Third Party Access Control
Third parties can be in the form of contractors, vendors, suppliers or any individual who has access to your network. In the case of the Target breach, the attackers gained access via a third party maintaining their HVAC systems.
Controlling who, when, how and what third parties can access is an absolute must to ensure the secure operations of your business and customers.
What are the problems with Third Party Access?
- Third parties often need administrative access to certain systems
- You have little to no control over the security of the third party systems connecting to your network
- Little control over when third parties connect to your network
- Limited visibility over what third parties are doing on your network
Fortunately, i2S have a number of solutions to help better manage third party access:
CyberArk Privileged Session Manager provides a number of benefits:
- Provides a single access control point
- Prevents malware from jumping to target systems
- Records every keystroke and mouse click
- Provides a complete, searchable audit trail for every third party session
- Ability to require approval from your network admin prior to each connection
- Privileged single sign-on
- Proxy-based, agentless architecture
For more information, please visit the CyberArk website.
Fortigate devices provide a number of benefits for third party access:
- Secure Virtual Private Network (VPN) access
- Compatible with Fortinet Two-Factor Authentication tokens
- Intrusion Prevention System (IPS)
- Advanced antimalware
- Web filtering
- WAN optimisation