Monday, July 22 2024

What is the Sevco Security Platform?

The Sevco Security Platform is a cyber asset attack service management (CAASM) product that focuses on aggregating and correlating data from across a company’s cybersecurity infrastructure to give cybersecurity professionals a better sense of what the company’s infrastructure looks like as a whole.

The platform’s sources include a company’s cloud infrastructure, endpoint security tools, identity management systems, network and communications platforms. Data points are then normalized so that they can be compared and correlated to other data points. Sevco refers to this step as pre-processing.

The analysis takes the cybersecurity data and simplifies it by deleting duplicated data and summarizing each data points’ attributes. The analysis also compares the cybersecurity data to what devices and users are included in the company’s digital infrastructure. The four elements the platform interface focuses on is real-time inventory, asset history, asset status tracking and data enrichment.

What features does this product have?

The platform has five main features. The first three are multi-source aggregation, data pre-processing and an asset correlation engine. These features allow the platform’s system to not only inventory a company’s cybersecurity tools and endpoints but also analyze the tools’ functionality. Analyzing a cybersecurity tools’ functionality can be helpful because a tool may not alert companies to its weaknesses. Combined, the three features lay the groundwork to allow cybersecurity professionals to see how efficient a company’s cybersecurity infrastructure is.

The other two features are the 4D user interface and data outputs. The interface and outputs allow cybersecurity professionals to interact with the data that is created through the platform’s first three features.

When would one use the Sevco Security Platform?

The four categories that the Sevco Security Platform is most useful for are security engineering, risk & compliance, security operations and IT operations. Security engineering use cases include controls coverage and vulnerability management.

Security operations functions are incident response, vulnerability hunting and license right sizing. License right sizing involves making sure a business has the right amount of coverage for endpoints and systems through licensing. IT operations use cases include monitoring systems for when they become outdated and compiling data sets for cybersecurity reports.

What are the strengths and weaknesses of the Sevco Security Platform?

Sevco Security is a young company and therefore not many reviews exist for the product. The following pros and cons list is based on the general customer sentiment over multiple review sites.

Pros:

  ·  Quick and easy to set up for individuals with few technical skills

·  Data visibility and correlation allows for a higher standard of asset management

·  Query function allows one to search for assets using operating system type, manufacture or any other number of important details

·  Tags allow professionals to know the location, type, and date of last audit for various devices

·  Great for finding gaps in cybersecurity coverage

·  Easy integration with other applications

·  Helpful customer support

·  Company is responsive to customer feedback, especially when it comes to adding new features

·  There are no additional agents required beyond the endpoints’ licenses to use the platform

·  User can see what applications are on individual devices regardless of the hardware used

Cons:

·  More features and integrations would be useful

·  Query function could be improved by allowing professional to search by all of the data features the platform allows one to integrate into the platform

·  Query options can be confusing

·  Users have to refresh the display once one adds tags to update the display properly

·  Reporting in the product is limited and highly technical

·  No customizable reporting

·  Executive-level reports require exporting data to another tool

·  Some issues with correlation that may require customer service help depending on the product being integrated into the platform

·  Licensing can be expensive per endpoint

What does the Sevco Security Platform cost?

The Sevco Security platform pricing is based on how much one uses it and the size of a company’s cybersecurity infrastructure. There is a 30-day trial and volume discounting available.

What are other comparable CAASM products?

The cyber asset attack service management is a young cybersecurity tool category. Therefore, few products exist that offer similar services to the Sevco Security Platform. Here is some of them:

·  runZero by runZero

·  Lansweeper by Lansweeper

·  Axonius Platform by Axonius

·  Armis Centrix by Armis

·  OctoXLabs CAASM Platfrom by OctoXLabs

·  JupiterOne by JupiterOne

Explore CISOstack for in-depth insights, practical tips, and expert interviews on the latest cyber threats. Subscribe for regular updates to keep your company ahead in digital defense. Stay informed and secure with us.

Previous

Cyber Deals: Huntress, Cyberhaven, and SpyCloud

Next

This is the most recent story.

Check Also

Widget

Don’t Miss

Sevco Security Platform Product Review

Ellie Buscemi

What is the Sevco Security Platform? The Sevco Security Platform is a cyber asset attack service management (CAASM) product that focuses on aggregating and correlating data from across a company’s cybersecurity infrastructure to give cybersecurity professionals a better sense of what the company’s infrastructure looks like as a whole. The platform’s sources include a company’s […]

Cyber Deals: Huntress, Cyberhaven, and SpyCloud

CISOstack

Cybersecurity Surge: Top Funding Rounds and Strategic Acquisitions Fuel Growth in AI, Cloud Security, and Threat Prevention Solutions

Fidelis Elevate: A Deep Dive

Ellie Buscemi

What is Fidelis Elevate? Fidelis Elevate is an open extended detection and response (open XDR) solution focusing on network protection, endpoint security, and cyber attacker deception. The platform aims to protect various elements of a company’s infrastructure, such as devices and servers while tracking suspicious behavior and preventing access to cyber criminals. What features does […]

Partially closed laptop screen

Best Extended Detection and Response (XDR) Solutions

Lara Oporto

What is Extended Detection and Response and how does it work? Extended Detection and Response (XDR) is a cybersecurity system that gathers information from different places like computers, networks and emails. Unlike other security tools that focus on one area like computers or networks, XDR looks at everything together. The comprehensive approach helps to find […]

Close up of computer chip

Best Managed Detection and Response (MDR) Solutions

Lara Oporto

What is Managed Detection and Response? Managed Detection and Response (MDR) is a cybersecurity service that provides continuous monitoring, threat detection and incident response capabilities. MDR achieves these capabilities through the deployment of advanced technologies such as machine learning and behavioral analytics as well as analysis from security professionals. MDR is a cybersecurity service that […]

Best Hyperconverged Infrastructure Software

Ellie Buscemi

What is Hyperconverged Infrastructure and how does it work? Hyperconverged infrastructure (HCI) is a software that provides computing, storage and network operations for a company from a single point on a company’s hardware. Originally, computing, storage and network operations were divided in a company’s hardware infrastructure and potentially provided by separate vendors with different management […]