• CUSTOMER LOGIN
  • Products
    • TPRM by ThirdPartyTrust
    • Beacon by ThirdPartyTrust
  • Company
    • About us
    • Partners
    • Product Security
    • Privacy Policy
REQUEST DEMO
  • Products
    • TPRM by ThirdPartyTrust
    • Beacon by ThirdPartyTrust
  • Company
    • About us
    • Partners
    • Product Security
    • Privacy Policy
REQUEST DEMO
  • CUSTOMER LOGIN
  • Products
    • TPRM by ThirdPartyTrust
    • Beacon by ThirdPartyTrust
  • Company
    • About us
    • Partners
    • Product Security
    • Privacy Policy
REQUEST DEMO
  • CUSTOMER LOGIN
  • Products
    • TPRM by ThirdPartyTrust
    • Beacon by ThirdPartyTrust
  • Company
    • About us
    • Partners
    • Product Security
    • Privacy Policy
REQUEST DEMO
  • PARTNERS LOGIN
  • CONTACT US
  • PRIVACY POLICY

Selective Sharing: Customizing the vendor security response process

Published by Sabrina Pagnotta on April 2, 2021
Categories
  • Blog
Tags
  • Product News
  • TPRM Best Practices
selective sharing thirdpartytrust

Third-party vendors are constantly asked to show their security posture to their customers by sending questionnaires, certifications and attestations —usually via email. With Beacon by ThirdPartyTrust, we’ve scaled that process offering third-parties the ability to create a centralized profile with all their security documentation, and share it with the click of a button. We’ve now taken a step further by introducing the Selective Sharing functionality.

Beacon allows you to upload, maintain and share documents like SIG Core and Lite, Cloud Security Alliance CAIQ, SOC reports, ISO certifications, HiTrust, pentests, insurance documentation, and more. When asked to showcase your security posture, you create a customer connection using the ‘Share my Data’ button.

This would share your entire set of documents, but now you can choose what to share and who to share it with, thanks to the new Selective Sharing functionality. 

In this way, we provide additional fine tune options for you to manage your customer relationships based on your needs. Share your security profile, showing only what you want!

Customers will have a unique connection experience based on their needs and requirements, and won’t receive anything they didn’t ask for. This also helps prevent sales and support staff from sending the wrong versions of documents or from sharing them insecurely, as everything is encrypted in the ThirdPartyTrust platform.

beacon by thirdpartytrust - vendor security profile

How to use Selective Sharing

You will be able to turn on Selective Sharing when:

  • You click on “Share My Data” and wish to generate a new connection 
  • You receive a request from a customer and you answer by sending your security profile
  • You want to edit an existing connection with any of your customers

Upon creating a new connection using the ‘Share my Data’ button, you will now see a toggle to turn on Selective Sharing. Once it’s on, you’ll be able to select which of your documents you want to share.

[dt_highlight color=”” text_color=”” bg_color=””]PRO TIP: You can turn Selective Sharing on in each one of your connections to customize them based on your needs and requirements! [/dt_highlight]

Another feature to make life at work easier

There aren’t enough hours in the day to respond to each customer security request via email and spreadsheets. With Beacon by ThirdPartyTrust and Enterprise by ThirdPartyTrust we set out to build a platform to reduce the inefficiencies and redundancies in the vendor assessment process, for both sides.

As a third-party, you can save time and effort by securely sharing your Beacon profile, and avoid starting from scratch on every customer security assessment.

Our platform has actually helped Vertafore reduce the due diligence response workload by 75% and they manage more than 250 customer connections per year. Download the full case study here.

vertafore case study quote

These are some of the benefits of using Beacon by ThirdPartyTrust:

  • Assembling a robust security profile to build confidence in the security response process
  • Getting ahead of infosec questionnaires to avoid starting from scratch on every assessment
  • Maintaining ownership control to avoid sending outdated or incorrect information
  • Leveraging communication tools within the platform, so if a question arises, you can directly message with your customer

To learn more about how ThirdPartyTrust can help you streamline your security response process as a vendor, request your free trial now:

Trial Account Sign-Up
Sabrina Pagnotta
Sabrina Pagnotta
Sr. Content Strategist
  • Phone
    |+1-617-245-0469
  • Address
    |
    111 Huntington Ave, Suite 2010, Boston, MA 02199
  • Sales
    |sales@bitsighttech.com
  • Contact Us
Laika_SOC2_TypeI_PurpleIris        CSA_Trusted_Cloud_Provider

©2022 ThirdPartyTrust, LLC and its Affiliates. All Rights Reserved. | 111 Huntington Ave. Suite 2010 Boston, MA 02199
  • PARTNERS LOGIN
  • CONTACT US
  • PRIVACY POLICY
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Reject AllAccept
Cookie Settings
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT