Securing shadow IT belongings from the cloud to the community’s edge, Sepio raises $22M 


Be a part of us on November 9 to discover ways to efficiently innovate and obtain effectivity by upskilling and scaling citizen builders on the Low-Code/No-Code Summit. Register right here.

In terms of safety, you’ll be able to’t shield belongings that you simply don’t see. Sadly, in an period of hybrid cloud adoption and distant working, shadow IT belongings are everywhere, within the type of apps, IoT gadgets, and cloud cases.

These belongings are all left weak to risk actors, which is why many suppliers are looking for to streamline the invention and administration of those belongings. 

Final month, danger administration supplier Sepio introduced it had raised $22 million as a part of a sequence B funding spherical for its Asset Danger Administration Platform, which offers safety groups with the visibility to constantly handle recognized and unknown shadow belongings, and assign them an Asset Danger Issue. 

The brand new funding spherical brings Sepio’s whole funding raised to $37 million and offers an strategy to safe shadow IT belongings that usually slip underneath the radar of conventional safety approaches. 


Low-Code/No-Code Summit

Discover ways to build, scale, and govern low-code packages in a simple means that creates success for all this November 9. Register to your free cross right this moment.

Register Right here

Diving into the unknown 

An increasing number of enterprises are involved with the dangers attributable to unsecured IT belongings, with analysis exhibiting that 75% of IT and IT safety professionals within the U.S. agreeing that using cloud apps and companies with out the approval of IT is a severe safety danger. 

When trying to tackle this problem, step one enterprises have to take is to realize visibility over them. 

“Probably the most reliable supply of asset danger is precise properties on the bodily layer. Sepio’s {hardware} DNA expertise discovers all managed, unmanaged, and hidden gadgets which are invisible to all different safety instruments,” stated Yossi Appleboum, CEO of Sepio. 

By discovering recognized and shadow belongings, Sepio offers customers the flexibility to observe the safety posture of those belongings from a single location, utilizing an Asset Danger Issue to determine safety dangers and tackle them earlier than they are often exploited by an attacker.

“Sepio’s distinctive strategy and algorithms robotically generate an correct Asset DNA profile for each asset with robotically generated Asset Danger Components based mostly on contextual enterprise, location, and guidelines,” Appleboum stated. 

As soon as these belongings are found, they will then be monitored for vulnerabilities and misconfigurations that improve the chance of a knowledge breach. 

A have a look at IT asset administration suppliers 

Sepio is one in every of many suppliers within the IT asset administration market, which researchers valued at $2319.7 million in 2021 and estimate it should attain $3381.4 million by 2028.

One of many group’s most important opponents available in the market is Armis, which raised $300 million in funding final yr and achieved a $3.4 billion valuation. 

Armis offers a platform that allows safety groups to find IT belongings and keep an correct asset stock database. Customers can scan gadgets to determine info together with the producer, mannequin, IP, MAC tackle, OS, and username. 

One other important competitor available in the market is Axonius. Axonius offers a cybersecurity asset administration platform that creates a list of all IT belongings, so safety groups can determine misconfigurations and robotically apply safety insurance policies and customized response actions to safe them. 

Earlier this yr, Axonius closed a sequence E funding spherical with $200 million in funding and reached a $2.6 billion valuation. 

Based on Appleboum, the principle differentiator between Sepio and opponents is 

Its lack of reliance on behavioral components. “Sepio’s expertise isn’t influenced by behavioral perceptions that may deceive essentially the most sturdy cyber instruments or assumptions of the influence of conduct that may drown essentially the most potent cyber operations.” 

VentureBeat’s mission is to be a digital city sq. for technical decision-makers to realize information about transformative enterprise expertise and transact. Uncover our Briefings.


Leave a Reply