Categories: LATEST NEWS

Sepio Systems Partners with Distribution Giants Tech Data and SHI to Tackle Hardware-Based Cyber-Attacks

U.S. and Israel-based Rogue Device Mitigation leader Sepio Systems, which is disrupting the cyber-security industry by uncovering hidden hardware attacks, has partnered with the distribution giant Tech Data and with SHI International Corp., one of North America’s top 10 largest IT solution providers, in order to tackle hardware-based cyber-attacks.

Sepio offers the world’s first end-to-end solution that detects and mitigates hardware-based attacks, including rogue peripherals, invisible network devices, and manipulated firmware. The company’s Sepio Prime, which is a software-only solution, has been successfully deployed in over 20 mid-sized to large banks, insurance, and telecom companies in the U.S., Singapore, Brazil, and Israel.

As part of the agreements, Tech Data channel partners and SHI’s customers can select and bundle the Sepio solutions to ensure comprehensive security coverage for their customers. The customers will benefit from easy deployment of Sepio Prime and Sepio Agents for managing the security risk coming from uncontrolled peripheral devices and accessories in their network.

“As part of our continuous effort to ease our customer’s process of complying with the NIST standards and guidelines for securing Information Systems, we are excited to team with Tech Data and SHI”, said Yossi Appleboum, CEO of Sepio Systems Inc. “Packing Sepio’s deep visibility capabilities into devices and hardware assets together with a granular policy enforcement tool greatly reduces the cyber risk organizations are facing. For the first time, Tech Data customers and partners can deploy a simple and robust software solution that addresses more than 15 controls from the NIST 800-53 Special Publication.”

NIST Special Publication 800-53 covers the steps in the Risk Management Framework that address security control selection. This includes selecting an initial set of baseline security controls based on a FIPS 199 worst-case impact analysis, tailoring the baseline security controls, and supplementing the security controls based on an organizational assessment of risk. The security rules cover 17 areas including access control, incident response, business continuity, and disaster recoverability.

Lihi

Comments are closed.

Recent Posts

BeyondTrust Acquires Entitle, Strengthening Privileged Identity Security Platform with Paradigm Shifting Just-in-Time Access and Identity Governance

Entitle is a pioneering privilege management solution that discovers, manages, and automates just-in-time (JIT) access and modern identity governance and…

2 weeks ago

Samtec Introduces SIBORG Tool to Speed Component Launch Designs

Available freely to Samtec customers under NDA, SIBORG (Signal Integrity Breakout Region Guru) works with Ansys HFSS 3D Layout to…

2 weeks ago

Accelerating Mass Business AI Adoption: NeuReality Launches Developer Portal for NR1 Inference Platform, Expanding Affordable AI Access

Entire NR1 system purpose-built for a more affordable AI infrastructure allowing for faster deployment; furthering AI’s reach into more parts…

3 weeks ago

Dot Compliance Raises a $17.5 Million Up-Round in Series B Extension Funding to Advance New Category of AI-driven Compliance

Following rapid growth in its customer base to over 400, funding will fuel further AI development and create a hybrid…

3 weeks ago

Tektronix and recently acquired EA Elektro-Automatik now offer expanded power portfolio for engineers who are electrifying our world

The addition of EA’s high-efficiency regenerative power supplies greatly expands Tektronix’s trusted offering Tektronix, Inc, a leading provider in test…

3 weeks ago

Melexis unveils fully integrated inductive switch

Melexis reveals its groundbreaking Induxis® switch, the MLX92442. Contactless, magnet-free, and strayfield immune, this monolithic solution directly detects conductive targets.…

3 weeks ago