Close Menu
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

What's Hot

Google Ads Data Breach: Customer Info at Risk

August 9, 2025

Free Wi-Fi: A Gateway for Remote Hacking on Buses

August 9, 2025

Remote Vault Takeover: Uncovering CyberArk and HashiCorp Vulnerabilities

August 9, 2025
Facebook X (Twitter) Instagram
The CISO Brief
  • Home
  • Cyberattacks
    • Ransomware
    • Cybercrime
    • Data Breach
  • Emerging Tech
  • Threat Intelligence
    • Vulnerabilities
    • Cyber Risk
  • Expert Insights
  • Careers and Learning
  • Compliance
The CISO Brief
Home » OneLayer, Check Point Team Up on Context-Based Security
Solutions & Tech

OneLayer, Check Point Team Up on Context-Based Security

Staff WriterBy Staff WriterAugust 7, 2025No Comments3 Mins Read0 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email
Share
Facebook Twitter LinkedIn Pinterest WhatsApp Email


OneLayer, the leading provider of private LTE/5G security and device management solutions, and Check Point Software Technologies, a global cybersecurity leader, announced a new integration designed to enable context-based enforcement and seamless policy management across private cellular and OT environments. This partnership allows enterprises to secure dynamic and complex private cellular networks as they expand connected device use in operational settings.

The joint solution builds on OneLayer’s approach of bridging the specific operational and security requirements of OT, IT, and private cellular environments. OneLayer collects detailed real-time context—such as device identity, SIM and IP status, location, and behavioural changes—from both cellular and non-cellular devices. This information is continuously synchronized with Check Point Quantum firewall, allowing security teams to define and enforce granular access controls, automate network segmentation, and respond quickly to incidents as device status or conditions change.

Cyber Technology Insights : Push Security Unveils Matrix to Expose Gaps in Phishing Detection Techniques

Use cases supported by the integration include:

Zero Trust for Non-cellular Devices: Many legacy devices, such as robotic arms, connect to the network through cellular routers, making them difficult to monitor and secure. OneLayer verifies authorized devices, discovers and provides insights for all devices, even those hidden behind cellular routers, and continuously provides this context to the Quantum  firewall. With this visibility, Check Point enforces Zero Trust policies, blocking any device that is not explicitly authorized, helping prevent unauthorized access from unmanaged or unknown devices.

SIM Swap Detection: OneLayer and Check Point enable operational flexibility without compromising security by providing a software-defined SIM lock. When a stationary OT/IoT device’s SIM is swapped, OneLayer detects the change and signals Check Point to move the device into a quarantine group for immediate review, reducing exposure to unauthorized access from physical tampering.

Dynamic IP Management: In different enterprise environments, such as healthcare and others, portable devices frequently change IPs as they move through networks. OneLayer tracks each device’s current IP and ensures Quantum firewall policies dynamically follow these changes, maintaining safe and continuous access.

Location-based Segmentation: For fixed assets, such as sensors in warehouses, OneLayer immediately alerts if a device changes location unexpectedly, prompting Check Point to restrict or quarantine access per policy, enabling rapid geofencing and physical security response.

Cyber Technology Insights : Mimecast and SentinelOne Elevate Human-Centric Cybersecurity

The integration also allows teams to use context-based network groups, automating policy enforcement and reducing manual overhead, while ensuring consistent protection as networks scale and evolve.

“Context-based firewall enforcement is a core value OneLayer brings to private cellular networks, and our work with Check Point represents what this looks like in practice,” said Avishag Daniely, VP Product at OneLayer. “By feeding real-time device and network intelligence into Check Point’s policy engine, we create a bridge between OT assets and next-generation cellular infrastructure, delivering seamless, automated protections and unified visibility.”

“Private cellular networks demand security solutions that can adapt as devices move and conditions change,” said Bill Diaz, VP of Vertical Solutions at Check Point Software Technologies. “By partnering with OneLayer, we’re extending Check Point’s prevention-first security architecture offering real-time and context-driven policy enforcement. This enables enterprises to gain tighter control, unified visibility, and advanced threat prevention across both legacy OT and modern IoT assets.”

Cyber Technology Insights : Visa Strengthens Cybersecurity Services with New Global Advisory Practice and Strategic Leadership

To participate in our interviews, please write to our CyberTech Media Room at sudipto@intentamplify.com

Source: prnewswire



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMajor Data Breach Exposes 6.4 Million Bouygues Telecom Customers
Next Article 150 Crypto-Draining Extensions Flood Firefox Add-Ons!
Avatar photo
Staff Writer
  • Website

John Marcelli is a staff writer for the CISO Brief, with a passion for exploring and writing about the ever-evolving world of technology. From emerging trends to in-depth reviews of the latest gadgets, John stays at the forefront of innovation, delivering engaging content that informs and inspires readers. When he's not writing, he enjoys experimenting with new tech tools and diving into the digital landscape.

Related Posts

HPE Unveils AI Copilot and Zero Trust at Black Hat 2025

August 8, 2025

Andersen Consulting Enters Collaboration Agreement with Systematix

August 7, 2025

KnowBe4 Expands Agentic Features to Boost AI Securit

August 7, 2025
Leave A Reply Cancel Reply

Latest Posts

Google Ads Data Breach: Customer Info at Risk

August 9, 20250 Views

Free Wi-Fi: A Gateway for Remote Hacking on Buses

August 9, 20250 Views

Remote Vault Takeover: Uncovering CyberArk and HashiCorp Vulnerabilities

August 9, 20250 Views

RomCom Hackers Exploit WinRAR Zero-Day Flaw in Phishing Attacks

August 8, 20250 Views
Don't Miss

Big Risks for Malicious Code, Vulns

By Staff WriterFebruary 14, 2025

Attackers are finding more and more ways to post malicious projects to Hugging Face and…

North Korea’s Kimsuky Attacks Rivals’ Trusted Platforms

February 19, 2025

Deepwatch Acquires Dassana to Boost Cyber Resilience With AI

February 18, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to The CISO Brief, your trusted source for the latest news, expert insights, and developments in the cybersecurity world.

In today’s rapidly evolving digital landscape, staying informed about cyber threats, innovations, and industry trends is critical for professionals and organizations alike. At The CISO Brief, we are committed to providing timely, accurate, and insightful content that helps security leaders navigate the complexities of cybersecurity.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Google Ads Data Breach: Customer Info at Risk

August 9, 2025

Free Wi-Fi: A Gateway for Remote Hacking on Buses

August 9, 2025

Remote Vault Takeover: Uncovering CyberArk and HashiCorp Vulnerabilities

August 9, 2025
Most Popular

Designing and Building Defenses for the Future

February 13, 202516 Views

United Natural Foods Faces Cyberattack Disruption

June 10, 20257 Views

VanHelsing Ransomware Builder Leaked: New Threat Emerges!

May 20, 20255 Views
© 2025 thecisobrief. Designed by thecisobrief.
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions

Type above and press Enter to search. Press Esc to cancel.