Company Overview

Industry: Insurance and Asset Management
United States
Protected Mailboxes:


  • Missed attacks by Cisco ESA (IronPort) and FireEye
  • Multiple compromised accounts that were circumvented by multi-factor authentication
  • Received numerous BEC attacks impersonating executives
  • Wanted an additional layer of protection to prevent employees from falling victim to social engineering attacks

Business Impact:

  • Gained immediate visibility into the types of attacks, key recipients, attacker strategy, and attacker origin
  • Stopped over 3,500 credential phishing attacks and 190 unique business email compromise campaigns within the last 90 days
  • Implemented within 15 minutes and found one compromised account within the first day
Fortune 200 wealth overview

Protecting Customer Wealth

As a leader in insurance and asset management, this Fortune 200 company recognizes that its security must protect its employees and customers from cyber attacks. Customers place their trust and their assets in the control of this company, so the security team built a robust solution reducing risk, gaining visibility, and securing user identity—the new perimeter.

After experiencing thousands of credential phishing attacks and a number of successful account takeovers, where threat actors would gain access to employee email accounts, this insurance company knew they needed additional protection for their Microsoft 365 environment. Despite having a secure email gateway and other additional protections, they were still uncomfortable with the number of advanced email attacks bypassing their security infrastructure.

They chose Abnormal Security due to the visibility it provided into their email environment, the number of advanced email threats it detected, and the number of compromised accounts it remediated. With this added layer of security, this company is better protected from business email compromise and account takeovers, ensuring that they—and their customers—remain safe from cyber attacks.

High efficacy is important to us. We need to protect our employees and clients from all angles. We had multiple layers of email security, but it wasn’t enough… we needed Abnormal to catch what others missed.
- Vice President, Cyber Security

Related Resources

B 1500x1500 Success Story Graphics L1 R1
With thousands of threats stopped, Abnormal has freed up EAB’s security team to focus on improving access to education rather than investigating and remediating email threats.
Watch Now
B 10 19 22 AC Transit Vid 1
Together, Abnormal and Microsoft provide AC Transit with a robust, efficient security solution that blocks advanced threats from reaching inboxes.
Watch Now
B 10 05 22 Sentara
With Abnormal, not-for-profit healthcare organization Sentara enjoys reduced inbox threats, better employee email experiences, and more time to cultivate cybersecurity talent.
Read More
B 10 18 22 Abnormal for Manufacturing
Attackers go after manufacturers to steal data, engage in corporate or nation-state espionage, and commit financial fraud. Learn how Abnormal protects manufacturers.
Read More
B 10 05 22 Cloud Email Security Strategy Checklist
Determine what you need from a cloud email security platform and ensure you ask the right questions when evaluating potential solutions.
Read More
The NHS is a magnet for cybercriminals, with 81% of organisations across the UK suffering a ransomware attack in the past year. Learn how Abnormal protects the NHS.
Read More
B 10 3 22 Technology Industry Solution Brief
Cybercriminals target technology companies for their data, their funds, and their connections to vendors, partners, and customers. Learn how Abnormal protects tech companies.
Read More
B 09 26 22 Legal Solution Brief
Criminals target legal organizations for sensitive data, launching increasingly sophisticated email attacks that are difficult to detect. Learn how Abnormal protects law firms.
Read More
Blog cybersecurity awareness month
It's important to take time to evaluate your email security practices, both for your employees and across your organization. These resources can help.
Download Now