Stairs dark green 5 FINAL

Coats Optimizes Its Extensive Supply Chain Security, Protecting Customers and Vendors

With Abnormal ICES layered over Microsoft Defender, Coats employees are free to focus on continuing the company’s 250-year tradition of innovation, rather than sorting through emails and trying to assess the risks.

Company Overview

Industry: Manufacturing
Location:
London, United Kingdom and Charlotte, North Carolina
Protected Mailboxes:
11,000

Coats environment

Coats is the global leader in industrial thread manufacturing, with more than 17,000 employees producing enough fiber daily to stretch to the sun and back four times. The 250-year-old company has stayed at the forefront of textile innovation as demand evolved from sewing thread to healthcare PPE and carboncomposite fibers for aerospace manufacturing. Coats leverages new technologies and market expertise to develop products for customers in the apparel, luggage, footwear, home and recreation, personal protection, transportation, telecommunications, and energy industries.

During 2020, Coats—like many enterprises—faced an increase in advanced email attacks year over year. Coats had invested in Microsoft Defender for Office 365 which was effective in blocking common email attacks by leveraging rules and policies, and threat intelligence. However, for advanced attacks they needed a solution like Abnormal Security that leverages a behavioral approach to detect and block never-seen-before attacks with high efficacy.

“We were also finding messages in quarantine that didn’t belong there, and we didn’t understand why they were quarantined. The overall result was more risky messages getting through, more good messages stuck in quarantine, and more time assessing why our controls weren’t stopping potentially illegitimate messages and trying to fine-tune our safelist,” said Benjamin Corll, VP of Cyber Security and Data Protection. The result was time and attention diverted from innovation and other security priorities.

“Abnormal keeps our users from receiving advanced threat emails in their inbox, eliminating the risk of engaging in fraud or compromised messages. Abnormal automatically reduces our threat exposure and shrinks our attack surface.”
Helge Brummer, VP of Global Technology & Operations

Finding a Defense-in-Depth Solution for the Microsoft 365 Environment

“We chose Microsoft 365 to reduce our on-premises overhead, increase email system uptime, and meet executives’ needs for familiar email tools,” said Albert Carreon, Head of Global Architecture. “Microsoft Defender and Exchange Online Protection handle the basic blocking and tackling on email security to filter out messages that are known to be bad.”

The challenge was stopping email attacks designed without malicious links or attachments to evade basic safeguards. The number of phishing, and business email compromise messages getting through left Coats vulnerable to attacks that could cause extensive damage. Coats knew it needed to layer another solution onto its Microsoft controls. “We looked at traditional secure email gateways (SEGs), but their protections were similar to what Microsoft was doing,” Corll said.

“We needed a powerful, modern, behavior-based solution that was designed to work seamlessly with Microsoft. Abnormal Security’s Integrated Cloud Email Security (ICES) platform was the right choice. ICES uses ML and AI to evaluate behavior and content.” Corll said. “Since we turned on ICES in the past year, we have not experienced a single compromised account.”

Securing Email Communication Across a Vast Supply Chain

Coats operates in 55 countries, supplying more than 1,000 customers who make items ranging from jeans, luggage, and mattresses to firefighter gear, fiber optic cables, vehicle airbags, and smartphones. Because Coats and its customers have such complex supply chains, Coats Digital developed its own agile, sustainable supply chain solution for fashion manufacturers and brands.

Preventing supply chain compromise is a critical component of maintaining security and trust across the Coats ecosystem. Upon implementation, Abnormal’s AI-driven VendorBase identified Coats’ 7,099 vendors and evaluated their messages for potential compromise, based on each vendor’s legitimacy, history of compromise, and history of impersonation attempts at Coats and across all Abnormal customers. The behavioral analysis within VendorBase found 30 vendors at high risk, another 20 at medium risk, and 33 attacks from legitimate vendor and partner accounts. Based on the results, “Abnormal showed that it’s a robust defense-in-depth solution with unparalleled vendor analysis,” Corll said.

Coats stats

Coats Saves Time and Maintains Focus with Abnormal ICES Precise Detection

With the Abnormal Integrated Cloud Email Security platform, Coats avoided the need for multiple, potentially incompatible, products to enhance their Microsoft email security. ICES is the only email security platform that deploys precise detection against advanced email attacks, streamlines email security architecture, reduces security team overhead, all while maintaining Microsoft 365’s native security features.

ICES also creates a more efficient inbox user experience. The ICES promotions folder separates marketing messages from spam, so it’s less risky for users to check their promotions. If they move a promotion email to their main folder, Abnormal remembers that choice. “At first you look every day. Now, I’m looking maybe once a week. Overall, my productivity has changed for the better,” said Helge Brummer, VP of Global Technology & Operations.

Remediating email sent by mistake is more efficient, too. “Minutes matter when a managing director is sweating bullets because a message went to the wrong recipients.” Instead of 30 to 90 minutes, Corll and his team now remediate them in two minutes from the Abnormal console.

“Abnormal is context-and behavior-based, so it complements Defender well. Defender is effective in blocking spam, graymail and generic phishing attacks while Abnormal blocks sophisticated advanced attack with high efficacy. The combined solution creates a true layered defense that protects against all types of email attacks.”
- Benjamin Corll, VP of Cyber Security and Data Protection

Coats Vendors and Customers are Better Protected with Abnormal ICES

With Abnormal ICES layered over Microsoft Defender, Coats employees are free to focus on continuing the company’s 250-year tradition of innovation, rather than sorting through emails and trying to assess the risks. Coats vendors and customers are also better protected because Abnormal ICES has reduced by 97% the number of engagements Coats employees have with potentially unsafe messages.

Working with Abnormal also frees the Coats security team to focus on other priorities. “The Abnormal customer support team is phenomenal,” Corll said. “They are very responsive and great about explaining new features in the pipeline–giving us reliable dates on when those will be available.”

For more information and additional details about the success Coats has experienced with Abnormal, download the full customer story.

Demo 2x 1

See the Abnormal Solution to the Email Security Problem

Protect your organization from the attacks that matter most with Abnormal Integrated Cloud Email Security.

Related Resources

B 05 16 22 Elara Caring
Elara Caring's CISO consistently saw employees struggle to sort authentic messages from email attacks. He knew there was a better solution to protect patient data and improve the employee experience.
Read More
B 04 08 22 Digital Everything Customer Story
Upon integration with Abnormal, a Fortune Global 500 financial services organization learned that not only had 11,000+ advanced email attacks per month been bypassing its secure email gateway but more than 70 of its vendors had compromised accounts.
Read More
B 03 21 22 CSC Customer Story
While CSC Generation has robust security measures in place, unfortunately, the same couldn't be said for their vendors. To mitigate the risk of payment fraud via compromised vendor accounts, the organization added Abnormal to their security stack and the results spoke for themselves.
Read More
B 04 14 22 CISCO Guide to Phishing
Because phishing emails target human behavior, create a sense of urgency, and appear to come from trusted senders, they can be incredibly difficult to detect. Stopping them before they reach employee inboxes is the key to staying safe.
Download Now
H1 threat report cover
From June-December 2021, Abnormal Security discovered that nearly all types of advanced email attacks grew in frequency, with a new trend of phone fraud using email as the first contact.
Download Now
Everise case study cover
By mid-2021, Everise had more than 11,000 employees to meet new demand for outsourced services. But the shift to remote work brought new email security risks. “Our people are good at what they do, but they’re not email security specialists, and attackers know that."
Read More
Webinar phish soc cover
Most people believe that the SOC is on the front lines, defending the castles against the forces of darkness. And while that’s true, it’s never quite as heroic as we’d like it to be.
Watch Now
Fireside chat katz cover
Legitimate email communications often contain links and attachments, and employees need to click on those links and attachments to do their jobs. Unfortunately, securing the enterprise often means stopping employees from doing so in an effort to stop bad actors from gaining access to systems or stealing money.
Watch Now
Fortune 200 wealth cover
As a leader in insurance and asset management, this Fortune 200 company recognizes that its security must protect its employees and customers from cyber attacks. Customers place their trust and their assets in the control of this company, so the security team built a robust solution reducing risk, gaining visibility, and securing user identity—the new perimeter.
Read More
Gateway church cover
Gateway chose Abnormal Security because of its uncompromising approach to prevent the email attacks that matter most. In the two years since they've deployed Abnormal, Gateway has not experienced a successful advanced email attack.
Read More
Human element whitepaper cover
The challenge of dealing with cybercrime is complex. Human factors and the human-computer interface are a central component of cybersecurity, and while technology alone will not prevent cybercrime, neither will people. People alone also can also not be relied upon as a last line of defense in an organization’s cybersecurity strategy.
Download Now
Human element webinar cover 2
Cybersecurity is largely a behavioral concern, as cybercriminals use social engineering to trick people into transferring money, entering their credentials, or providing access to sensitive data.
Watch Now
Key considerations webinar cover
Email is both a necessary communication medium, and the most vulnerable area for an attack. Year after year, adversaries find success in abusing email to gain a foothold into an organization—deploying malware, leaking valuable data, or stealing millions of dollars.
Watch Now
B Gartner Highlights 1
The Gartner Market Guide for Email Security explains what integrated cloud email security (ICES) solutions are and why they’re essential for modern enterprises. Download a copy now to learn why enterprises are moving away from the SEG.
Read More