The Third-Party
Security Challenge

Organizations need third-party support for many areas of their infrastructure, however, the risk these third-parties pose is an area of ongoing concern. These risks include;

Traditional Security Inadequate

Traditional security tools are not well suited to protect customers from security issues that arise from third-party Access.

Traditional tools are enterprise focused and don't support Operationalized Technologies (OT) and Industrial Control System (ICS) Communications.

Moreover, these tools tend are privacy focused conflating encrypted communications as security. Privacy-centric tools don’t have the means to identify and stop malicious and exploitative communications.

Mini Case-Study

mini case-study

A property owner thought that their device installed by their LMS provided security. They were caught off-guard when the device did not catch the malware that infected their computers when their vendor logged in to perform updates. The device was configured for encrypted access and did not perform any security function.

Third Party Security
Control

Customers depend on the services of Third-parties who need privileged access into customer environments. Yet customers have little say and no control over the security of the third-party.

Mini Case-Study

mini case-study

A fortune 500 organizations required emergency services on their HVAC system. The responding third-party employee had issues with his laptop so he switch to his son’s gaming PC to perform the task. The gaming PC was rife with ransomware that spread throughout a substantial portion of the customer environment causing them to declare an incident.

Third-party Turnover Concerns

Managing third-party employee turnover require significant administrative burden. This is a manual process that some organization don’t have, while other contend with it at great cost and burden.

Mini Case-Study

mini case-study

After implementation of the Acreto platform, a fortune 100 organization discovered a device installed by their BMS vendor unbeknownst to them. This device had remote access configured for 82 users from multiple third-party organizations. The vast majority of whom could not be identified or no longer worked for the company that needed access.

Securing Third-Party
OT / ICS Access

Securing Operationalized and Industrial Control technologies requires unique and robust capabilities not offered by enterprise security tools. All-the-while securing third-parties requires its own set of specialized technology capabilities, processes and methodologies.

Acreto addresses the key challenges of third-party access to OT and ICS technologies.

Acreto third-party risk mitigation services provides the tools, capabilities, process and oversight to ensure clean and reliable access for third-parties whose security you do not control.

background checks for third-party

Background checks for third-party organizations and employees.

End to end control limits

End-to-end control limits access to specific technologies

Real-time scanning

Real-time scanning for and mitigation of malicious content

Scheduled access activation

Scheduled access activation

User and acess logs

User and access logs for all communications

Limit access to ot and ics protocols

Limit access to OT and ICS protocols such as BacNET, Modbus and SCADA.

ongoing validation of employement

Ongoing validation of employment status and active elimination of dormant accounts

Why Industry Experts, Insurance Carriers and Customers Trust Acreto

Dealing with Incident Response Issue?

Fast Track Deployment