实例探究 > Guiding Global Clients Securely Through Mergers, Restructuring, and More

Guiding Global Clients Securely Through Mergers, Restructuring, and More

公司规模
Mid-size Company
地区
  • America
  • Europe
  • Asia
国家
  • United States
产品
  • Defender for Office 365
  • Abnormal VendorBase™
  • Revelstoke SOAR
技术栈
  • AI-powered solution
  • API-based design
实施规模
  • Enterprise-wide Deployment
影响指标
  • Cost Savings
  • Customer Satisfaction
  • Productivity Improvements
  • Employee Satisfaction
技术
  • 网络安全和隐私 - 身份认证管理
  • 网络安全和隐私 - 网络安全
适用行业
  • 金融与保险
  • Professional Service
适用功能
  • 商业运营
  • 质量保证
服务
  • 系统集成
  • 网络安全服务
关于客户
Greenhill & Co. leads its client businesses through major milestones and complex processes: completing mergers and acquisitions, restructuring, raising capital, and obtaining financing. Greenhill’s global presence spans North America, Europe, and Asia and serves enterprises across multiple industries, including consumer goods and retail, real estate, energy and infrastructure, finance, healthcare, technology, hospitality, and more. With a workforce of over 360 employees, Greenhill is headquartered in New York City. The company is known for advising clients on multibillion-dollar deals and must comply with multiple data security regulations. This makes Greenhill a high-profile target for criminals seeking to steal sensitive data, intercept funds, or commit invoice fraud.
挑战
Advising clients worldwide on multibillion-dollar deals means Greenhill must comply with multiple data security regulations. Greenhill’s role also makes it a high-profile target for criminals seeking to steal sensitive data, intercept funds, or commit invoice fraud. Despite implementing an advanced security awareness program, Greenhill wanted to prevent employees from confronting email threats in the first place. Shaffer knew that the fewer decisions employees had to make about the legitimacy of emails, the more secure the company would be. To improve security, Greenhill adopted Defender for Office 365 and made gateway changes, but Shaffer’s team found that socially-engineered threats were still reaching mailboxes. It was clear that while their existing tools managed basic threats well, Greenhill needed a more strategic line of defense against sophisticated attacks.
解决方案
Greenhill selected Abnormal because its AI-powered solution provides behavior-based intelligence to detect advanced spear phishing, name impersonation, and account takeover attacks that Greenhill’s other security layers couldn’t consistently identify or stop. Implementing Abnormal for a proof of value took just a few minutes because of Abnormal’s API-based design. The platform immediately started to monitor Greenhill’s email ecosystem to baseline good behavior among senders and recipients, and this monitoring-mode learning process took place invisibly, which addressed one of Shaffer’s key concerns. Abnormal VendorBase™ also identified more than 70 compromised vendor email accounts. The result is more time for other projects. Shaffer and his team are working on another way to leverage the value Abnormal provides. They plan to integrate Abnormal with their Revelstoke SOAR to automate and streamline their account takeover response plans.
运营影响
  • Abnormal detects the widest possible range of email threats and allows Greenhill’s security team to work more quickly.
  • The high efficacy also freed Greenhill’s security team from investigating user reports.
  • Abnormal auto-remediates threats from inboxes so the team can focus their attention on other security initiatives.
  • Shaffer and his team are working on another way to leverage the value Abnormal provides by integrating it with their Revelstoke SOAR to automate and streamline their account takeover response plans.
  • With Abnormal protecting inboxes, handling responses, and enhancing incident response, Greenhill has a stronger position than ever for safely guiding clients through complex events.
数量效益
  • Since deployment, Abnormal has stopped more than 130 BEC attacks on Greenhill.
  • Financial enterprises have a 60% probability of receiving a BEC attack each week, on average.
  • Over the first six months of 2022, BEC attacks against all sectors increased by 60%.
  • Zero missed attacks in the past 16 months.

Case Study missing?

Start adding your own!

Register with your work email and create a new case study profile for your business.

Add New Record

相关案例.

联系我们

欢迎与我们交流!
* Required
* Required
* Required
* Invalid email address
提交此表单,即表示您同意 IoT ONE 可以与您联系并分享洞察和营销信息。
不,谢谢,我不想收到来自 IoT ONE 的任何营销电子邮件。
提交

感谢您的信息!
我们会很快与你取得联系。