MENU

Sepio Systems to tackle cyber-attacks

July 4, 2019 • Online & Social, Security

Yossi Appleboum, CEO of Sepio Systems Inc.

Yossi Appleboum, CEO of Sepio Systems Inc.

Sepio Systems, a U.S. and Israel-based Rogue Device Mitigation company has partnered with distribution company Tech Data and IT solutions provider SHI to address hardware-based cyber-attacks. This is said to include invisible network devices, rogue peripherals and manipulated firmware. This solution is called Sepio Prime and is a software-only solution. The solution has been deployed in over 20 mid-sized banks, telecom companies and insurance companies in Brasil, the U.S., Israel and Singapore.

SHI’s customers and Tech Data channel partners, as part of the agreement, can select and bundle the Sepio solutions to guarantee comprehensive security coverage for all of their customers. These customers will be able to take advantage of Sepio Prime and Sepio Agents to manage security risks that may come from peripheral devices or unauthorized network access. As part of our continuous effort to ease our customer’s process of complying with the NIST standards and guidelines for securing Information Systems, we are excited to team with Tech Data and SHI. Packing Sepio’s deep visibility capabilities into devices and hardware assets together with a granular policy enforcement tool greatly reduces the cyber risk organizations are facing. For the first time, Tech Data customers and partners can deploy a simple and robust software solution that addresses more than 15 controls from the NIST 800-53 Special Publication,” said Yossi Appleboum, CEO of Sepio Systems Inc.

NIST Special Publication 800-53 details the steps in the Risk Management Framework that addresses security control selection. This includes selecting an initial set of baseline security controls that are based on a FIPS 199 worst-case impact analysis. The steps also include tailoring the baseline security controls and supplementing the security controls based on an organizational risk assessment. The security rules encompass 17 areas, including incident report, access control, disaster recoverability and business continuity.

Edited by Kojo Essah

Follow Kojo Essah on Twitter

Follow IT News Africa on Twitter

Comments

comments


Leave a Reply

Your email address will not be published. Required fields are marked *

« »