Sepio Systems Partners with Distribution Giants Tech Data and SHI to Tackle Hardware-Based Cyber-Attacks
The Partnership Will Allow Tech Data’s and SHI’s Customers to Benefit from Easy Deployment of Sepio Prime and Sepio Agents for Managing the Security Risk Coming from Uncontrolled Peripheral Devices and Accessories in Their Network
Sepio offers the world’s first end-to-end solution that detects and mitigates hardware-based attacks, including rogue peripherals, invisible network devices, and manipulated firmware. The company’s Sepio Prime, which is a software-only solution, has been successfully deployed in over 20 mid-sized to large banks, insurance, and telecom companies in the U.S., Singapore, Brazil, and Israel.
Read More: Smart Data Solutions are the Future of the Agriculture Supply Chain Says Proagrica’s New Report
As part of the agreements, Tech Data channel partners and SHI’s customers can select and bundle the Sepio solutions to ensure comprehensive security coverage for their customers. The customers will benefit from easy deployment of Sepio Prime and Sepio Agents for managing the security risk coming from uncontrolled peripheral devices and accessories in their network.
“As part of our continuous effort to ease our customer’s process of complying with the NIST standards and guidelines for securing Information Systems, we are excited to team with Tech Data and SHI”, said Yossi Appleboum, CEO of Sepio Systems Inc. “Packing Sepio’s deep visibility capabilities into devices and hardware assets together with a granular policy enforcement tool greatly reduces the cyber risk organizations are facing. For the first time, Tech Data customers and partners can deploy a simple and robust software solution that addresses more than 15 controls from the NIST 800-53 Special Publication.”
Read More: DataRobot Named A Leader in Automation-Focused Machine Learning by Independent Research Firm
NIST Special Publication 800-53 covers the steps in the Risk Management Framework that address security control selection. This includes selecting an initial set of baseline security controls based on a FIPS 199 worst-case impact analysis, tailoring the baseline security controls, and supplementing the security controls based on an organizational assessment of risk. The security rules cover 17 areas including access control, incident response, business continuity, and disaster recoverability.
Read More: NVIDIA Launches Technology Center to Advance AI Research Across U.K.
Copper carbonate scrap acquisition Copper scrap export regulations Metal recycling plant services
Copper cable sorting, Scrap metal recycling and reclaiming, Copper scrap quality assessment
Metal waste recycling plant Ferrous material industry research Iron scrap inventory management
Ferrous metal retrieval, Iron scrap salvage operations, Metal scrap salvage
Scrap Copper recycling centers Copper sheet and plate recycling Metal waste management
Copper cable reclaiming, Ferrous and non-ferrous scrap, Copper scrap export documentation
Recycling process optimization Ferrous material business continuity Iron scrap
Ferrous material recycling news updates, Iron scrap recovery and utilization, Metal salvage and recycling