Ginegar Plastic Products is the world leader in supplying films and nets to agricultural and infrastructure development companies. With headquarters in Israel, Ginegar operates in over 60 countries.
To support IT infrastructure for such a large-scale organization, Ginegar works with numerous subcontractors that have access to their servers with sensitive data. That’s why our customer was looking for software that allowed them to secure third-party access and investigate activity on their servers in a simple manner.
- Automate third-party access management
- Get insights into third-party activity
- Enhance the ability to investigate vendor activities
We work with a variety of vendors that connect to our servers to perform various operations. Before installing Ekran System, handling access of these vendors required a lot of work from our IT staff, as it was necessary to provide each vendor their own access to make sure they only connected to the digital assets relevant to them. In addition, there are vendors that connect to the system during non-working hours, and we at IT didn’t know who logged in and when.
System Manager at Ginegar Plastic Products
Manually managing third-party access to sensitive data and parts of the IT infrastructure took too much time and effort on the part of Ginegar’s IT administrators. Upon each connection, administrators had to decide whether to allow or deny access and specify which assets a third-party vendor could access.
And since some subcontractors access company servers outside of the Ginegar IT staff’s working hours, their activity was left undermanaged and poorly monitored. Insufficient logging made it challenging to determine who connected to servers and what they did.
After evaluating different vendor risk monitoring services and solutions to resolve these challenges, Ginegar decided to deploy Ekran System.
Deploying Ekran System allowed our customer to:
- Enable IT administrators to focus on important tasks
- Gain complete awareness of who does what within the monitored infrastructure
- Collect detailed tamper-proof evidence for analyzing user activity