Interview With Yossi Appleboum – Sepio Systems

Interview With Yossi Appleboum – Sepio Systems
Aviva Zacks
Posted: August 12, 2019

How lucky was Aviva Zacks of Safety Detective to have the chance to interview Sepio Systems’ CEO Yossi Appleboum. She asked him how his company can protect us from hardware attacks.

Safety Detective: What drew you to cybersecurity?

YA: My career started when I joined the Israeli intelligence community. At the beginning of the 1990s, the “8200 buzz” was a secret, and very few people from outside the intelligence community knew about the “unit,” so I really didn’t know how it was going to impact my future. A few years later, in 1998, together with two partners and friends from the unit, we started our journey in the private market. As of today, we’ve been involved in two successful exits and in creating new categories in the overcrowded cybersecurity industry.

SD: What does Sepio Systems do to protect us from rogue hardware cyberattacks?

YA: Sepio built the Rogue Device Mitigation (RDM) category. We’ve been recognized by Frost and Sullivan as this market’s segment leaders.

“The network visibility created by Sepio’s solution is a critical component of any effective rouge device management solution.” – Frost and Sullivan

Sepio’s RDM solution is a SaaS solution that protects both the network infrastructure and the endpoints from hidden and rogue devices and implants. Our innovative solution makes it simple, there is no need for extra hardware, and it does not alter/affect network and systems traffic or degrade performance. These are real game-changers.

Sepio’s RDM detects, identifies and blocks all rogue devices based on a multilayered architecture which includes anomaly detection, machine learning, and actionable threat intelligence feeds. Our solution is a significant building block in any data leakage architecture.

SD: What are today’s worst cyberthreats?

YA: Criminals are not going to give up. With so many efficient security solutions on the market that cover the threats on software and data traffic in networks, the criminals are continually looking for new ways to penetrate and to have long-lasting “bridges” into secured environments. They use hardware attack tools, and since there aren’t any efficient solutions in the market besides Sepio, they are becoming more and more successful.

SD: How do you see cybersecurity developing in the next few years?

YA: I expect cybersecurity to become much more proactive, much more autonomous, and much more focused on emerging threats that were left unsolved. This all is due to the proliferation of IoT.