Introducing G2.ai, the future of software buying.Try now
The Sales Factory
Sponsored
The Sales Factory
Visit Website
Product Avatar Image
Check Point Industrial Control Systems (ICS) Security

By Check Point Software Technologies

Unclaimed Profile

Claim your company’s G2 profile

Claiming this profile confirms that you work at Check Point Industrial Control Systems (ICS) Security and allows you to manage how it appears on G2.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Claim Now
0 out of 5 stars

How would you rate your experience with Check Point Industrial Control Systems (ICS) Security?

The Sales Factory
Sponsored
The Sales Factory
Visit Website
This product hasn't been reviewed yet! Be the first to share your experience.
Leave a Review

Check Point Industrial Control Systems (ICS) Security Reviews & Product Details

Product Avatar Image

Have you used Check Point Industrial Control Systems (ICS) Security before?

Answer a few questions to help the Check Point Industrial Control Systems (ICS) Security community

Check Point Industrial Control Systems (ICS) Security Reviews (0)

G2 reviews are authentic and verified.

There are not enough reviews of Check Point Industrial Control Systems (ICS) Security for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Palo Alto Networks IoT/OT Security Logo
Palo Alto Networks IoT/OT Security
4.3
(116)
Protect every connected asset with OT security that keeps operations up 24/7, not CISOs
2
Microsoft Defender for IoT Logo
Microsoft Defender for IoT
4.3
(101)
Microsoft Defender for IoT is a comprehensive security solution designed to protect Internet of Things (IoT and operational technology (OT environments. It offers real-time asset discovery, vulnerability management, and cyberthreat protection for industrial infrastructures, including industrial control systems (ICS and OT networks. By providing complete visibility into all IoT and OT assets, Defender for IoT enables organizations to manage security posture effectively and reduce the cyberattack surface area. Its agentless, network-layer monitoring ensures seamless integration with existing systems without impacting performance. Key Features and Functionality: - Context-Aware Visibility: Gain comprehensive insights into all IoT and OT assets, including device details, communication protocols, and behaviors. - Risk-Based Security Posture Management: Identify and prioritize vulnerabilities using a risk-prioritized approach to minimize the cyberattack surface. - Cyberthreat Detection with Behavioral Analytics: Utilize IoT and OT-aware behavioral analytics and machine learning to detect and respond to cyberthreats effectively. - Agentless Monitoring: Deploy non-invasive, passive monitoring that integrates seamlessly with diverse industrial equipment and legacy systems. - Unified Security Operations: Integrate with Microsoft Sentinel and other security information and event management (SIEM systems for centralized monitoring and governance. Primary Value and Problem Solved: Defender for IoT addresses the critical need for robust security in IoT and OT environments, which are often vulnerable due to unpatched devices, misconfigurations, and lack of visibility. By providing real-time asset discovery, continuous monitoring, and advanced threat detection, it empowers organizations to proactively manage risks, ensure compliance, and protect critical infrastructure from evolving cyberthreats. This solution enables seamless integration with existing security operations, fostering a unified approach to IT and OT security.
3
Forescout Platform Logo
Forescout Platform
4.5
(15)
The Forescout Platform is a comprehensive cybersecurity solution designed to provide real-time visibility, control, and compliance across all connected devices within an organization's network. It continuously identifies and protects both managed and unmanaged assets—including IT, IoT, IoMT, and OT devices—without disrupting business operations. By delivering capabilities in network security, risk and exposure management, and extended detection and response, the platform enables organizations to effectively manage cyber risks and mitigate threats. Key Features and Functionality: - Device Classification: Utilizes real-time, agentless discovery and classification of all connected devices, encompassing traditional IT, IoT, IoMT, and OT/ICS assets. - Policy Enforcement: Identifies compliance and security posture gaps, leveraging a centralized policy engine to reduce exposure risks and align with organizational security frameworks. - Cybersecurity Automation: Facilitates automated, policy-based security controls to proactively and reactively manage threats, minimizing incident response times through coordinated actions. - Analytics: Provides rich, contextual visualizations through persona-based dashboards, offering insights into risks, threats, behaviors, and compliance statuses. - Ecosystem Integration: Enhances existing security investments by dynamically sharing device identity, configuration state, risk attributes, and threat context with other security tools. Primary Value and Problem Solved: The Forescout Platform addresses the critical challenge of securing diverse and expanding networks by providing continuous, agentless visibility and control over all connected devices. It enables organizations to identify vulnerabilities, enforce security policies, and automate threat responses without disrupting business operations. By integrating seamlessly with existing security infrastructures, the platform enhances overall cybersecurity posture, reduces risk exposure, and ensures compliance across complex IT, IoT, IoMT, and OT environments.
4
Armis Logo
Armis
4.5
(12)
Armis Centrix™, the Armis cyber exposure management platform, is powered by the Armis AI-driven Asset Intelligence Engine, which sees, secures, protects and manages billions of assets around the world in real time. Armis Centrix ™ is a seamless, frictionless, cloud-based platform that proactively mitigates all cyber asset risks, remediates vulnerabilities, blocks threats and protects your entire attack surface. Armis Centrix ™ gives organizations peace of mind, knowing that all critical assets are protected 24/7 by the industry’s #1 asset intelligence cybersecurity company. Only Armis Centrix ™ protects all verticals and industries including Manufacturing, Health and Medical, Information Technology, Energy and Utilities, Financial Services, Transportation, Telecommunications and Media, Public Sector and many more.
5
Claroty Logo
Claroty
4.7
(6)
The Claroty Platform reveals 100% of OT, IoT, and IIoT assets on enterprise networks and protects them from vulnerabilities, emerging threats, malicious insiders, and unintentional errors. Its resilient threat detection model continually monitors the network for both known and unknown threats, automatically weeds out false positives, and gives clear direction on how to take action. This is all enriched by Claroty’s extensive ecosystem of third-party technical integrations, as well as the latest threat signatures and remediation guidance from the renowned Claroty Research Team.
6
Cisco Cyber Vision Logo
Cisco Cyber Vision
4.4
(4)
Sentryo is the pioneer in solutions dedicated to managing the cyber risk of M2M networks and Industrial Control Systems (ICS).
7
Tenable OT Security Logo
Tenable OT Security
4.8
(3)
Tenable OT Security is a comprehensive cybersecurity solution designed to protect operational technology (OT environments, including industrial control systems (ICS and critical infrastructure. It offers in-depth asset visibility, continuous risk assessment, and real-time monitoring to safeguard against cyber threats, malicious insiders, and human errors. By bridging the gap between IT and OT systems, Tenable OT Security enables organizations to identify vulnerabilities, monitor device communications, and mitigate risks, ensuring the safe and efficient operation of industrial processes. Key Features and Functionality: - Automated Asset Discovery: Identifies all devices within OT environments, including workstations, servers, human-machine interfaces (HMIs, programmable logic controllers (PLCs, and network devices, providing a comprehensive and up-to-date inventory. - Vulnerability Prioritization: Utilizes Tenable's Vulnerability Priority Rating (VPR to assess and prioritize risks across IT and OT systems, enabling efficient remediation efforts. - Real-Time Monitoring: Continuously tracks network behavior, detects anomalies, enforces security policies, and monitors device changes to identify and mitigate potential threats promptly. - Comprehensive Risk Scoring: Offers detailed insights into assets, including firmware versions, patch levels, and known vulnerabilities (CVEs, facilitating informed decision-making. - Standards Compliance: Supports adherence to industry security standards such as NIST, NERC CIP, and FDA regulations, assisting organizations in meeting compliance requirements. - Integration with IT Security Tools: Seamlessly integrates with Tenable's IT security solutions and other leading tools, providing unified visibility and control across converged IT and OT environments. Primary Value and Problem Solved: Tenable OT Security addresses the critical need for robust cybersecurity in industrial and critical infrastructure sectors. By providing comprehensive visibility and control over OT assets, it enables organizations to proactively identify and mitigate vulnerabilities, prevent cyberattacks, and ensure compliance with industry standards. This unified approach to IT and OT security reduces operational risks, minimizes downtime, and safeguards the integrity of essential industrial processes.
8
Dragos Platform Logo
Dragos Platform
3.8
(2)
Dragos Platform is the industrial cybersecurity industry only product exclusively focused on ICS threat intelligence. Prepared by Dragos expert ICS/OT threat intelligence analysts, it is the essential supplement to any IT-focused intelligence product used by IT or OT professionals with responsibility for an ICS network. Dragos WorldView calls out and cuts through the hype and speculation surrounding ICS cybersecurity, providing an effective antidote to the fear, uncertainty and doubt it sows.
9
Darktrace/OT Logo
Darktrace/OT
4.8
(2)
The Industrial Immune System is a fundamental AI technology for OT cyber defense. It works by passively learning what ‘normal’ looks like across OT, IT and industrial IoT, allowing it to detect even the subtlest signals of emerging cyber-threats in real time. This self-learning technology is protocol agnostic and can be deployed across a range of OT environments, providing full coverage of the organization without disrupting daily operations.
10
Honeywell Forge Cybersecurity Cyber Insights Logo
Honeywell Forge Cybersecurity Cyber Insights
5.0
(1)
SCADAfence is the global technology leader in OT & IoT cybersecurity. SCADAfence offers a full suite of industrial cybersecurity products that provides full coverage of large-scale networks, offering best-in-class network monitoring, asset discovery, governance, remote access, and IoT device security. A Gartner “Cool Vendor” in 2020, SCADAfence delivers proactive security and visibility to some of the world's most complex OT networks, including the largest manufacturing facility in Europe. SCADAfence enables organizations in critical infrastructure, manufacturing, and building management industries to operate securely, reliably, and efficiently.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.