Case Study - BadUSB Hospitality Management
A hospitality company was awarded a $50 Best Buy gift card in a letter that also included a USB thumb drive. Once plugged in, the USB would present a list of items that could be bought with the gift card. The company did not give in to the phishing...
Download Case StudiesCase Study - Baptist Healthcare
Baptist Health Medical Group operates and relies on an extensive system of medical devices, IoT, and traditional IT equipment, all of which needs to be properly managed. Baptist has struggled to gain 100% visibility across all its assets using its existing tools and needed to close the gap
Download Case StudiesCase Study - Baptist Healthcare Final
Baptist Health is a full-spectrum health system made up of nine hospitals, 23,000 employees (in addition to more than 2,000 independent physicians), more than 400 points of care, and nearly 2,500 licensed beds.
Download Case StudiesCase Study - HW Sandbox
A highly targeted government entity shuts its doors to unauthorized hardware devices. A top-notch government entity deployed the HAC-1 solution in a standalone mode to create a one-of-a-kind hardware sandboxing environment.
Download Case StudiesCase Study - Munich Re
Cyber Crime organizations and state sponsored groups use manipulated hardware or firmware, delivered directly by humans or through the supply chain, to carry out their attacks.
Download Case StudiesCase Study - Hacker Bypass Biometric...
Following an investigation by a cybersecurity firm, it was found that the USB device was the source of the attack.
Download Case StudiesCase Study - MAR-A-LAGO
In 2019, a Chinese woman, Yujing Zhang, entered President Trump’s Mar-a-Lago resort claiming she was there to use the swimming pool.
Download Case StudiesCase Study - Network And Peripheral Visibility
Complete and accurate visibility into network and peripheral devices.
Download Case StudiesCase Study - Infected Peripheral Devices
As part of an academic security research that included the scanning of repositories of files, researchers came across classified operational documents that belonged to a large US-based natural gas utility operator.
Download Case StudiesCase Study - Invisible Network Devices
A Tier 1 bank audit revealed some irregularities and it became evident that an external party had continuous access to the internal and secured parts of the network.
Download Case StudiesCase Study - Manipulated Peripheral Devices
Sepio Systems is the leader in Visibility, Control and Mitigation of hardware assets and is disrupting the cybersecurity industry.
Download Case StudiesCase Study - Merger and Aquisition Use Case
A report on the cybersecurity risks of M&A by Forescout showed that 62% of organizations agree that they face significant cybersecurity risks when acquiring new companies and that cyber risk is the greatest concern following the acquisition.
Download Case StudiesCase Study - Zero Trust
Enterprises are challenged with gaining accurate visibility into hardware assets, especially in today’s extremely challenging IT/ OT/IoT environment. In order to address this challenge, ultimate visibility into your Hardware assets is required, regardless of their characteristics and the interface used for connection as attackers.
Download Case StudiesCase Study - Zero Trust Use Case
Zero Trust is a network security model based on the principle of “never trust, always verify”. By acknowledging that threats not only originate outside the organization’s perimeter but also within, ZT eliminates the component of trust that was once automatically given to internal users and devices.
Download Case StudiesWhite Paper - CMMC
The new Cybersecurity Maturity Model Certification is the US Department of Defense’s response to numerous compromises of sensitive defense information sitting on contractors’ information systems.
Download Case Studies