Case Studies > Guiding Global Clients Securely Through Mergers, Restructuring, and More

Guiding Global Clients Securely Through Mergers, Restructuring, and More

Company Size
200-1,000
Region
  • America
  • Asia
  • Europe
Country
  • United States
Product
  • Defender for Office 365
  • Abnormal VendorBase™
  • Revelstoke SOAR
Tech Stack
  • AI-powered solution
  • API-based design
Implementation Scale
  • Enterprise-wide Deployment
Impact Metrics
  • Cost Savings
  • Customer Satisfaction
  • Employee Satisfaction
  • Productivity Improvements
Technology Category
  • Cybersecurity & Privacy - Identity & Authentication Management
  • Cybersecurity & Privacy - Network Security
  • Cybersecurity & Privacy - Security Compliance
Applicable Industries
  • Finance & Insurance
  • Professional Service
Applicable Functions
  • Business Operation
  • Quality Assurance
Services
  • Cybersecurity Services
  • System Integration
About The Customer
Greenhill & Co. leads its client businesses through major milestones and complex processes: completing mergers and acquisitions, restructuring, raising capital, and obtaining financing. Greenhill’s global presence spans North America, Europe, and Asia and serves enterprises across multiple industries, including consumer goods and retail, real estate, energy and infrastructure, finance, healthcare, technology, hospitality, and more. With a workforce of over 360 employees, Greenhill is headquartered in New York City. The company is known for advising clients on multibillion-dollar deals and must comply with multiple data security regulations. This makes Greenhill a high-profile target for criminals seeking to steal sensitive data, intercept funds, or commit invoice fraud.
The Challenge
Advising clients worldwide on multibillion-dollar deals means Greenhill must comply with multiple data security regulations. Greenhill’s role also makes it a high-profile target for criminals seeking to steal sensitive data, intercept funds, or commit invoice fraud. Despite implementing an advanced security awareness program, Greenhill wanted to prevent employees from confronting email threats in the first place. Shaffer knew that the fewer decisions employees had to make about the legitimacy of emails, the more secure the company would be. To improve security, Greenhill adopted Defender for Office 365 and made gateway changes, but Shaffer’s team found that socially-engineered threats were still reaching mailboxes. It was clear that while their existing tools managed basic threats well, Greenhill needed a more strategic line of defense against sophisticated attacks.
The Solution
Greenhill selected Abnormal because its AI-powered solution provides behavior-based intelligence to detect advanced spear phishing, name impersonation, and account takeover attacks that Greenhill’s other security layers couldn’t consistently identify or stop. Implementing Abnormal for a proof of value took just a few minutes because of Abnormal’s API-based design. The platform immediately started to monitor Greenhill’s email ecosystem to baseline good behavior among senders and recipients, and this monitoring-mode learning process took place invisibly, which addressed one of Shaffer’s key concerns. Abnormal VendorBase™ also identified more than 70 compromised vendor email accounts. The result is more time for other projects. Shaffer and his team are working on another way to leverage the value Abnormal provides. They plan to integrate Abnormal with their Revelstoke SOAR to automate and streamline their account takeover response plans.
Operational Impact
  • Abnormal detects the widest possible range of email threats and allows Greenhill’s security team to work more quickly.
  • The high efficacy also freed Greenhill’s security team from investigating user reports.
  • Abnormal auto-remediates threats from inboxes so the team can focus their attention on other security initiatives.
  • Shaffer and his team are working on another way to leverage the value Abnormal provides by integrating it with their Revelstoke SOAR to automate and streamline their account takeover response plans.
  • With Abnormal protecting inboxes, handling responses, and enhancing incident response, Greenhill has a stronger position than ever for safely guiding clients through complex events.
Quantitative Benefit
  • Since deployment, Abnormal has stopped more than 130 BEC attacks on Greenhill.
  • Financial enterprises have a 60% probability of receiving a BEC attack each week, on average.
  • Over the first six months of 2022, BEC attacks against all sectors increased by 60%.
  • Zero missed attacks in the past 16 months.

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

Related Case Studies.

Contact us

Let's talk!
* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.