Bob Bent

ICYMI, see the new ICS Security User Guide

Discussion created by Bob Bent Expert on Jul 30, 2018

ICS Enforcement Using Application Control

Check Point's ICS/SCADA cyber security solutions provide advanced Threat Prevention to ensure vital systems such as power generation facilities, traffic control systems, water treatment systems and factories are never compromised.

  • Our Next-Generation Firewall enables granular functional control of ICS protocols.
  • Log ICS protocols and commands for forensic analysis of incidents in your operation networks.

Application Control allows you to apply various industrial control system (ICS) applications in the Rule Base. You can apply a security policy on specific ICS protocols, or use more granular ICS commands.

 

Thanks Eyal Zaidman for this new SecureKnowledge asset.

Outcomes