59% of companies have experienced a third-party breach.
2018 Data Risk in the Third-Party Ecosystem: Third Annual Study
Cost of a Data Breach
Data Breaches can be expensive, to your reputation, to your bottom line, to your compliance profile, to the value of your company. So you do everything you can and should do to secure your data. But 50% of data breaches happen because of circumstances beyond your control – because of errors and omissions made by others – those you do business with, people and businesses who provide valuable products and services that you rely on to succeed in your own business. How can you be certain that those you rely on to do business aren’t introducing vulnerabilities that will cost you?
Deloitte survey respondents, damages by third parties.
It takes an average of 197 days to identify a data breach and an average of 70 days to contain it.
2018 Data Risk in the Third-Party Ecosystem: Third Annual Study
Fortress Reduces the Cost of Security & Compliance
To support the needs of commercial clients, Fortress Platform offers a systematic and flexible workflow engine for all major assessment frameworks, including National Institute of Standards & Technology (NIST), ISO 27000, the Cloud Security Alliance (CSA), Star, Software Assurance, Standardized Information Gathering (SIG), etc. To support our DoD clients, the Fortress Platform offers the framework workflows for DoD 8500 series and SECNAV Instruction 5239.3C.
Third-party risk management should be simple.
but sometimes it’s not 🡪
Fortress Brings Simplicity with Comprehensive Risk Management
AUTOMATED INHERENT RISK RANKING
It is important to know which vendors are critical enough to your business to justify spending precious resources on assessments. Automated risk ranking evaluates a vendor’s likely (1) data access, (2) physical access, (3) global footprint, (4) cloud and distributed offerings, (5) reputation-related services and (6) financial health risks.
CONTINUOUS CYBER RISK MONITORING
The externally-visible (i.e., on the web) cyber posture of your vendors is a very good leading indicator of internal cyber hygiene. Fortress Guardian cyber risk monitoring evaluates hundreds of data points summarized into (1) application security, (2) application vulnerabilities, (3) domain name server configuration, (4) secure protocol configuration and certificates, (5) known breaches, (6) dark web activity and (7) compromised assets.
CONTINUOUS OPERATIONAL RISK MONITORING
The third-party risk industry has fragmented solutions for monitoring other, non-cyber risks. Fortress Guardian’s continuous operational risk monitoring includes (1) negative news, social media & sentiment analysis, (2) anti-bribery & anti-money-laundering, (3) legal, (4) financial, (5) safety/OSHA and (6) regulatory & compliance issues.
ANALYTICS, WORKFLOW AND INTEGRATIONS
Fortress believes in connected intelligence and self-service data discovery and has infused rich, industry-leading business intelligence. Workflow is also equipped out of the box to give you real-time updates on assessments and asset information you have requested. Fortress Platform also integrates with all leading GRC, procurement and contract management systems.
Fortress covers 40,000 vendors and 300,000 assets
The Fortress Platform
Fortress Platform is a combination of technology, analytics and services (TAS) that provides seamless integrations to enable advanced threat scenarios and program governance. Value is unlocked from existing tools with machine learning and deep analytics driving prioritization.
Fortress Platform provides the following benefits. Click on each to learn more.
Visibility & Simplicity
FP gives you visibility through a single pane of glass, removing the need for disparate technologies that may not be compatible.
Machine Learning & Human Intelligence
FP uses both machine learning-enabled analytics and human intelligence to drive actionable insights. The objective methods used to aggregate and synthesize data provide greater dependability and reduce reliance on the subjectivity inherent in manual data collection and evaluation.
FP utilizes patented technologies including the validation of the integrity of unique file hashes and public key cryptography using a blockchain distributed ledger – to ensure end-to-end software integrity, transactional assurance and security of cyber-physical assets.
Objective, Reliable & Proactive
FP is enabled by a NERC-onboarded Fortress VSOC team to support machine learning and to provide visibility and also recommendations and tracking for remediation, mitigation, and risk outcomes.
Automated Risk Calculations
FP allows calculation of Risk based on Consequences (Business Impact and Technical Impact) and Likelihood. This includes consideration of threat indicators and implemented controls.
Data Ingestion & Analytics Reporting
Fortress ingests data from multiple sources such as these:
- Open Source threat intelligence from our client community
- Fortress threat analysis is driven by our Virtual Security Operations Center (VSOC), which supports existing critical infrastructure companies
- Other curated threat intelligence
Fortress Secures 10% of the Power Grid and Key Assets
Fortress TPRM Resources
Threat Advisory U.S. POWER GRID EXPERIENCES A DENIAL-OF-SERVICE ATTACK DUE TO OUTDATED SECURITY APPLIANCE In May of 2019, the U.S. power grid experienced another attack. A series of unpatched Cisco Adaptive Security Appliances belonging to a western electric utility...
Advisory 5 STEPS FOR AN EFFECTIVE THIRD PARTY VENDOR RISK PROGRAM View More Resources Here 189 S Orange Ave #1950, Orlando, FL 32801 (407) 573.6800 email@example.comCOPYRIGHT © 2019. FORTRESS INFORMATION SECURITY. ALL RIGHTS RESERVED. PRIVACY...
Problem National healthcare provider relies on hundreds of third-party vendors and medical devices that share sensitive information and interact with internal systems. Protected Health Information (PHI) can be worth 1000x more than financial data to hackers, and...
Fortress Accelerates Your Security and Compliance
100% more vendor coverage in the same time period
40 days to
FORTRESS IN THE NEWS
Energy industry owners and operators are growing increasingly nervous about new rules proposed by the Trump administration in an effort to limit foreign threats to the grid. The rules, proposed by an executive order to protect the bulk power system...
Proposed regulations by the Trump administration to reduce threats from foreign countries to the nation’s power grid are increasingly worrying energy industry owners and operators, The Hill reported on Sunday. “The recognition that certain assets...
The Asset to Vendor (A2V) Network for power utilities, a joint venture between Fortress Information Security and American Electric Power (AEP) birthed in November, 2019, aims to promote collaboration among electric companies to protect the U.S....
Get in touch
Want to find out how Fortress can solve problems specific to your business?