
Sepio’s globally unique technology called HAC1 fingerprints all hardware devices giving you 100% visibility of everything connected to your network.
Malicious devices such as bash bunnies, rubber duckies, pocket ports, key crocs, and many other rogue devices either sit in transparent mode or impersonate genuine IoT, IT (for example keyboard or mouse) & OT devices. They go completely undetected by EDR, DLP and NAC controls as these controls are fooled into thinking they are genuine devices like keyboards, mice, etc. Sepio’s globally unique technology called HAC1 (Hardware Access Control) fingerprints all hardware devices (network devices and endpoint peripherals) giving you 100% visibility of everything connected to your network. This fingerprinting allows detection and instantly mitigates these devices which may reside on your IT and OT switching network, wireless networks, and of course endpoints. The technology does not rely on IOC’s (Indicators of compromise) nor network tap or mirror port for detection.
Book a free consultation to see how we can help your business find successful technology solutions.