Protecting Organizations Against Malicious Hardware Device Attacks


Secured organizations are relatively protected against cyber attacks on their networks, applications and data infrastructure. These organizations have implemented multi-layered security infrastructures that include firewalls, IDS, IPS, email security, endpoint security suites and others that block most known cyber attacks from both the outside and inside.


However, very few organizations are focused on peripheral hardware devices as attack vehicles for penetrating their infrastructure and stealing sensitive information. Most believe they have done all they can to protect themselves with 100 percent visibility into their systems. And while securing software is a major part of an active defense, it’s not enough. Cyber criminals are using hardware ––malicious peripheral devices — as attack tools, compromising them before they are delivered to customers or tampering with them after installation during the upgrade process. There is no way to control each subcontractor, component supplier, distribution channel and carrier, integrator and installer. All of them can be the attacker or serve as the attacker’s entry point. The innocent-looking device on your desk may be your biggest security threat.



Sepio’s security suite is the only solution on the market that identifies and blocks malicious hardware devices before they can cause any harm. The suite stops rogue hardware before it damages normal operations or degrades system performance.


The Sepio three step solution:


  1. Detects by comparing expected vs. actual, based on the whitelist rules engine.

  2. Blocks any illegal device or activity across the organization.

  3. Reports to the existing SIEM and to the cloud service.

Full Visibility and Control


  • Discovery and tracking

  • Securing against ghost devices and rogue behavior

  • Real time threat-level dashboard

  • Continuous threat analysis cloud service

  • Global red alerts and early warning

  • Centralized policy provisioning

  • Complete SIEM integration


True Air-gap Hardware


  • Offers hardware air-gap isolation between the “risky” (non-secured) and the “safe” (secured) sides.

  • Allows data to run only in one direction preventing misuse of the port (i.e., when a keyboard—with a hidden cellular modem—is connected to a computer, the network is exposed.

  • Blocks the port if a threat is discovered, and upon disconnection of the Sepio security device.

© 2016 Cyber Sepio Systems LTD   All rights reserved.  Owned and operated by Cyber Sepio Systems LTD

Privacy Policy

Terms of Use