Case Studies: AI-Driven Asset Visibility & Risk Management | SRC Cyber Solutions LLP
04 Feb 2025
Case Study - BadUSB Hospitality Management

A hospitality company was awarded a $50 Best Buy gift card in a letter that also included a USB thum...

View Case Study →
04 Feb 2025
Case Study - Baptist Healthcare

Baptist Health Medical Group operates and relies on an extensive system of medical devices, IoT, and...

View Case Study →
04 Feb 2025
Case Study - Baptist Healthcare Final

Baptist Health is a full-spectrum health system made up of nine hospitals, 23,000 employees (in addi...

View Case Study →
04 Feb 2025
Case Study - HW Sandbox

A highly targeted government entity shuts its doors to unauthorized hardware devices. A top-notch go...

View Case Study →
04 Feb 2025
Case Study - Munich Re

Cyber Crime organizations and state sponsored groups use manipulated hardware or firmware, deliver...

View Case Study →
04 Feb 2025
Case Study - Hacker Bypass Biometric...

Following an investigation by a cybersecurity firm, it was found that the USB device was the source ...

View Case Study →
04 Feb 2025
Case Study - MAR-A-LAGO

In 2019, a Chinese woman, Yujing Zhang, entered President Trump’s Mar-a-Lago resort claiming she ...

View Case Study →
04 Feb 2025
Case Study - Network And Peripheral Visibility

Complete and accurate visibility into network and peripheral devices....

View Case Study →
04 Feb 2025
Case Study - Infected Peripheral Devices

As part of an academic security research that included the scanning of repositories of files, rese...

View Case Study →
04 Feb 2025
Case Study - Invisible Network Devices

A Tier 1 bank audit revealed some irregularities and it became evident that an external party had ...

View Case Study →
04 Feb 2025
Case Study - Manipulated Peripheral Devices

Sepio Systems is the leader in Visibility, Control and Mitigation of hardware assets and is disrupt...

View Case Study →
04 Feb 2025
Case Study - Merger and Aquisition Use Case

A report on the cybersecurity risks of M&A by Forescout showed that 62% of organizations agree tha...

View Case Study →
04 Feb 2025
Case Study - Federal Agency

...

View Case Study →
04 Feb 2025
Case Study - Zero Trust

Enterprises are challenged with gaining accurate visibility into hardware assets, especially in tod...

View Case Study →
04 Feb 2025
Case Study - Zero Trust Use Case

Zero Trust is a network security model based on the principle of “never trust, always verify”. ...

View Case Study →
04 Feb 2025
White Paper - CMMC

The new Cybersecurity Maturity Model Certification is the US Department of Defense’s response to ...

View Case Study →
04 Feb 2025
Case Study - SMART SECURITY FOR SMART BUILDINGS

...

View Case Study →