Sepio Systems has been selected as a cool vendor in Gartner’s recent “Cyber-Physical Systems Security” segment update according to the company announcement.
Sepio Systems claims to offer three unique solutions through its RDM (Rogue Device Mitigation) security suite to monitor, defend, and respond immediately to cyber incidents from malicious CPS hardware and threat patterns.
“Sepio Systems pitches a rather distinct approach to securing OT and IoT devices. The solution fingerprints individual devices based on layer-1 analog signals without relying on the MAC or IP address of the device. The fingerprint is then checked against the ‘Sepio Cloud’ which contains meta-data on millions on unique devices” Says Takepoint Directing Analyst, Jonathon Gordon who caught up with Sepio CEO Yossi Appleboum earlier this year at RSA.
By providing enterprises with the ultimate visibility of what assets are on their network or are connected to their endpoints, Sepio empowers organizations to effectively secure networks and endpoints, significantly reducing attacks using rogue hardware to launch supply chain attacks or succumb to inside threats.
According to the report, “Gartner provides a sampling of Cool Vendors to security and risk management leaders responsible for technology, information and resilience risk. These providers have developed innovative tools and applications that improve security and safety to support the emergence of cyber-physical systems.”
“Organizations around the world are housing compromised devices like monitors, keyboards and routers without even knowing the devices have gone rogue. With the definition of IoT often excluding these very pervasive devices, most organizations have little to no visibility into device activity and how long the device has been compromised,” said Bentsi Ben-atar, Co-Founder & CMO of Sepio Systems. “Sepio Systems is proud to be recognized as a Cool Vendor in Gartner’s Cool Vendors in Cyber-Physical Systems Security.”
The report recommends “to manage technology, information and resilience risk, SRM leaders who focus on the security of CPS should: Revise security strategies for CPS by recognizing that cybersecurity approaches, combined with traditional network segmentation and firewall-based OT security, are not enough. Depending on their function, CPS can add layers of complexity, from intermittent connectivity to third-party contact dictated by OEM service-level agreements. Innovative security solutions are coming to market to solve more security challenges than ever before, and should be continuously assessed.”