• Skip to content
  • Skip to primary sidebar
  • Skip to footer
  • Cybersecurity Market
  • Cybersecurity Events 2019-2020
  • Sponsored Post
  • Media Releases
  • About
  • Contact

Cybersecurity Market

Cybersecurity Technologies & Markets

Sepio Systems introduces an end-to-end solution that protects organizations against rogue hardware cyber-attacks

January 30, 2019 By CybersecurityMarket.com

Sepio Systems, a leader in the Rogue Device Mitigation (RDM) market, introduces the next generation software solution that offers comprehensive mitigation of hardware-based cyber-attacks.
The advanced mitigation capabilities protect against manipulated peripherals, transparent network devices, and firmware vulnerabilities.

Sepio’s solution has been deployed in over 20 mid to large banks, insurance, and telecom companies in the U.S., Singapore, Brazil, and Israel. The current install base secures over 600,000 workstations and network ports.

Rogue device cyber-attacks are rapidly growing as demonstrated by recent reports of European banks losing tens of millions of dollars after hackers implanted hardware attack tools that compromised the secured infrastructure.

“These attacks are just the ‘tip of the iceberg’ as most remain undisclosed.”, said Yossi Appleboum, CEO of Sepio Systems Inc. “In many cases, hitting an organization is as simple as replacing a trusted peripheral with a manipulated one. For example, we discovered multiple Raspberry Pi computer modules, that include wireless connectivity, implanted in keyboards that were used for exfiltration attacks. The implant was emulating keyboard keystrokes to infect the workstation and steal data and was running undetected before Sepio’s RDM was deployed.”

In another incident, an off-the-shelf network router was used for infiltrating a Tier 1 bank. This tiny device was plugged in-line between a printer and the enterprise network, allowing covert remote access into the bank’s IT systems. Sepio’s software was able to trace this rogue device based on its physical fingerprint.

“Manipulated devices, intentionally used by insiders or socially engineered employees, are causing significant damages. We also witness an increasing number of penetrated uncontrolled supply chains that deliver infected equipment.” said Appleboum. “While companies were focused on their software cyber risks, they overlooked the threat coming from their hardware. Users can not install unregulated software on a corporate computer but can easily connect an uncontrolled hardware accessory.”

About Sepio Systems

Sepio is disrupting the cyber-security industry by uncovering hidden hardware attacks.
Sepio Prime provides security teams with full visibility into their hardware assets and their behavior in real time. A comprehensive policy enforcement module allows administrators to easily define granular device usage rules and continuously monitor and protect their infrastructure. Leveraging a combination of physical fingerprinting technology together with device behavior analytics, Sepio’s software-only solution offers instant detection and response to any threat or breach attempt that coming from a manipulated or infected element.

For more information visit http://sepio.systems

Share this:

  • Share
  • LinkedIn
  • Pinterest
  • Reddit
  • Facebook
  • Twitter
  • Tumblr
  • Pocket
  • Email

Related

Filed Under: Cybersecurity Market

Primary Sidebar

Add Sponsored Post
Post Tech Job

Featured Reports

  • U.S. Federal Cybersecurity Market Research
  • U.S. Government Background Check Market Forecast
  • Impact of Israeli Cybersecurity Technology on Selected Markets, Intelligence Report
  • Deception Cybersecurity Market Analysis
  • Adoption of Blockchain Technology By U.S. Government, Market Forecast
  • Browser as a Service Market
  • Federal IT Modernization
  • Moving Target Defense Market Analysis
  • U.S. Federal IT Business Continuity and Disaster Recovery Market Forecast
  • Deep Packet Inspection (DPI): U.S. Government Market Forecast
  • Quantum Computing Market Forecast
  • U.S.-Mexico Border Security & Protection Market
  • U.S. IT Business Continuity and Disaster Recovery Market

Email Subscription

Enter your email address:

Delivered by FeedBurner

Footer

Media Partners

Technologies | Defense Conferences | Event Calendar | Event Marketing Platform | Technology Conferences | Market Research | Market Analysis

Technical Support

Templates | Posters | Domain Market Research

Copyright © 2015 CyberSecurityMarket.com, Webdesign Template

loading Cancel
Post was not sent - check your email addresses!
Email check failed, please try again
Sorry, your blog cannot share posts by email.