Visibility gaps mean traditional device security solutions are not enough to defend against modern-day threats. ThinkShield Hardware Defense Powered by Sepio empowers workstations and servers to autonomously defend themselves against hardware-based attacks delivered via the supply chain or internal abusers. Sepio’s patented technology dives deeper into every device’s true identity, establishing trust at the hardware level to verify all USB connections and detect and mitigate rogue devices – providing Lenovo customers with an additional layer of hardware protection.
More than 50% of threats are designed for USB exploitation.
47% of malware was deployed using removable media.
58% of organizations do not use port control/allow-listing software to manage USB device usage.
Sepio’s physical layer-based Asset DNA technology relies on device existence rather than behavior, discovering and identifying all managed, unmanaged, and hidden devices. With its novel approach and complex machine learning algorithms, Sepio gets to the true source of asset risk, untainted by misleading profile perceptions and behavioral assumptions. The platform prioritizes assets based on their risk level and enforces granular hardware access controls, automatically blocking those that breach the preset rules or get identified as known attack tools.
Complete Asset Visibility
Detect and identify all known and shadow assets on USB interfaces. Gain component level visibility with the hardware bill of materials (BOM) for supply chain verification.
Rogue Device Mitigation
Instantly detect hardware-based attack tools that would otherwise evade existing security solutions as well as devices that breach the pre-set rules. Block these unwanted assets with automated mitigation.
Protect and Control
Determine every asset’s risk level through multiple risk indicators and eliminate noise with automated risk prioritization, alerting for known-to-be-vulnerable devices. Enforce specific hardware usage with granular risk-based access controls for continuous device verification.
Complete Security Stack at Scale
Integrate seamlessly with existing cybersecurity solutions, augmenting them with greater visibility and context. Deploy at any scale for robust Zero Trust Hardware Access across the entire asset attack surface.