Since our inception in 2002, Thru has always taken security of our product and our customers’ data very seriously. We transfer sensitive data for corporations on a daily basis and must meet tightening data privacy regulations and guard against the everchanging and continually growing number of cybersecurity threats.
As such, we are always open to evaluations of our product and information security (InfoSec) from trusted third parties.
This past summer, we agreed to an assessment by CyberVadis at the request of one of our current customers. This Cybersecurity and Data Privacy Performance evaluation of Thru covered areas such as infrastructure, personnel, product development…everything!
Continue reading for a quick overview of CyberVadis, how they provide assessments and to learn our results.
Who Is CyberVadis?
How CyberVadis Evaluates Security Risks of Third-Party Vendors
For each selected answer choice, the user is required to upload and submit supporting evidence, such as policy statements, procedure manuals, inventory spreadsheets and screenshots. The platform allows users to navigate through the questions in any order and provides instructions, tips and examples of appropriate evidence for each answer.
After the vendor completes the questionnaire by a specified date, the expert analysts at CyberVadis manually and rigorously audit the submitted proof to validate and confirm the security claims of the vendor organization. CyberVadis then issues a report that includes results assessment and a standardized cybersecurity rating that can be shared with others. The report also includes improvement recommendations for the vendor.
Thru’s Cybersecurity and Data Privacy Performance Overview
After CyberVadis received, analyzed and validated our answers with accompanying proof, our overall score of 794 placed us in the DEVELOPED category.
Identify Function Scoring
The Identify function consists of identifying sensitive assets that should be protected and their risks. Additionally, deciding what needs to be implemented to cover the major risks.
Thru scored 904 (Mature) overall in Identify, which is evaluated across the categories of
Protect Function Scoring
The Protect function includes implementing security measures that will contribute to limit or contain the impact of a potential cybersecurity event.
Thru scored 758 (Developed) overall in Protect, which is evaluated across the categories of
Detect Function Scoring
The Detect function includes developing and implementing the appropriate measures to identify the occurrence of a cybersecurity event.
Thru scored 809 (Developed) overall in Detect, which is evaluated across the categories of
React Function Scoring
The React function includes developing and implementing the appropriate measures to take action regarding a detected cybersecurity event.
Thru scored 732 (Developed) overall in React, which is evaluated across the categories of
Thru’s Complete Results of Third-Party InfoSec Review
If you are considering Thru for managed file transfer for your business, please complete and submit this form to download our CyberVadis Cybersecurity and Data Privacy Performance report: