Protecting IoT (Internet of Things) implementations with R80.10 and later Unified Policy, Protocol Signature, and Segmentation

| December 28, 2018

article image
Defining protection of IoT technologies, like Ring, Ecobee, WEMO, Honeywell, Insteon, and Bloomsky, or ADT security and VOIP solutions like Ooma, in a well segmented and defined network utilizing the full suite of Check Point R80.10 and later technologies, including Protocol Signature and inline layers.

Spotlight

Echelon

Echelon Corporation a pioneer in developing open-standard embedded control networking platforms, delivers all the elements necessary to design, install, monitor and control industrial-strength ‘Internet of Things’ solutions for lighting, building automation and electricity grid modernization markets worldwide. Echelon develops and sells complete systems and subsystems, plus system-on-chips (SoCs), embedded software, and commissioning and management tools for OEMs. Our solutions are based on a multi-protocol distributed intelligence architecture, which makes them highly reliable, scalable and secure.

OTHER ARTICLES

The $6trn importance of security standards and regulation in the IoT era

Article | March 16, 2020

We live in an era of digital transformation where more and more devices are connecting to bring new and innovative levels of service and efficiency. This transformation spans across all markets and the rate of progress is breath-taking, says David Maidment, director, secure device ecosystem at Arm.This change brings huge benefits, but it also brings threats in the shape of an expanding cybercrime footprint. Every connected device is a hack potential. Rather than attacking traditional IT equipment, the cybercrime threats start to move to all aspects of our lives. It is predicted that by 2021 there will already be US$6 trillion (€5.37 trillion) of cybercrime damage (Source: Cybersecurity Ventures Official Annual Cybercrime Report), which is a staggering number pinned against financial loss for businesses, without considering the damage to reputation and other harder-to-measure statistics.

Read More

What is Google Pigweed? Google’s unveils new toys for IoT developers

Article | April 3, 2020

One might be forgiven for thinking that Google had enough operating systems. Other than Android, Google also owns Chrome OS and Google Fuchsia – the latter of which isn’t even finished yet! But then came murmurs of a project called Pigweed, following a Google trademark that surfaced in February this year. At first, speculation was rife that this was yet another operating system, due to wording that described it as “computer operating software.” Now we know that is not the case. So what is Google Pigweed? In a recent blog post, Google officially threw back the curtain. Google Pigweed, it turns out, is a collection of embedded platform developer tools for development on 32-bit microcontrollers. Effectively, these are libraries targeted at Internet of Things (IoT) applications.

Read More

How Will IoT Revolutionize Pharmaceutical Manufacturing?

Article | April 17, 2020

Pharma is big business, but what it’s not generally recognized is, in large part, a manufacturing business with complex supply chains, finicky chemical processes and products that have to meet stringent quality controls. Few of those outside the industry think about how drugs are made safely, efficiently and at scale with reliable quality and in precisely measured doses. Even more interesting is the simple fact that pharma often produces sophisticated drugs using manufacturing processes that are decades out of date, and which are being phased out in comparable industries, such as chemical manufacturing.

Read More

How Retail Security Can Welcome IoT Innovations Without Putting Customers at Risk

Article | March 11, 2020

Retail businesses, from mom-and-pop shops to major department stores, are investing heavily in technology to enhance the in-store experience. With the imminent arrival of mainstream 5G, smarter systems are expected to dominate the retail space as the internet of things (IoT) expands. But as we know from connected device deployments in other sectors, such as financial services and healthcare, the IoT is fraught with security vulnerabilities. For retail security, the risks of deploying IoT devices are no less dire. As organizations rely more on the IoT to enable internet connection at every stage of the retail process, protecting IoT infrastructure is critical. Getting on board with the right mindset can go a long way toward achieving a win-win for retail security.

Read More

Spotlight

Echelon

Echelon Corporation a pioneer in developing open-standard embedded control networking platforms, delivers all the elements necessary to design, install, monitor and control industrial-strength ‘Internet of Things’ solutions for lighting, building automation and electricity grid modernization markets worldwide. Echelon develops and sells complete systems and subsystems, plus system-on-chips (SoCs), embedded software, and commissioning and management tools for OEMs. Our solutions are based on a multi-protocol distributed intelligence architecture, which makes them highly reliable, scalable and secure.

Events