<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1033252670099820&amp;ev=PageView&amp;noscript=1">
New Call-to-action

Service Provider Security: Protect from Disaster, Create Added Value

› › › BACK TO THE BLOG

[fa icon="calendar"] Dec 7, 2016 9:51:10 AM / by Dominique Meurisse

Embedding the WALLIX Privileged Access Management Solution with Service Providers offerings helps them to create added value and protect them from disaster!

 

service-provider-security.jpg

 

 

It’s almost a rule of thumb; if a company which uses a managed service provider is victim of a security breach and of data theft, the service provider will be incriminated and it will be his role to demonstrate his innocence. To be a provider is to be in permanent intrusion on an information system that does not belong to you!

As a service provider, one way or another you become a privileged user of your customer’s infrastructure.  No matter the level of the service agreement you have signed with your customer, your responsibility, reputation, and time are involved in the fact that as a privileged user, your staff has access to the highest level of trust and operates directly from your customers’ DATA vaults. 

 

High Access Means Top Service Provider Security is a Must

Having the keys to the severs, databases, firewalls and network equipment, it is mandatory to provide your service no matter the localization of the resource (on site, in a data center, on a cloud or hybrid environment, etc.).

It also means that your IT staff has full access to the data that is transported, stored, and managed by the IT infrastructure. The problem is that you are not alone in sharing this key and that in the case of a data breach, you need to be absolutely sure that you and your team are not found liable for what happened. How many hours will be spent in meetings or investigating who is responsible, and whether the breach was accidental or malicious? If technically sharing an account is mandatory, it’s obvious there must be a full audit trail showing pre-session authentication and authorized account usage for security reasons.

 

What to Do to Ensure Top Service Provider Security

WALLIX provides the Wallix AdminBastion (WAB) Suite. The bastion is a governance tool helping service providers define, control, monitor, and manage privileged users’ access.

As such, WAB Suite helps service providers to:

  • Facilitate admin rules
  • Differentiate their offer
  • Increase Customer retention
  • Protect their e-reputation (think about how many incidents you could avoid if you had full monitoring capacities on top of high access security over the resources and data you control!)

 

Facilitate admin rules

WAB Suite creates value by making it easier for administrators to connect to resources directly without having to search for a KeePass, Excel file, IP, or server name. All of the information they need is already in the bastion and accessible in one click, in a single and customized Web interface.

 

Differentiate your offering – Create more value

Whatever services you provide, security is one of your customers’ major concerns and clearly a domain where value is recognized. As such, tracing all actions done by admins is mandatory according to ISO 27001 rules. However, there is no reason that the cybersecurity business should only profit hackers or security vendors! By including a privileged access management (PAM) solution to your offering, you acknowledge responsibility, respect, and solve some of your customers’ key challenges:

  1. Yes, we want a solution but we do not have the time.
  2. We do not have the staff available to implement or manage such a solution.

WAB Suite is an easy companion to remote services. It helps save costs by allowing secure and fully traced remote diagnostics by experts without a local presence, avoiding long and complex investigations and reducing the impact in the case of damages or cyberattacks.

 

Increase Customer retention – protect your e-reputation

All experts admit that the first action made by hackers in case of a cyberattack is to increase privileges in the infrastructure to steal the data.

Recent attacks have shown that whatever their true responsibility, the name of the service provider is clearly associated to the name of the victim company (HP for the US NAVY, Capgemini for Mickael Page, etc.).

 

So, just imagine you are the CEO of a victim company; your business is compromised, your compliance void, and your reputation on the line. Perhaps the first action you will take would be to ask for the head of the CIO, then for liquidated damages to the provider, before ultimately changing provider!

 

As a service provider, your name would now be on the wall of shame for unsecured services… and the worst thing is that you could have protected your systems, connections, and reputation for a minimal cost!

 

Don’t let it be that way! Learn more on how to protect the access to the data you hold by visiting www.wallix.com or by clicking below!

 

Get our FREE DEMO to manage and monitor privileged access

 

Topics: Preventing Insider Threat

SIGN UP
to receive our best articles!

Get Access to our white paper : The Insider Threats Comic Book

Get Access to our White paper : Major misconceptions about IT security