White Paper - Protecting IoT (Internet of Things) implementations with R80.10 and later Unified Policy, Protocol Signature, and Segmentation

Document created by Eric Beasley Employee on Dec 28, 2018Last modified by Eric Beasley Employee on Dec 28, 2018
Version 2Show Document
  • View in full screen mode

White Paper

 

Protecting IoT (Internet of Things) implementations with R80.10 and later Unified Policy, Protocol Signature, and Segmentation

Defining protection of IoT technologies, like Ring, Ecobee, WEMO, Honeywell, Insteon, and Bloomsky, or ADT security and VOIP solutions like Ooma, in a well segmented and defined network utilizing the full suite of Check Point R80.10 and later technologies, including Protocol Signature and inline layers.

Outcomes