Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
AntoinetteHodes
Employee
Employee

The anatomy of our rugged security gateway, the 1570R!

Today’s “Sparkling” topic … our amazing rugged security gateway, the 1570R

Rugged appliances ensure industrial sites, manufacturing floors and mobile fleets are connected and secure. The Check Point Quantum Rugged 1570R Next Generation Firewall secures Critical Infrastructures and Industrial Control Systems (ICS) without impacting operations. Our NGFWs identify and secure over 70 standard and proprietary SCADA (Supervisory Control and Data Acquisition) and ICS protocols. This includes the most popular protocols used in Utilities and Energy sectors, Manufacturing sectors, Building Management Systems and IoT (Internet of Things) devices. Deploy the 1570R in Layer 3 routed mode or in Layer 2 bridge mode. The dynamic routing suite enables the 1570R to fit seamlessly into existing large scale networks.

1570R.jpg

The rugged gateway is ideal for deployment in harsh environments. The 1570R is certified for the industrial specifications IEEE 1613 and IEC 61850-3 for heat, vibration, and immunity to electromagnetic interference (EMI). In addition, the 1570R is certified for maritime operation per IEC-60945 and IACS E10 and complies with DNV-GL-CG-0339. The small desktop form factor 1570R mounts on walls or on DIN rails from the back or bottom. Connecting redundant power supplies is supported, ensuring continuous operation in case one power source fails. For added redundancy, two 1570R firewalls can be deployed in a High Availability cluster. The dual SIM LTE modem ensures the 1570R stays connected to operational management networks.

IT/OT Network Segmentation Check Point Next-Generation Firewalls provide boundary protection between IT and OT networks and micro-segmentation among product lines and departments on the shop floor. With granular visibility into over 1,604 SCADA protocols and commands. Virtual Patching Protect unpatched ICS systems from known exploits. Automatically activate security protections against known CVEs by installing the appropriate IPS signatures on the gateways. This allows effective protection against unpatched systems or systems running on legacy operating systems and software; without disrupting critical processes and business operations. ICS/SCADA Protocol Support BACNet, CIP, DNP3, IEC-60870-5-104, IEC 60870-6 (ICCP), IEC 61850, MMS, ModBus, OPC DA & UA, Profinet, Step7 (Siemens) and more. See the full list at appwiki.checkpoint.com

We also offer advanced ICS enforcement using Deep Packet Inspection. Packet Inspection (DPI) is an advanced feature that can provide detailed logging, and enforce policy rules on functions and register values. Like Function code, Unit ID, Address Range and Group.

 

0 Replies

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events