Today, in conjunction with Check Point’s IoT Protect Program announcement, we’re excited to not only highlight Ordr’s participation in the program, but also to announce the Ordr Systems Control Engine’s availability directly through Check Point. We’re excited to work with a great security partner with market leading technology.
When we built the Ordr SCE, we created a robust AI platform to deliver high-fidelity visibility and security for all unmanaged devices – IoT, IoMT and OT. However, we knew that was not enough. We also focused on automating the critical job of securing these devices, not only reducing the burden on security and networking teams but making previously complex management tasks simple and automatic.
After all, these unmanaged and IoT devices bring very different challenges to an organization. They often cannot be brought out of service, they cannot be scanned or patched, and you cannot install a security agent on them. But unlike end users, unmanaged and IoT devices have very specific and predictable communications patterns. Video cameras need to connect to a camera management system. Medical imaging devices need to communicate to a central PACS or DICOM server. Neither wakes up in the morning and decides to browse the web.
How does Ordr address this? Once we discover and categorize these devices, Ordr’s Flow Genome maps each device’s unique, customer-specific communications patterns and profiles exactly how it should communicate and behave. We then proactively create specific network segmentation policies for each category of device and enforce them on networking and security infrastructure to only allow these “sanctioned communications.”
This is a Zero Trust Network in action.
Ordr SCE does not create segmentation policy recommendations, guidelines, or suggestions. The policies do not need tweaking or customizing. They do not need updating when new devices join the network, or existing devices move to a new location or receive a new IP address. They do not need to be exported as a CSV file, manually uploaded into another system, and refreshed with a chron job. They fully integrate with Check Point’s APIs, providing full, automated context right in the Check Point IoT Protect Manager.
This is the differentiator of the Ordr and Check Point integration. Whether it is proactive segmentation or quarantining an infected device, we will dynamically create and enforce policies for IoT devices with one click of a button. As new devices are added to the network that match a particular device profile with an active policy, this new device will automatically be protected.
This is a huge benefit for any organization with Check Point infrastructure, as it protects your existing investment. At the same time, our ability to generate these policies alleviates the challenges of manually addressing risks and vulnerabilities across the hundreds of thousands of unmanaged and IoT devices that may exist in a network.
Benefits of combining the Check Point and Ordr solutions include:
- Automatic discovery and classification of IoT, IoMT and OT devices
- Direct integration of device context into the Check Point IoT Protect Manager, including asset type, make and model, OS version and risk information
- Use of Check Point’s advanced APIs to automatically send Ordr Zero Trust segmentation policies to the Check Point IoT Protect Manager for distribution to Check Point’s Quantum Security GatewaysTM
- Automatic updates of Check Point’s Quantum Security GatewaysTM with current device IP information, regardless of network location or dynamic addressing
- Dynamic generation of firewall zoning policies directly into Check Point IoT Protect Manager , allowing for protection and control of the IoT and OT environment within minutes
For more information on the joint integration, please check out our detailed Check Point partnership page here and the Check Point IoT Protect page.
Interested in Learning More?
Subscribe today to stay informed and get regular updates from Ordr Cloud