New gateway with AI-based threat defense

Share post

A global leader in cyber security solutions is expanding its portfolio with a new gateway to better protect critical infrastructure (KRITIS) with OT and Industrial Control Systems (ICS).

The introduction of the Quantum Rugged 1595R gateway marks a turning point in IT security for Industrial Control Systems (ICS) and Operational Technology (OT) networks. Since these systems form the backbone of KRITIS around the world, integrating advanced products is not just an improvement, but a necessity.

Key features of the gateway include:

  • 400Mbps performance of AI-powered threat defense
  • Over 300 IPS signatures for malware detection in OT environments
  • Comprehensive asset discovery
  • IT-OT network segmentation
  • Secure 5G connection with 1Gbps
  • Support for 1830 SCADA and ICS protocols and commands
  • Compact 1U solid-state design, capable of operating between -40°C and +75°C, certified to strict specifications and equipped for maximum resiliency with key features such as Dual SIM and eSIM

Check Point is responding to the worrying increase in attacks against ICS and OT networks. These attacks are often sophisticated and potentially catastrophic. They target a nation's vital services and infrastructure. Hackers benefit from the fact that many ICS environments run on outdated technology that is ill-equipped to defend against modern IT threats.

Neutralize threats using AI

One of the standout features of the Quantum Rugged 1595R is its AI-based threat defense. This technology represents a paradigm shift from traditional methods. Instead of the reactive approach of responding to security breaches after they occur, the system anticipates IT threats and neutralizes them. This shift is critical in industrial environments because the consequences of an attack can go beyond digital disruption and lead to physical damage or business interruption.

Better network monitoring

Additionally, the asset discovery capability addresses a long-standing challenge in ICS and OT networks: transparency. These networks often consist of numerous connected devices, creating complex systems that are difficult to monitor. With Asset Discovery, network administrators gain critical insight into every connected device, making it easier to identify and remediate vulnerabilities.

Quantum Rugged 1595R (Image: CheckPoint)

🔎Quantum Rugged 1595R (Image: CheckPoint)

Another important aspect is the emphasis on network segmentation, particularly within the Purdue model. This strategy divides networks into different zones that have different security protocols. Such segmentation is essential in ICS environments to prevent incidents that are unavoidable from spreading across zones, significantly reducing damage.

The Quantum Rugged 1595R Gateway is therefore a comprehensive approach to ICS and OT security by addressing specific, often overlooked nuances of these environments.

More at CheckPoint.com

 


About check point

Check Point Software Technologies GmbH (www.checkpoint.com/de) is a leading provider of cybersecurity solutions for public administrations and companies worldwide. The solutions protect customers from cyberattacks with an industry leading detection rate for malware, ransomware and other types of attacks. Check Point offers a multi-level security architecture that protects company information in cloud environments, networks and on mobile devices, as well as the most comprehensive and intuitive “one point of control” security management system. Check Point protects over 100.000 businesses of all sizes.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Mobile spyware poses a threat to businesses

More and more people are using mobile devices both in everyday life and in companies. This also reduces the risk of “mobile ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more