Resources for Sepio

Case Studies


Case Study - BadUSB Hospitality Management

A hospitality company was awarded a $50 Best Buy gift card in a letter that also included a USB t...

Case Study - Baptist Healthcare

Baptist Health Medical Group operates and relies on an extensive system of medical devices, IoT, ...

Case Study - Baptist Healthcare Final

Baptist Health is a full-spectrum health system made up of nine hospitals, 23,000 employees (in a...

Case Study - HW Sandbox

A highly targeted government entity shuts its doors to unauthorized hardware devices. A top-notch...

Case Study - Munich Re

Cyber Crime organizations and state sponsored groups use manipulated hardware or firmware, deli...

Case Study - Hacker Bypass Biometric...

Following an investigation by a cybersecurity firm, it was found that the USB device was the sour...

Case Study - MAR-A-LAGO

In 2019, a Chinese woman, Yujing Zhang, entered President Trump’s Mar-a-Lago resort claiming she...

Case Study - Network And Peripheral Visibility

Complete and accurate visibility into network and peripheral devices.

Case Study - Infected Peripheral Devices

As part of an academic security research that included the scanning of repositories of files, r...

Case Study - Invisible Network Devices

A Tier 1 bank audit revealed some irregularities and it became evident that an external party ha...

Case Study - Manipulated Peripheral Devices

Sepio Systems is the leader in Visibility, Control and Mitigation of hardware assets and is disr...

Case Study - Merger and Aquisition Use Case

A report on the cybersecurity risks of M&A by Forescout showed that 62% of organizations agree ...

Case Study - Federal Agency

Case Study - Zero Trust

Enterprises are challenged with gaining accurate visibility into hardware assets, especially in ...

Case Study - Zero Trust Use Case

Zero Trust is a network security model based on the principle of “never trust, always verify”. B...

White Paper - CMMC

The new Cybersecurity Maturity Model Certification is the US Department of Defense’s response to...

Case Study - SMART SECURITY FOR SMART BUILDINGS

Whitepapers


White Paper - Hardware Security

Today’s world and economies are highly interconnected. With this interconnection, supply chains...

White Paper - ATM

Automated teller machines (ATMs) are a prime target for cybercriminals. Some ATMs are filled wi...

White Paper - ATMs Problems And Solutions

ATM usage is undeniable, with the average ATM being used 300 times a month, and over 10 billion ...

White Paper - BYOD Risks

Bring Your Own Device (BYOD) is a trend whereby employee-owned devices are being used within a ...

White Paper - Critical Infrastructure

Critical infrastructure is recognised by governments as the body of systems, networks and assets...

White Paper - Data Center

Data centers are facilities that centralize an organization’s shared IT operations and equipment...

White Paper - Healthcare

The healthcare industry is a vital component of a nation’s critical infrastructure. The various ...

White Paper - Insider Risks

Organizations also need to be aware of insiders who purposefully reveal confidential and sensiti...

White Paper - Mitigating Wi-Fi Risks

Today, Wi-Fi is everywhere; we find it in homes, offices, coffee shops, airports, hospitals, and...

White Paper -MSSP

The number of organizations that are using MSSPs has increased over the years for various reaso...

White Paper - NDAA Section 889

Section 889 is part of the National Defense Authorization Act (NDAA) for Fiscal Year 2019. The ...

White Paper - Pharmaceutical

The pharmaceutical industry is one of the most vital industries in the world; discovering, devel...

White Paper - Rasberry Pi Risks

PoisonTap is built for Raspberry Pi and produces a cascading effect by exploiting the existing t...

White Paper - Supply Chain Attack

Supply chain threats are present during the various phases of an information system’s developme...

White Paper - OT Challanges

Operational technology (OT) is the hardware and software responsible for physical processes, devi...

White Paper - Zero Trust

model but also a mindset. ZT is based on the idea that threat exists everywhere, both inside and...

Closing The OT Visibility Gap

Closing The OT Visibility Gap

See What You have been Missing

See What You have been Missing

Videos


Video - Printer Hack

Watch Now

SRC Assets Visibility and Risk Management

Watch Now

Video - HAcademy

Watch Now

SRC Assets Visibility and Risk Management 2-min BFSI

SRC Sepio 2-min BFSI

Watch Now

SRC Assets Visibility and Risk Management Simply Visibility

SRC Sepio Simply Visibility

Watch Now

Why SRC's Assets Visibility and Risk Management

SRC Why Sepio

Watch Now

3 Challenges CISOs face managing risk postures

3 Challenges CISOs face managing risk postures

Watch Now

From_the_CISO_Webinar

From_the_CISO_Webinar

Watch Now

How do you deal with prioritization

How do you deal with prioritization

Watch Now

How do you manage the intricacies of regulation

How do you manage the intricacies of regulation

Watch Now

How do you tackle gaining asset visibility in complex infrastructure

How do you tackle gaining asset visibility in complex infrastructure

Watch Now

How will the landscape for global financial institutions change in terms of emerging risk

How will the landscape for global financial institutions change in terms of emerging risk

Watch Now

What is the CISO view on Zero Trust

What is the CISO view on Zero Trust

Watch Now

SRC International-Women's-Day

SRC International-Women's-Day

Watch Now

SRC A-Spy-in-a-Tea-Cup

SRC A-Spy-in-a-Tea-Cup

Watch Now

SRC Hacking-a-Smart-TV

Hacking-a-Smart-TV

Watch Now

SRC Game-of-Drones

Game-of-Drones

Watch Now

SRC Assets Visibility and Risk Management HAC

Sepio-HAC-1-Jan-23

Watch Now

SRC Shadow-IT

Shadow-IT

Watch Now

SRC The-Bare-Knight

The-Bare-Knight

Watch Now

SRC Asset Risk Management for Hospitals

SRC-Asset-Risk-Management-for-Hospitals

Watch Now

SRC Assets Visibility and Risk Management DNA

Watch Now

SRC Sepio Customer Query Video

Watch Now

No E-books available.


Blogs


30-Oct-2023

Identifying Regulatory Compliance Gaps

One of the common use cases raised by Sepio’s customers is for those who operate in highly regula...

30-Jan-2024

Strengthen Network Security with Sepio’s Solution for Government Entities

In the world of network security, government entities face unique challenges when it comes to saf...

28-Sep-2023

Understanding the HBOM Framework

Feel like you're drowning in a tsunami of hardware components?

28-Jun-2022

IoMT Visibility Prevents Hardware Attacks on Connected Medical Devices

IoMT Devices Have a Higher Risk Posture Hospitals around the globe have realized that proper cyb...

28-Feb-2023

Cyber Risk Management Requires Knowing All Rogue Devices That May Be Connected to a Network

The process of identifying what may be connected to your network, known and unknown, fits perfect...

28-Feb-2023

OT Device Security Through Physical Layer Visibility

This most recent revolution involves the application of IT technology to industry; in short, it i...

28-Feb-2023

The Birth of Hardware Access Control

Installing Sepio’s Hardware Access Control (HAC-1) solution, the first of its kind, was truly eye...

28-Feb-2023

The Biggest Cyber Security Risks Facing Your Supply Chain in 2022

Sepio’s Hardware Access Control (HAC-1) solution provides a panacea to gaps in device visibility ...

28-Feb-2023

Automotive Cybersecurity Risks – Expect the Unexpected

HAC-1’s policy enforcement mechanism and Rogue Device Mitigation capabilities instantly block any...

28-Feb-2023

Executing the White House’s Federal Zero Trust Strategy

As described in the Department of Defense Zero Trust Reference Architecture, “The foundational te...

28-Feb-2023

Layer 1 Visibility – Cybersecurity First

Here at Sepio we like to stress the importance of Layer 1 visibility. But why is Layer 1 in the O...

28-Feb-2023

The Risks of IoT Devices

Sepio’s technology enables data protection at an unprecedented level thanks to complete device vi...

28-Feb-2023

How to Manage Asset Risks for Financial Institutions

Connected assets in financial institutions are growing at a rapid pace. Having an efficient and a...

28-Feb-2023

Asset Risk Management for Hospitals

Connected assets in medical facilities are growing at a rapid pace. To have full control of your ...

28-Feb-2023

Why Assets Visibility & Risk Management ?

Sepio’s HAC-1 is the only Hardware Access Control solution that provides Layer 1 visibility, cont...

28-Feb-2023

Shadow it - Asset Management

Shadow IT refers to information systems deployed by departments other than the central IT departm...

28-Feb-2023

Simply Visibility

Hardware assets are all around us and in growing numbers – which indicates what an impossible tas...

28-Feb-2023

L1 Visibility

Need a solution that will help you monitor and keep track of all your hardware assets?

28-Aug-2023

ITAM and CMDB: You’re Missing the Bigger Picture

IT asset management (ITAM) and configuration management database (CMDB) are two platforms that s...

27-Feb-2023

Airport Cyber Security Threats

Airports are part of a nation’s critical infrastructure. As such, they are constant targets for c...

27-Feb-2023

Automotive Cybersecurity Risks – Expect the Unexpected

Modern vehicles rely on computers for all their core functions. Modern vehicles are equipped with...

26-Dec-2023

Beyond NACs – Enhancing Network Security

In today’s dynamic cybersecurity landscape CISOs know that traditional NAC solutions which were s...

25-Oct-2023

SRC's Spoofed Laptops Bypassing MACsec

A Sepio customer, who deployed a NAC solution, implemented a MAC based security policy. When chal...

24-Jul-2023

Data Center

Data centers are facilities that centralize an organization’s shared IT operations and equipment,...

24-Feb-2023

IoT Hardware Asset Visibility

IoT devices also provide advantages in the workplace. As a result, these devices are increasing i...

24-Apr-2023

Manage Asset Risks with SRC: Granular Control Based on Asset DNA

Cybersecurity is no longer just a matter of securing the perimeter of an organization’s network. ...

23-Aug-2022

Why Visibility is Critical to Cyber Security in the Financial Sector

Cyber Security in the Financial Sector Needs Asset Visibility Financial institutions are faced w...

22-Mar-2023

Darknet Diaries: Our Favorite Episodes

Darknet Diaries, for the few who aren’t already avid listeners, combines stories from the dark si...

21-Apr-2021

Embracing a Zero Trust Hardware Access Security Model

Embracing a Zero Trust Hardware Access Security Model is key.

17-Oct-2023

Asset Visibility: See What You’ve Been Missing

As the digital landscape expands, organizations are confronted with an ever-increasing array of c...

17-May-2022

Assets Visibility & Risk Provides OT Device Security Through Physical Layer Visibility

The First Industrial Revolution began in the 18th century. Today, as technology evolves even more...

17-Jul-2023

How Recent Incidents Validate the Ongoing Rogue DeviceThreat to cyber Resilence

The integration of IT, OT, and IoT domains has transformed traditional tools like laptops and sma...

17-Jan-2024

Assets Visibility and Risk management Role in Enhancing Federal IoT Inventory Cybersecurity Posture

A Timely Directive from The White House, regarding the Internet of Things (IoT) inventory managem...

15-Mar-2023

How do you deal with Cyber-Physical technology convergence challenges?

You are a security specialist for a large bank – if asked, most would categorize your organizatio...

13-Jun-2023

Food & Beverage IT / OT Environment

You wouldn’t want to hear that the supplier that provides your local supermarket with all the goo...

13-Jun-2023

IoT Security Issues in UK

The UK’s effort to alleviate IoT security issues reduces the associated hardware risks. Hardware-...

13-Dec-2023

Sepio’s Role in Enhancing Federal IoT Inventory Cybersecurity Posture

The White House released a memo by the Office of Management and Budget (OMB) Director Shalanda Yo...

12-Jul-2023

Zero Trust Hardware Access

A large corporate bank identified a suspicious transaction within the enterprise. Upon further in...

12-Jul-2023

Zero Trust

Zero Trust (ZT) is a security concept that follows the principle of “never trust, always verify.”...

12-Jul-2023

Hardware Based Attacks in Critical Infrastructure

For a country to provide the necessary security for its citizens, it relies on its critical infra...

11-Jul-2023

Decoding the “Ownership” Anomaly in Asset Risk Management: When the Asset Interface Dictates Security Product.

Let’s consider a simple scenario – you have Lexmark printers connected across several locations i...

10-Jan-2024

Tackling Internal Cybersecurity Threats with Sepio - Insider Threat

Have you ever wondered about the role of human behavior in your organization’s internal cybersecu...

09-Nov-2023

Insider Threat: Understanding the Risks from Within

The use case of insider threats is complex and multifaceted. Often dramatized in films and televi...

09-Jan-2023

NIST Cybersecurity Framework Compliance with Assets Visibility and Risk Management

The NIST Cybersecurity Framework (NIST CSF) is a voluntary framework developed by the National In...

06-Sep-2022

A Traffic-less Solution to Digital Rush Hour

Many network-based cybersecurity tools rely on traffic monitoring in order to provide clients wit...

06-Oct-2023

Preventing Advanced USB attacks

In an age dominated by digital transformation, organizations must secure themselves against a myr...

06-Jun-2023

How do you deal with Cyber Physical technology convergence challenges?

You are a security specialist for a large bank – if asked, most would categorize your organizatio...

03-Oct-2023

Unmanaged Switch: The Hidden Dangers

In the interconnected world of today’s IT/OT/IoT infrastructure, the hardware devices we use, oft...

03-Apr-2023

Assets Visibility & Risk Management named in the 2023 Gartner® Market Guide for Medical Device Security Solutions

Sepio named in the 2023 Gartner® Market Guide for Medical Device Security Solutions

02-Mar-2023

Moving Beyond NACs: The Core Issues

Securing networking infrastructure to meet financial institution grade toughness requires protect...

02-Aug-2023

Raspberry Pi Security

In this article, we address the security risks associated with the Raspberry Pi, whether the inte...

01-Jan-2023

Navigating the intersection of Financial Regulations, Cybersecurity, and IT Asset Risks: What it means for CISOs and how they can imply

Due to the growing number of cyberattacks and their increasing severity, financial regulators are...