Recent Breaches
Breaches
2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen
View All →
Threat Response

Eliminate Supply Chain Risk Through Physical Path Governance

Supply chain attacks exploit the persistent connections that organisations maintain with vendors, managed service providers, and software suppliers. When these paths are physically severed between active sessions, the attack vector ceases to exist.

Back to Control
Control

Threat Response

Every vendor connection is a doorway into your organisation. If that doorway remains open when no one is walking through it, you are inviting risk without gaining value.

62%

Of breaches originate through third-party access

Zero

Persistent vendor paths outside maintenance windows

100%

Third-party sessions recorded on tamper-proof storage

4.5x

Faster containment when vendor paths are physically severed

The Threat

Third-party connections are the most exploited entry point.

Persistent Vendor Access

Managed service providers and equipment vendors maintain always-on VPN connections and remote access tools. These paths remain active 24/7, regardless of whether maintenance is being performed.

Trust Chain Exploitation

Attackers compromise a vendor with weaker security and use their legitimate access to pivot into the target organisation. The connection is trusted, the credentials are valid, and the activity appears routine.

Software Supply Chain

Compromised software updates delivered through trusted channels bypass perimeter security entirely. The malicious payload arrives through the same path as legitimate updates.

The Scenario

Scenario: Managed Service Provider Compromise

A mid-size manufacturer uses a managed IT service provider for patch management and monitoring. The MSP maintains a persistent VPN connection to the manufacturer's network for 24/7 support. Attackers compromise the MSP's RMM platform and use the existing VPN connection to deploy ransomware across all of the MSP's clients simultaneously. With Firevault Control, the MSP's access path is physically severed outside scheduled maintenance windows. The Relay module activates the connection for a four-hour patch window each Tuesday, with all activity recorded. When the MSP is compromised on a Thursday evening, there is no path for the attackers to traverse.

"Our MSP had a VPN into our network that was active 168 hours a week. They used it for about 6 hours. That left 162 hours where an attacker had a trusted path into our core infrastructure."

Mitigation Blueprint

Vendor access that exists only when it is needed.

Firevault Control transforms third-party access from a persistent liability into a controlled, time-bound operation. Vendor connections exist only during authorised windows, are confined to isolated zones, and produce tamper-proof evidence of every action.

  • Physical disconnection of all vendor paths outside maintenance windows
  • Multi-party authorisation for every vendor session
  • Vendor zone isolation with no path to production infrastructure
  • Instant physical severance when a supply chain compromise is detected
  • Complete session recording on disconnected storage
  • Automated compliance evidence for supplier assessments
Relay

Relay — Time-Bound Vendor Windows

Module 1 of 4

Activates third-party access paths only during scheduled maintenance windows. The connection is physically established at the start of the window and physically severed at the end. Between windows, no path exists.

Featured In

TechRadar ProConnected BritainTotal TelecomSecurity BuyerComms BusinessComms DealerBlocks & FilesYahoo FinanceGlobeNewswireChannel InsiderUK DirectorSecurityBriefPCRBusiness Time in EssexTechRadar ProConnected BritainTotal TelecomSecurity BuyerComms BusinessComms DealerBlocks & FilesYahoo FinanceGlobeNewswireChannel InsiderUK DirectorSecurityBriefPCRBusiness Time in Essex

Key Capabilities

Scheduled Access Windows

Vendor connections activate only during defined maintenance windows. Between windows, the physical path does not exist and cannot be established remotely.

Multi-Party Session Approval

Every vendor session requires approval from both the vendor team and internal security before the physical path is activated.

Complete Session Recording

All vendor activity during active windows is captured on physically disconnected storage that neither the vendor nor an attacker can access or modify.

Instant Vendor Disconnection

When a supply chain compromise is detected, all vendor paths are physically severed within seconds, regardless of which vendor is affected.

Vendor Zone Isolation

Third-party access is confined to a physically separated zone with no path to production systems, backup infrastructure, or management planes.

Vendor Compliance Evidence

Automated logging provides the evidence required for ISO 27001 supplier assessments, NIS2 supply chain requirements, and contractual SLA compliance.

Demo to Live

Adoption Guide

Step 1

Third-Party Path Audit

Map every vendor, MSP, and software supplier connection into your infrastructure, documenting active hours, data flows, and the systems each path can reach.

Step 2

Window and Zone Design

Define maintenance windows, vendor zones, and multi-party authorisation requirements for each third-party relationship based on operational need and risk profile.

Step 3

Pilot with Primary MSP

Deploy Relay-governed access for your primary managed service provider, testing scheduled windows, emergency access procedures, and session recording.

Step 4

Full Vendor Governance

Extend to all third-party connections with automated window management, vendor zone isolation, and continuous compliance evidence generation.

Step 1

Third-Party Path Audit

Map every vendor, MSP, and software supplier connection into your infrastructure, documenting active hours, data flows, and the systems each path can reach.

Step 2

Window and Zone Design

Define maintenance windows, vendor zones, and multi-party authorisation requirements for each third-party relationship based on operational need and risk profile.

Step 3

Pilot with Primary MSP

Deploy Relay-governed access for your primary managed service provider, testing scheduled windows, emergency access procedures, and session recording.

Step 4

Full Vendor Governance

Extend to all third-party connections with automated window management, vendor zone isolation, and continuous compliance evidence generation.

Questions

Frequently Asked

Ready to take the next step?

See how Control can govern your data paths with physical enforcement no software exploit can bypass.

    Your privacy matters

    We use cookies to keep the site running smoothly and to understand how you use it. You are in control. Privacy Charter · Cookie Policy