iot security - coit · iot security protect your iot devices and keep your business running ©2018...

15
1 ©2019 Check Point Software Technologies Ltd. ©2019 Check Point Software Technologies Ltd. David Galdran Team Leader Industry, Telco and Goverment ICS Security Expert IoT Security Protect Your IoT Devices and Keep your Business Running

Upload: others

Post on 26-Jul-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

1©2019 Check Point Software Technologies Ltd. ©2019 Check Point Software Technologies Ltd.

David Galdran

Team Leader Industry, Telco and Goverment

ICS Security Expert

IoT SecurityProtect Your IoT Devices and Keep your Business Running

2©2018 Check Point Software Technologies Ltd.

IoT Security Represent a New Frontier

The Smarter Your Environment – The Higher the Risk

25%of all cyber

attacks involve

IoT devices

8 billionenterprise IoT

devices by 2021

4x risein IoT malwares

between 2017

and 2018

3©2018 Check Point Software Technologies Ltd.

Data Breaches

Data Tampering

Ransomwares

Denial of Service

Physical Damage

IoT Devices are Highly Vulnerable and Easy to Hack

Outdated SW / Legacy OS / No OS

Basic Micro Controllers

No Security-by-Design

Unmanaged Devices

Shadow Devices

Operational Limitations

©2019 Check Point Software Technologies Ltd.

4©2018 Check Point Software Technologies Ltd.

IoT Vulnerabilities are All Around Us

Healthcare IoT Industrial IoT Smart Building Smart Office

©2019 Check Point Software Technologies Ltd.

5©2018 Check Point Software Technologies Ltd.

Introducing...

Check Point Infinity for IoTProtect Your IoT Devices and Keep Your Business Running

Prevent IoT malicious intents

and unauthorized access to

IoT devices

Prevent infected devices

from compromising other

network elements

6©2019 Check Point Software Technologies Ltd.

Apply granularIoT-based policies

POLICYMANAGEMENT

Identify and block IoT malicious intents

THREATPREVENTION

Identify and analyze IoT devices and traffic

DISCOVERY& VISIBILITY

Block unauthorized IoT access and IoT traffic

SECURITYENFORCEMENT

END-TO-END IOT SECURITY

Reduce IoT Attack Surface, IoT Threat Prevention, Easy Deployment, Efficient and Unified

HEALTHCARE IOT INDUSTRIAL IOT SMART OFF ICE SMART BUILDING

7©2019 Check Point Software Technologies Ltd.

Quick and Easy Deployment

IoT Security GW

IoT

Discovery Engine

IoT Security

Controller

IoT Network

Security Gateway with IoT support

Control and restrict internal IoT traffic

IoT application control: Identify and control IoT protocols and commands

Integrated IPS designed for IoT devices

IoT Security Controller

Configure and manage granular IoT security rules

Auto generated policies based on customer’s profile

IoT Discovery Engine

Monitors the IoT traffic

Automatically identify IoT devices and provides deep insight information per device

8©2019 Check Point Software Technologies Ltd.

HEALTHCARE INDUSTRIAL ENTERPRISE

Dedicated discovery engines perfectly suited for the different IoT environments

Automatically Identify and Profile IoT Devices

9©2019 Check Point Software Technologies Ltd.

Deep Insight Information per Device

10©2019 Check Point Software Technologies Ltd.

! RISK SCORE: High

! RISK SCORE: Medium

! RISK SCORE: Low

Risk Analyzer

Password

Connection Type

Network Risk

Functionality & Severity

OS & Firmware

CVE

Risk Parameters

Set Risk Score for each Device

©2019 Check Point Software Technologies Ltd.

11©2019 Check Point Software Technologies Ltd.

Based on Check Point R80 Security Management System

Monitor IoT devices and traffic

Configure granular security rules based on IoT devices attributes

Automatically generate and update security rules based on real-time IoT network status

Separate IoT Policy Layer

©2019 Check Point Software Technologies Ltd.

12©2019 Check Point Software Technologies Ltd.

Simple and Unified IoT Policy Management

©2019 Check Point Software Technologies Ltd.

13©2019 Check Point Software Technologies Ltd.

Medical Devices High Risk Devices

Wireless Connected

Block External Internet Connection

Security Rules Based on IoT Devices Attributes

©2019 Check Point Software Technologies Ltd.

14©2019 Check Point Software Technologies Ltd.

Smart Building Devices

Source = IP Cameras Destination = BMSAccept only ONVIF protocol

Source = Hikvision Cameras

Destination = Hikvision Updates Server

Accept only https

©2019 Check Point Software Technologies Ltd.

Security Rules Based on IoT Devices Attributes

15©2019 Check Point Software Technologies Ltd. ©2019 Check Point Software Technologies Ltd.

THANK YOU