Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Sepio Systems Introduces an End-To-End Solution That Protects Organizations Against Rogue Hardware Cyber-Attacks

Sepio Systems, a leader in the Rogue Device Mitigation (RDM) market, introduces the next generation software solution that offers comprehensive mitigation of hardware-based cyber-attacks.
The advanced mitigation capabilities protect against manipulated peripherals, transparent network devices, and firmware vulnerabilities.

Sepio’s solution has been deployed in over 20 mid to large banks, insurance, and telecom companies in the U.S., Singapore, Brazil, and Israel. The current install base secures over 600,000 workstations and network ports.

Read More: Interview with Cédric Carbone, CTO at Ogury

Rogue device cyber-attacks are rapidly growing as demonstrated by recent reports of European banks losing tens of millions of dollars after hackers implanted hardware attack tools that compromised the secured infrastructure.

Related Posts
1 of 4,812

“These attacks are just the ‘tip of the iceberg’ as most remain u**********.”, said Yossi Appleboum, CEO of Sepio Systems Inc. “In many cases, hitting an organization is as simple as replacing a trusted peripheral with a manipulated one. For example, we discovered multiple Raspberry Pi computer modules, that include wireless connectivity, implanted in keyboards that were used for exfiltration attacks. The implant was emulating keyboard keystrokes to infect the workstation and steal data and was running undetected before Sepio’s RDM was deployed.”

Read More: Interview with Christopher McCann, CEO and Co-Founder, snap40

In another incident, an off-the-shelf network router was used for infiltrating a Tier 1 bank. This tiny device was plugged in-line between a printer and the enterprise network, allowing covert remote access into the bank’s IT systems. Sepio’s software was able to trace this rogue device based on its physical fingerprint.

“Manipulated devices, intentionally used by insiders or socially engineered employees, are causing significant damages. We also witness an increasing number of penetrated uncontrolled supply chains that deliver infected equipment.” said Appleboum. “While companies were focused on their software cyber risks, they overlooked the threat coming from their hardware. Users can not install unregulated software on a corporate computer but can easily connect an uncontrolled hardware accessory.”

Read More: Innovate for Success: Use AI to Monetize your Data

2 Comments
  1. Copper scrap sourcing says

    Copper scrap processing equipment Copper scrap recycler Metal recycling management
    Copper cable recycling solutions, Ferrous and non-ferrous metals, Copper pipe recycling

  2. Iron scrap industry trends says

    Environmental compliance in metal recycling Ferrous material disposal regulations Iron recovery services

    Ferrous metal recovery and reuse, Scrap iron handling, Scrap metal end-user markets

Leave A Reply

Your email address will not be published.