Data Sheets, Videos, White Papers, and Case Studies

Eclypsium Platform Now Generally Available; Joint Demos Available at RSA Conference

Eclypsium recognized for pioneering security that defends the firmware layer of the enterprise from vulnerabilities and threats

Madrona Venture Group, Andreessen Horowitz and Intel Capital Invest in Eclypsium’s Oversubscribed Series A Round.

Eclypsium introduces a new type of enterprise security that defends the underlying hardware and firmware layer of the enterprise.

Learn about how Eclypsium is delivering a new layer of security to defend the unguarded firmware and hardware infrastructure of the modern enterprise.

Take a look at how Eclypsium delivers the industry’s first enterprise-grade software platform that can detect, defend and mitigate firmware weaknesses and threats.

In less than 3 minutes, learn how attackers use firmware level weaknesses and attacks to subvert traditional security, and how Eclypsium closes the gap.

FISMA, and the NIST documents supporting it, repeatedly underscore the importance of firmware security as part of a modern security program. Yet, this area remains one of the most overlooked and poorly understood areas of risk within government agencies. This document walks through the requirements and guidance that the law establishes in regard to firmware, and provides practical guidance and recommendations that organizations can use to not only comply with FISMA, but also to build a stronger security program.

As firmware-level threats continue to gain traction in the wild, security teams need to quickly get up to speed on how these threats work and how their devices can be targeted and attacked. In this paper we demystify the most common types of firmware threats today and analyze their path into an organization.

Attackers are increasingly targeting the largely unprotected hardware and firmware within all types of devices. Firmware vulnerabilities are common and difficult to manage, and once exploited, allow attackers to subvert traditional security and gain long-lasting persistence within a network. In this paper, we will explore the nature of the risk, why it has become a priority now, and how organizations can protect themselves today.