CHECK POINT SOFTWARE TECHNOLOGIES in Industrial Control Systems Security Solutions

Tel Aviv, Israel
$1BN to $5BN
Discussions (0)
Demos (0)
Are you from this company?


Check Point uses security gateways, application control, unified central management, asset and anomaly detection, intrusion prevention, and secure harsh environments with 1200R to protect ICS networks from cyber attacks and malicious threats. Its 1200R solution delivers rugged, comprehensive security to most environments. Request CHECK POINT SOFTWARE TECHNOLOGIES Pricing to get more information.


The Check Point 1200R is an innovative security gateway appliance designed for harsh environments and remote deployments such as plant floors, remote electrical substations, and power generation facilities. The 1200R complements Check Point’s existing lineup of security gateway appliances that deliver full visibility and granular control of SCADA traffic to prevent networks, devices, and logical process attacks. Check Point also provides a full IT-OT security blueprint to protect the corporate perimeter, the bridge between IT-OT, operator workstations, and the SCADA devices and traffic to deliver the best security for ICS.

Check Point offers the most extensive SCADA security support with over 500 SCADA commands and parameters within the Check Point Firewall and Application Control Software Blades, and over 200 SCADA-specific IPS signatures. Specialized threat reports in Check Point Next Generation SmartEvent provide full reports on SCADA traffic to grant quick and detailed forensics for incident investigations.

The company offers the following products in the ICS security market: 
ICS Security Software

  • Application Control Software Blade
  • Intrusion Prevention System Software Blade
  • Antivirus Software Blade
  • Anti-Bot Software Blade
  • SandBlast Zero Day Threat Prevention
ICS Security Hardware
  • 1200R Rugged Appliances
  • Standard Appliances
  • Smart-1 Appliances with SmartEvent
  • Private ThreatCloud

Top Features

  • NERC-CIP compliant
  • Staffing
  • Data Audit & Classification
  • Risk Analysis
  • Activity Logging & Breach Identification
  • Fundamental Controls
  • Data Loss Prevention
  • Document Encryption
  • Hard Drive Encryption
  • Compliance Monitoring
  • Security Incident Management

Top Usecases

  1. Asset visibility and safety / Real-time monitoring
  2. Lower TCO
  3. Integration of legacy devices
  4. Increased productivity / improve system performance
  5. Security automation / central management
  6. Secure remote access
  7. Control system modernization / IT-OT consolidation

360 Quadrants

Strengths and Weaknesses
  • +7 Per Node/Asset
  • +9 Education & Training
  • +10 Managed Security Services
  • +5 Risk and Threat Assessment
  • +9 Software Enabled Methodology
  • +9 Cloud
  • +12 Hybrid
  • +10 On-premise
  • +7 Design & Integration
  • +14 Implementation
  • +9 Strategy consulting
  • +10 IOC detection tools
  • +5 Device Control
  • +14 Malicious file prevention
  • +5 ISO/TR 22100-4
  • +7 Deep packet inspection
  • +8 DoE - 21 steps for SCADA security
  • +8 Event Processor
  • +5 Flow Anomaly Processor
  • +9 High Availability options
  • -5 Continous Monitoring
  • -9 Smart Protection Suites
  • -5 As a Service
  • -8 Module Based
  • -14 Outcome Based
  • -6 Per User
  • -13 EDDL - Electronic Device Description Language
  • -12 FDT – field device tool
  • -11 ODVA
  • -5 Incident Response
  • -11 Support & Maintenance
  • -7 Risk Based Asset Classification
  • -8 Risk/VaR Simulation
  • -12 Regulatory compliance
  • -14 Log review tools
  • -8 Multi-purpose tools
  • -9 Network traffic anomaly detection tools
  • -11 Outlier analysis tools
  • -13 Reverse engineering tools
  • -12 System artifact review tools
There is no interaction
Invite one or more vendors for a discussion.

CHECK POINT SOFTWARE TECHNOLOGIES presence in Industrial Control Systems Security Solutions

Check Point Software Technologies offers scalable security solutions to individuals, SMEs, and large enterprises across the globe. The company has a diverse product range, including network security, data security, and security management products and solutions. With the increased cloud adoption by organizations, the company is focusing on delivering ICS security solutions to secure the critical IT infrastructure of organizations from advanced threats. Check Point Software Technologies is aiming at entering the ICS security market by adopting the strategies of partnerships and alliances. The company has formed strong partnerships with players, such as Nozomi Networks and RAD for delivering enhanced integrated security solutions. These partnerships have not only helped it to deliver cutting-edge cybersecurity solutions, but have also expanded the company’s customer base and placed it ahead in the ICS security market. The company has also proven its capability to achieve growth using inorganic strategy by acquiring two security companies, Hyperwise and Lacoon Mobile Security in the same year of 2015.



Buyer, Manufacturing, SME

Apr 11, 2019

“World class Intrusion Prevention System”

Check Point IPS (Intrusion Prevention System) is a combination of IPS protection and exceptional performance. It is less expensive than conventional, stand-alone IPS software solutions. IPS can carry out proactive intrusion prevention through its unified and extensible Next Generation Firewall.
Read less Read more
Useful (0) Not useful (0)

Buyer, Transportation and Logistics, SME

Apr 11, 2019

“Efficient SCADA control system”

The network and controls of Checkpoint SCADA are capable of managing networks efficiently. Its implementation is proprietary and helps in the collection and analysis of data.
Useful (0) Not useful (0)

Buyer, Transportation and Logistics, SME

Apr 11, 2019

“Excellent control system”

Checkpoint secures Industrial Control Systems by using advanced IT threat prevention; separating IT from OT through the enforcement of access rights; by deploying advanced ICS and SCADA security technologies.
Read less Read more
Useful (0) Not useful (0)

Buyer, Power, SME

Apr 11, 2019

“Comprehensive database security”

The Check Point 1200R is a rugged solution that provides complete security, unified visibility, and best practices for compliance all combined in one product. It does all this but does not leave a large footprint, which makes it easy to incorporate into any environment.
Read less Read more
Useful (0) Not useful (0)

Buyer, Manufacturing, SME

Apr 11, 2019

“Rapid response to cyber incidents”

Checkpoint helps manufacturers identify anomalies in operating environments so that malware attacks and other threats can be mitigated and the integrity of critical operational data can be maintained. It is capable of assessing the security posture of ICS networks, safeguarding critical systems, controlling access to network assets, and monitoring & detecting vulnerabilities and threats. It also investigates and resolves issues when they occur.
Read less Read more
Useful (0) Not useful (0)

Top Features

  1. Distributed Denial Of Service / Deep packet inspection
  2. Implementation Methodology / Risk and Threat Assessment
  3. Modes / Cloud
  4. Post Deployment / Education & Training
  5. Modes / Hybrid
  6. Pre Deployment / Strategy consulting
  7. Antivirus/Malware / Device Control
  8. Post Deployment / Support & Maintenance
  9. Security Information And Event Management (SIEM) / Event Processor
  10. Post Deployment / Managed Security Services
    • Categories
    • For Experts