Sevco Security is a cybersecurity software company born out of a deep motivation to fix a decades-old problem: attackers have a better understanding of their target networks than the network owners themselves.
San Antonio Foundation
San Antonio Academy
We are Security Leaders
We have served as vulnerability researchers, exploit developers, IT administrators, incident responders, forensic analysts and security analysts. We have led teams at Carbon Black, Cylance, VMWare, Central Intelligence Agency, National Security Agency, U.S. Air Force and USAF Cyber Command. We’ve been operators ourselves and been frustrated with the problems IT, SOC, MSP and Incident Response teams have in understanding their own environment. Our mission is to fix it.
Be unified — you have enough siloed sources giving you conflicting asset inventory data, another one isn’t going to improve matters.
Provide Intelligence – we started our career as intelligence officers. In the intelligence collection lifecycle, data is collected from the operational environment, processed to create information and analyzed to become intelligence.
That intelligence is used for senior leaders to better understand the world. Report the inventory and activity of all your assets – if you’re responsible for it, we should have it. Our product is aligned with your responsibility.
This is a vision that will take years to achieve. We’d love to have you join us on the journey!
Of course, smaller teams often don’t have dedicated security staff and every enterprise has a slightly different set of responsibilities between their security operations and IT operations staff. If you fret over the state of asset discovery in your network, we’re happy to talk with you!
We are a cloud-native, SaaS platform hosted on AWS. We function entirely off integrations with your existing systems. There is no endpoint agent, network sensor or similar data collectors to install. Configuring the integrations is usually simply configuring API keys for each source. (Sources only available from a privileged network access will require deployment of software inside that network segment to host the integration. Installation binaries are available for Windows, Mac and Linux and require minimal resources.)
It doesn’t matter if you manage hundreds of devices or hundreds of thousands of devices, we’re ready to support you. We’ll inevitably encounter some hurdles along the way as we continue to add features and grow the platform, but we are confident they can be quickly addressed!