Network Perception and Check Point Software Technologies have integrated security technologies, making it possible to ensure that OT firewall environments are properly configured and continuously verified for the protection of critical assets.
Check Point provides the security infrastructure while Network Perception’s NP-View platform protects critical assets by providing compliance verification, cybersecurity visibility and operational velocity, allowing for the continuous verification and visualization of the security posture.
Network Perception NP-View uses the Check Point Security Management Restful API to import network device configurations, offline or continuously, to instantly visualize network architecture, identifying all points of network connectivity and the exposure of protected assets. The combined solution verifies access to ports and services across different trust zones to protect mission critical assets.
“Checking for firewall misconfigurations and conflicting rules sounds easy, but manual audits on dozens or hundreds of firewalls can take days or weeks of time – and one error or omission can expose your network to security vulnerabilities and risks,” said Robin Berthier, CEO of Network Perception.
“Integrating with Check Point ensures that a security infrastructure is configured the best way possible, protecting networks from the latest threats.”, Berthier continued.
“Network Perception’s platform takes essential auditing technology and makes it continuous for proactive OT network security that builds cyber resiliency,” said Jason Min, Head of Business Development at Check Point Software Technologies.
“By integrating our technologies, our joint solution allows for a fully consolidated cyber security architecture that protects business and OT infrastructure against sophisticated cyber-attacks across networks, endpoint, cloud and mobile.”, Min added.