top of page
Check Point
Part I - Keynote 2
Kev Hau_Checkpoint.png

Kev Hau

Cyber Security Evangelist, North Asia

Check Point Software Technologies

Enabling IOT Connected World Through Cyber Security

 

While connecting Internet-of-Things (IoT) devices to your corporate network delivers clear benefits, it also exposes you to new cyber-threats. From IP cameras, and smart elevators, to medical devices and industrial controllers, IoT devices are inherently vulnerable and easy to hack. Many of these devices run on unpatched software, are misconfigured, or use unsecured communication protocols. Furthermore, organizations own extensive and diverse device inventories of multiple vendors, models, and functionalities, with many shadow un-managed devices (connected to the network without anyone’s knowledge). 

​

It is time to take action and keep every device secure. It is time to secure IoT the same way we secure IT systems.

​

  • Secure smart building and smart office devices to prevent corporate spying and disruption to business operations

  • Secure any connected device to ensure patient safety and ongoing healthcare service

  • Secure Operational Technology (OT) to ensure the safety and integrity of industrial operations

  • Secured devices out of the box

© 2020 Market Intelligence Group Limited All rights reserved

© 2025 Market Intelligence Group Limited All rights reserved
bottom of page