Download PDF
Case Studies > Guiding Global Clients Securely Through Mergers, Restructuring, and More

Guiding Global Clients Securely Through Mergers, Restructuring, and More

Technology Category
  • Cybersecurity & Privacy - Identity & Authentication Management
  • Cybersecurity & Privacy - Network Security
  • Cybersecurity & Privacy - Security Compliance
Applicable Industries
  • Finance & Insurance
  • Professional Service
Applicable Functions
  • Business Operation
  • Quality Assurance
Services
  • Cybersecurity Services
  • System Integration
The Challenge
Advising clients worldwide on multibillion-dollar deals means Greenhill must comply with multiple data security regulations. Greenhill’s role also makes it a high-profile target for criminals seeking to steal sensitive data, intercept funds, or commit invoice fraud. Despite implementing an advanced security awareness program, Greenhill wanted to prevent employees from confronting email threats in the first place. Shaffer knew that the fewer decisions employees had to make about the legitimacy of emails, the more secure the company would be. To improve security, Greenhill adopted Defender for Office 365 and made gateway changes, but Shaffer’s team found that socially-engineered threats were still reaching mailboxes. It was clear that while their existing tools managed basic threats well, Greenhill needed a more strategic line of defense against sophisticated attacks.
About The Customer
Greenhill & Co. leads its client businesses through major milestones and complex processes: completing mergers and acquisitions, restructuring, raising capital, and obtaining financing. Greenhill’s global presence spans North America, Europe, and Asia and serves enterprises across multiple industries, including consumer goods and retail, real estate, energy and infrastructure, finance, healthcare, technology, hospitality, and more. With a workforce of over 360 employees, Greenhill is headquartered in New York City. The company is known for advising clients on multibillion-dollar deals and must comply with multiple data security regulations. This makes Greenhill a high-profile target for criminals seeking to steal sensitive data, intercept funds, or commit invoice fraud.
The Solution
Greenhill selected Abnormal because its AI-powered solution provides behavior-based intelligence to detect advanced spear phishing, name impersonation, and account takeover attacks that Greenhill’s other security layers couldn’t consistently identify or stop. Implementing Abnormal for a proof of value took just a few minutes because of Abnormal’s API-based design. The platform immediately started to monitor Greenhill’s email ecosystem to baseline good behavior among senders and recipients, and this monitoring-mode learning process took place invisibly, which addressed one of Shaffer’s key concerns. Abnormal VendorBase™ also identified more than 70 compromised vendor email accounts. The result is more time for other projects. Shaffer and his team are working on another way to leverage the value Abnormal provides. They plan to integrate Abnormal with their Revelstoke SOAR to automate and streamline their account takeover response plans.
Operational Impact
  • Abnormal detects the widest possible range of email threats and allows Greenhill’s security team to work more quickly.
  • The high efficacy also freed Greenhill’s security team from investigating user reports.
  • Abnormal auto-remediates threats from inboxes so the team can focus their attention on other security initiatives.
Quantitative Benefit
  • Since deployment, Abnormal has stopped more than 130 BEC attacks on Greenhill.
  • Financial enterprises have a 60% probability of receiving a BEC attack each week, on average.
  • Over the first six months of 2022, BEC attacks against all sectors increased by 60%.

Related Case Studies.

Contact us

Let's talk!

* Required
* Required
* Required
* Invalid email address
By submitting this form, you agree that IoT ONE may contact you with insights and marketing messaging.
No thanks, I don't want to receive any marketing emails from IoT ONE.
Submit

Thank you for your message!
We will contact you soon.