Third Party Access Control

third party access controlThird parties can be in the form of contractors, vendors, suppliers or any individual who has access to your network.  In the case of the Target breach, the attackers gained access via a third party maintaining their HVAC systems.

Controlling who, when, how and what third parties can access is an absolute must to ensure the secure operations of your business and customers.

What are the problems with Third Party Access?

  • Third parties often need administrative access to certain systems
  • You have little to no control over the security of the third party systems connecting to your network
  • Little control over when third parties connect to your network
  • Limited visibility over what third parties are doing on your network

Fortunately, i2S have a number of solutions to help better manage third party access:

 

CyberArk Privileged Session Manager

CyberArk Privileged Session Manager provides a number of benefits:

  • Provides a single access control point
  • Prevents malware from jumping to target systems
  • Records every keystroke and mouse click
  • Provides a complete, searchable audit trail for every third party session
  • Ability to require approval from your network admin prior to each connection
  • Privileged single sign-on
  • Proxy-based, agentless architecture

For more information, please visit the CyberArk website. 

 

Fortigate NGFW and UTM devices

Fortigate devices provide a number of benefits for third party access:

  • Secure Virtual Private Network (VPN) access
  • Compatible with Fortinet Two-Factor Authentication tokens
  • Intrusion Prevention System (IPS)
  • Advanced antimalware
  • Web filtering
  • WAN optimisation

 

For more information in managing your third parties, contact i2S now for a consultation.