Preloader Image

iOT365, a vendor of OT (operational technology) and IoT cybersecurity, announced a partnership with Check Point Software Technologies Ltd., a vendor of cybersecurity solutions, providing deep visibility, zero-trust enforcement, and proactive defense for industrial sites and critical infrastructure, without disrupting operations.

The iOT365 Cybersecurity Platform uses AI-powered analytics and multi-layer false positive filtering to identify real threats to OT and IoT devices and networks in real time, with high precision. Together with Check Point IoT Protect and Check Point’s vast global threat database, the joint solution enables tailored responses – from passive monitoring to full active prevention – based on customer policy.

“This partnership gives iOT365 comprehensive protection across the OT/IoT security spectrum, minimizing noise and maximizing actionable alerts while also enhancing our ability to prevent cyberattacks,” said Alex Tartakovsky, CEO of iOT365. “This collaboration benefits industrial and critical infrastructure organizations worldwide who want deep visibility, zero-trust enforcement, proactive defense, and the ability to prevent cyber threats targeting their OT and IoT networks.”

The iOT365 lightweight, agentless platform deploys into OT and IoT networks, connecting to switches using either physical or virtual data collectors. Within minutes, the platform provides end-to-end visibility into all industrial assets, protocols, and traffic patterns and analyzes all traffic to identify and classify threats using the MITRE ATT&CK framework.

When installed alongside Check Point Quantum Security Gateways, the iOT365 platform sends information about all the devices connecting to the OT and IoT networks it’s monitoring, including vendor name, firmware version, and MAC and IP addresses, to Check Point IoT Protect, where those devices are checked against Check Point’s threat intelligence database. When working in an air-gapped environment, device information is still transmittable using unidirectional data diodes.

Check Point IoT Protect users are then alerted to any threatening devices detected by the iOT365 Platform and have the option to block the devices at the security gateway, or to allow them to connect through to the monitored networks. 

“OT and IoT environments face unique and escalating security challenges, with traditional tools often falling short,” said Avi Grabinsky, product manager for Quantum IoT Protect at Check Point Software Technologies. “Our collaboration with iOT365 extends our proactive defense capabilities to these environments, delivering the precision, visibility, and enforcement that critical infrastructure needs to stay protected—without disrupting operations.”