- The new technology will be integrated into Check Point’s Infinity architecture
- The technology will be able to tackle IoT related threats and vulnerabilities without disrupting critical operations
Dr. Dorit Dor,vice president, products, Checkpoint, said, ““The 5th and 6th generations of cyber threats are leveraging the growing usage of new and developing platforms, including IoT devices which require extending cyber security solutions capabilities. Incorporating Cymplify into Check Point’s Infinity architecture will strengthen our ability to reduce our customers’ exposure to the IoT cyber risk, and proactively tackle IoT related threats and vulnerabilities without disrupting critical operations”.
5th and 6th generation of cyber attacks
The new technology will be integrated into Check Point’s Infinity architecture. The penetration of Internet-of-things (IoT) devices in consumer,eEnterprise, industrial and healthcare organizations, and their security weaknesses, have created a security blind spot where cybercriminals launch 5th and 6th generation of cyber attacks to breach devices (IP camera surveillance), manipulate their operation (medical device infiltration) or take over critical infrastructure (manufacturing plant) which leads to heavy loss.