Thru’s Third-Party Cybersecurity Risk Assessment

Share:

Since our inception in 2002, Thru has always taken security of our product and our customers’ data very seriously. We transfer sensitive data for corporations on a daily basis and must meet tightening data privacy regulations and guard against the everchanging and continually growing number of cybersecurity threats.

As such, we are always open to evaluations of our product and information security (InfoSec) from trusted third parties.

This past summer, we agreed to an assessment by CyberVadis at the request of one of our current customers. This Cybersecurity and Data Privacy Performance evaluation of Thru covered areas such as infrastructure, personnel, product development…everything!

Continue reading for a quick overview of CyberVadis, how they provide assessments and to learn our results.

Who Is CyberVadis?

CyberVadis is an assessor that is contracted to perform nonbiased security risk assessments to third-party vendors. Its platform is based on a methodology that maps to all major international compliance standards—including GDPR, NIST, NY DFS, CCPA—and combines the speed of automation with the accuracy and effectiveness of a team of experts, according to CyberVadis’ website.

CyberVadis logo

How CyberVadis Evaluates Security Risks of Third-Party Vendors

CyberVadis provides logins to a vendor’s representatives so they can directly access a secure online portal containing questions with multiple choice answers. The portal provides users access to an in-depth questionnaire covering four focus areas of security practices, procedures and policies and four categories of functions across the focus areas:

Focus Areas

  • Data privacy
  • Data protection
  • Business continuity
  • Third-party security management

Function Categories

  • Identify
  • Protect
  • Detect
  • React

For each selected answer choice, the user is required to upload and submit supporting evidence, such as policy statements, procedure manuals, inventory spreadsheets and screenshots. The platform allows users to navigate through the questions in any order and provides instructions, tips and examples of appropriate evidence for each answer.

After the vendor completes the questionnaire by a specified date, the expert analysts at CyberVadis manually and rigorously audit the submitted proof to validate and confirm the security claims of the vendor organization. CyberVadis then issues a report that includes results assessment and a standardized cybersecurity rating that can be shared with others. The report also includes improvement recommendations for the vendor.

CyberVadis cybersecurity ratings scale:

INSUFFICIENT BASIC MODERATE DEVELOPED MATURE
<400 400-549 550-699 700-849 >850

Thru’s Cybersecurity and Data Privacy Performance Overview

thru's cybersecurity overall assessment score
Thru’s InfoSec team stepped up to this task and logged into the CyberVadis online portal to answer the questionnaire and upload proof of the submitted answers. It was an arduous, several weeks-long task but well worth the time and effort.

After CyberVadis received, analyzed and validated our answers with accompanying proof, our overall score of 794 placed us in the DEVELOPED category.

Identify Function Scoring

The Identify function consists of identifying sensitive assets that should be protected and their risks. Additionally, deciding what needs to be implemented to cover the major risks.

Thru scored 904 (Mature) overall in Identify, which is evaluated across the categories of

  • Compliance
  • Data privacy
  • Governance
  • Asset management
  • Risk assessment
  • Human resources
thru's cybersecurity assessment in identify

Protect Function Scoring

The Protect function includes implementing security measures that will contribute to limit or contain the impact of a potential cybersecurity event.

Thru scored 758 (Developed) overall in Protect, which is evaluated across the categories of

  • Access management
  • Information protection
  • Network management & mobility security
  • Security in projects & applications development
  • Infrastructure security
  • Physical protection
  • Third-party management
  • Awareness & training
thru's cybersecurity assessment in protect

Detect Function Scoring

The Detect function includes developing and implementing the appropriate measures to identify the occurrence of a cybersecurity event.

Thru scored 809 (Developed) overall in Detect, which is evaluated across the categories of

  • Logging & monitoring
  • Detection process
  • Anomalies & events
thru's cybersecurity assessment in detect

React Function Scoring

The React function includes developing and implementing the appropriate measures to take action regarding a detected cybersecurity event.

Thru scored 732 (Developed) overall in React, which is evaluated across the categories of

  • Incident management
  • Crisis management
  • Improvements
thru's cybersecurity assessment in react

Thru’s Complete Results of Third-Party InfoSec Review

We are pleased with our results and rating. Additionally, we are now aware of very specific areas that need improvement and have guidance on how to implement and achieve those standards or practices.

If you are considering Thru for managed file transfer for your business, please request our complete CyberVadis Cybersecurity and Data Privacy Performance report »

Share:

Have questions about managed file transfer?

Get answers, not a sales pitch. Our experts have analyzed, discussed and solved difficult file transfer challenges since 2002. We are here to help you.

Scroll to Top