Quantum IoT Protect.

Quantum IoT Protect is the only autonomous IoT solution that proactively prevents cyber threats at the device and network level. The reality is that enterprises require not only attack discovery, but also technology that can prevent it.


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Cyber is a core component of access control
Access Control & Identity Management Cyber Security
When it comes to access control and identity management, cybersecurity plays a critical role in helping to ensure that only authorised users can gain access to a system and that they are who they claim to be.

Governing cybersecurity from the top as a strategic business enabler
Cyber Security
C-Suite executives still do not take cybersecurity seriously enough, while boards are not nearly as engaged in cybersecurity as they are in other areas of oversight.

What to do in the face of growing ransomware attacks
Technews Publishing Cyber Security Security Services & Risk Management
Ransomware attacks are proliferating, with attackers becoming more sophisticated and aggressive, and often hitting the same victims more than once, in more than one way.

Can we reduce cyberattacks in 2023?
Cyber Security
Zero-trust cybersecurity strategy with simplicity and risk reduction at the heart is mandatory to reduce exponential cyberattacks in 2023, says GlobalData.

Key success factors that boost security resilience
Cyber Security
Adoption of zero trust, secure access service edge and extended detection and response technologies, all resulted in significant increases in resilient outcomes, as are executive support and cultivating a security culture.

Enterprise threats in 2023
News Cyber Security
Large businesses and government structures should prepare for cybercriminals using media to blackmail organisations, reporting alleged data leaks, and purchasing initial access to previously compromised companies on the darknet.

CA Southern Africa unmasks container security
Technews Publishing IT infrastructure Cyber Security
Adoption of software containers has risen dramatically as more organisations realise the benefits of this virtualised technology.

Shifts in threat landscape to industrial control systems
Cyber Security
Kaspersky’s ICS CERT researchers’ predictions include increased attack surface due to digitisation, activities of volunteer and cybercriminal insiders, ransomware attacks on critical infrastructure as well as the technical, economic and geopolitical effects, and the rise of potential vulnerabilities being exploited by attackers.

Advanced persistent cybercrime
Cyber Security
FortiGuard Labs predicts the convergence of advanced persistent threat methods with cybercrime. Advanced persistent cybercrime enables new wave of destructive attacks at scale, fuelled by Cybercrime-as-a-Service.

Digital razor wire: sharpening endpoint protection
Cyber Security
Crypto-mining, hacking, vulnerabilities, and threats – protecting the organisation’s endpoints has never been more important than it is today, says Reggie Nkabinde, consultant: modern platform-security at Altron Karabina.