Skip to main content

Supply-Chain Attack Threat Management

QUESTIONQuestion

How well is FileWave's product protected against Supply-Chain Attacks? What efforts does FileWave makereduce tothe protectrisk of supply-chain attacks against thisthe threat?FileWave product and release process?

ANSWERAnswer

Supply-Chainchain Attacksattacks representare ana attackserious vectorrisk thatfor issoftware vendors, especially sensitive to software vendors that produceprovide systemsendpoint usedmanagement inand ITSM.IT Asoperations onetools. ofFileWave theworks leadingto UEMreduce vendorsthat inrisk cross-platformthrough devicea layered approach to product development, component management, FileWavebuild isautomation, constantlyrelease working on improving our processesdelivery, and toolingsecurity to make sure that our product is protected against known, material vulnerabilities.review.

SupplyA Chainsupply-chain attacks can be difficult to detect and respond to due to the fact that a vulnerabilityissue can be introduced atin multiplemore pointsthan duringone theplace: timeinternal ofsource productcode, creation,a build or release and delivery process and can originate both within the company or come throughprocess, a previously trusted, upstream source - e.g. partner product ,component, a librarythird-party library, or an OSSopen-source component.dependency. Because of that, FileWave treats supply-chain protection as an ongoing process rather than a single control.

ToFileWave's reducecontrols thefocus possibilityon oflimiting suchwhere breach and be able to react quickly, we are pursuing a number of complementary activities, which allow us to control the source of therelease components andcome librariesfrom, used in releases, automate the process ofmaking the product assembly thusprocess limitingrepeatable, possibilityreducing formanual humanrelease errorsteps where practical, reviewing known material vulnerabilities, and oversight,responding and solicitto feedback from security expertsresearchers, vendors, customers, and communities.the broader security community.

No security process is perfect however,perfect, so weFileWave staycontinues diligentto review and alwaysimprove look for improvements in ourits tools and processes,processes especially in response to ever evolvingas cybersecurity threats and attack methods.methods change.

ADDITIONAL INFORMATION

Open Source Software Included in FileWave