Security Experts:

Connect with us

Hi, what are you looking for?



Check Point Partners With SCADAfence to Protect OT Networks

Integrated Solution Provides Visibility and Improved Separation between IT and OT Environments

Integrated Solution Provides Visibility and Improved Separation between IT and OT Environments

Israeli industrial cybersecurity firm SCADAfence has teamed up with network security giant Check Point Software to offer integrated cyber protection for critical infrastructure and industrial control organizations.

SCADAfence offers passive network monitoring tools that allow both IT security and operation technology (OT) personnel to have continuous control of their industrial networks, with full visibility into day-to-day operations and detection of abnormal behavior, such as cyber-attacks and non-malicious human errors and misconfigurations.

According to the two firms, the integration of SCADAfence’s platform and Check Point’s IT and OT security solutions will provide administrators with a “single pane of glass” for IT and OT security incidents.

Customers can also leverage the technology to improve their planning of IT/OT network separation, and internal OT segmentation within industrial networks, the companies say.

Specifically, product documentation explains that the SCADAfence platform analyzes different roles and activity of industrial assets to help administrators determine the optimum location and configuration of IT/OT separation and internal firewall segmentation. Separating the IT and OT environment and creating segmentation inside the industrial network using Check Point ICS/SCADA firewalls reduces the attack surface, they say.

“Check Point’s ICS/SCADA cyber security solutions provide advanced threat prevention paired with ruggedized appliance options and comprehensive protocol support with full visibility and granular control of SCADA traffic in order to ensure vital industrial assets are never compromised,” said Alon Kantor, vice president of business development, Check Point.

Additional details on the integration are available online.

Earlier this week, Check Point rival Palo Alto Networks announced a partnership and joint offering with Honeywell’s Industrial Cyber Security division, which will offer Palo Alto Networks’ Next-Generation Security Platform to customers that operate industrial facilities and critical infrastructure environments.  

Related: Learn More at the ICS Cyber Security Conference

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Expert Insights

Related Content

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...


Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.


Vulnerabilities in GE’s Proficy Historian product could be exploited for espionage and to cause damage and disruption in industrial environments.


A hacktivist group has made bold claims regarding an attack on an ICS device, but industry professionals have questioned their claims.

Cybersecurity Funding

Internet of Things (IoT) and Industrial IoT security provider Shield-IoT this week announced that it has closed a $7.4 million Series A funding round,...


Vulnerabilities in industrial routers made by InHand Networks could allow hackers to bypass security systems and gain access to OT networks.


Researchers have demonstrated that threat actors could obtain global private keys that protect some of Siemens’ industrial devices, and the vendor says it cannot...


Schneider Electric in recent months released patches for its EcoStruxure platform and some Modicon programmable logic controllers (PLCs) to address a critical vulnerability that...