下载PDF
实例探究 > Guiding Global Clients Securely Through Mergers, Restructuring, and More

Guiding Global Clients Securely Through Mergers, Restructuring, and More

技术
  • 网络安全和隐私 - 身份认证管理
  • 网络安全和隐私 - 网络安全
  • 网络安全和隐私 - 安全合规
适用行业
  • 金融与保险
  • Professional Service
适用功能
  • 商业运营
  • 质量保证
服务
  • 网络安全服务
  • 系统集成
挑战
Advising clients worldwide on multibillion-dollar deals means Greenhill must comply with multiple data security regulations. Greenhill’s role also makes it a high-profile target for criminals seeking to steal sensitive data, intercept funds, or commit invoice fraud. Despite implementing an advanced security awareness program, Greenhill wanted to prevent employees from confronting email threats in the first place. Shaffer knew that the fewer decisions employees had to make about the legitimacy of emails, the more secure the company would be. To improve security, Greenhill adopted Defender for Office 365 and made gateway changes, but Shaffer’s team found that socially-engineered threats were still reaching mailboxes. It was clear that while their existing tools managed basic threats well, Greenhill needed a more strategic line of defense against sophisticated attacks.
关于客户
Greenhill & Co. leads its client businesses through major milestones and complex processes: completing mergers and acquisitions, restructuring, raising capital, and obtaining financing. Greenhill’s global presence spans North America, Europe, and Asia and serves enterprises across multiple industries, including consumer goods and retail, real estate, energy and infrastructure, finance, healthcare, technology, hospitality, and more. With a workforce of over 360 employees, Greenhill is headquartered in New York City. The company is known for advising clients on multibillion-dollar deals and must comply with multiple data security regulations. This makes Greenhill a high-profile target for criminals seeking to steal sensitive data, intercept funds, or commit invoice fraud.
解决方案
Greenhill selected Abnormal because its AI-powered solution provides behavior-based intelligence to detect advanced spear phishing, name impersonation, and account takeover attacks that Greenhill’s other security layers couldn’t consistently identify or stop. Implementing Abnormal for a proof of value took just a few minutes because of Abnormal’s API-based design. The platform immediately started to monitor Greenhill’s email ecosystem to baseline good behavior among senders and recipients, and this monitoring-mode learning process took place invisibly, which addressed one of Shaffer’s key concerns. Abnormal VendorBase™ also identified more than 70 compromised vendor email accounts. The result is more time for other projects. Shaffer and his team are working on another way to leverage the value Abnormal provides. They plan to integrate Abnormal with their Revelstoke SOAR to automate and streamline their account takeover response plans.
运营影响
  • Abnormal detects the widest possible range of email threats and allows Greenhill’s security team to work more quickly.
  • The high efficacy also freed Greenhill’s security team from investigating user reports.
  • Abnormal auto-remediates threats from inboxes so the team can focus their attention on other security initiatives.
数量效益
  • Since deployment, Abnormal has stopped more than 130 BEC attacks on Greenhill.
  • Financial enterprises have a 60% probability of receiving a BEC attack each week, on average.
  • Over the first six months of 2022, BEC attacks against all sectors increased by 60%.

相关案例.

联系我们

欢迎与我们交流!

* Required
* Required
* Required
* Invalid email address
提交此表单,即表示您同意 IoT ONE 可以与您联系并分享洞察和营销信息。
不,谢谢,我不想收到来自 IoT ONE 的任何营销电子邮件。
提交

Thank you for your message!
We will contact you soon.