Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

OneLayer and Check Point Software Partner to Deliver Context-Based Security for Private Cellular Networks

PR NEWSWIRE by PR NEWSWIRE
August 7, 2025
Home Telco
Share on FacebookShare on Twitter


BOSTON and TEL AVIV, Israel, Aug. 6, 2025 /PRNewswire/ — OneLayer, the leading provider of private LTE/5G security and device management solutions, and Check Point Software Technologies, a global cybersecurity leader, today announced a new integration designed to enable context-based enforcement and seamless policy management across private cellular and OT environments. This partnership allows enterprises to secure dynamic and complex private cellular networks as they expand connected device use in operational settings.

The joint solution builds on OneLayer’s approach of bridging the specific operational and security requirements of OT, IT, and private cellular environments. OneLayer collects detailed real-time context—such as device identity, SIM and IP status, location, and behavioural changes—from both cellular and non-cellular devices. This information is continuously synchronized with Check Point Quantum firewall, allowing security teams to define and enforce granular access controls, automate network segmentation, and respond quickly to incidents as device status or conditions change.

Use cases supported by the integration include:

  • Zero Trust for Non-cellular Devices: Many legacy devices, such as robotic arms, connect to the network through cellular routers, making them difficult to monitor and secure. OneLayer verifies authorized devices, discovers and provides insights for all devices, even those hidden behind cellular routers, and continuously provides this context to the Quantum  firewall. With this visibility, Check Point enforces Zero Trust policies, blocking any device that is not explicitly authorized, helping prevent unauthorized access from unmanaged or unknown devices.
  • SIM Swap Detection: OneLayer and Check Point enable operational flexibility without compromising security by providing a software-defined SIM lock. When a stationary OT/IoT device’s SIM is swapped, OneLayer detects the change and signals Check Point to move the device into a quarantine group for immediate review, reducing exposure to unauthorized access from physical tampering.
  • Dynamic IP Management: In different enterprise environments, such as healthcare and others, portable devices frequently change IPs as they move through networks. OneLayer tracks each device’s current IP and ensures Quantum firewall policies dynamically follow these changes, maintaining safe and continuous access.
  • Location-based Segmentation: For fixed assets, such as sensors in warehouses, OneLayer immediately alerts if a device changes location unexpectedly, prompting Check Point to restrict or quarantine access per policy, enabling rapid geofencing and physical security response.

The integration also allows teams to use context-based network groups, automating policy enforcement and reducing manual overhead, while ensuring consistent protection as networks scale and evolve.

“Context-based firewall enforcement is a core value OneLayer brings to private cellular networks, and our work with Check Point represents what this looks like in practice,” said Avishag Daniely, VP Product at OneLayer. “By feeding real-time device and network intelligence into Check Point’s policy engine, we create a bridge between OT assets and next-generation cellular infrastructure, delivering seamless, automated protections and unified visibility.”

“Private cellular networks demand security solutions that can adapt as devices move and conditions change,” said Bill Diaz, VP of Vertical Solutions at Check Point Software Technologies. “By partnering with OneLayer, we’re extending Check Point’s prevention-first security architecture offering real-time and context-driven policy enforcement. This enables enterprises to gain tighter control, unified visibility, and advanced threat prevention across both legacy OT and modern IoT assets.“

For more information, visit www.onelayer.com and www.checkpoint.com.

About OneLayer
OneLayer provides advanced asset management, operational intelligence, and zero trust security for private LTE and 5G networks. Its solutions empower organizations to manage and secure cellular networks, all without deep cellular expertise. For more, visit www.onelayer.com.

Media Contact:
Mor Ben-Horin
[email protected]

Logo: https://mma.prnewswire.com/media/2455348/OneLayer_Logo.jpg

SOURCE OneLayer



Source link

Tags: Cloud Computing Internet of ThingsComputer & ElectronicsComputer SoftwareHigh Tech SecurityLicensingNetworksNew Products & ServicesOneLayerTelecommunications Industry
PR NEWSWIRE

PR NEWSWIRE

Next Post
New Charter Technologies Welcomes Geoff Boyd as Chief Financial Officer

New Charter Technologies Welcomes Geoff Boyd as Chief Financial Officer

Recommended.

Huawei Launches NG WAN to Boost New Growth for Carriers

Huawei Launches NG WAN to Boost New Growth for Carriers

March 3, 2026
5 IT leaders share New Year’s resolutions for 2026

5 IT leaders share New Year’s resolutions for 2026

January 7, 2026

Trending.

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

March 10, 2026
Huawei lanceert Next Generation FAN-oplossing

Huawei lanceert Next Generation FAN-oplossing

March 7, 2026
Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

February 26, 2026
Half of Google’s software development now AI-generated | Computer Weekly

Half of Google’s software development now AI-generated | Computer Weekly

February 5, 2026
Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

March 24, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio