chat
expand_more

Fortune 200 Asset Management Company Protects Customer Wealth from Email Threats

As a leader in insurance and asset management, this Fortune 200 company recognizes that its security must protect its employees and customers from cyber attacks. Customers place their trust and their assets in the control of this company, so the security team built a robust solution reducing risk, gaining visibility, and securing user identity—the new perimeter.
Fortune 200 Asset Management Company Protects Customer Wealth from Email Threats

Company Overview

Industry: Insurance and Asset Management
Location:
United States
Protected Mailboxes:
20,800+

Challenges:

  • Missed attacks by Cisco ESA (IronPort) and FireEye
  • Multiple compromised accounts that were circumvented by multi-factor authentication
  • Received numerous BEC attacks impersonating executives
  • Wanted an additional layer of protection to prevent employees from falling victim to social engineering attacks

Business Impact:

  • Gained immediate visibility into the types of attacks, key recipients, attacker strategy, and attacker origin
  • Stopped over 3,500 credential phishing attacks and 190 unique business email compromise campaigns within the last 90 days
  • Implemented within 15 minutes and found one compromised account within the first day
Fortune 200 wealth overview

Protecting Customer Wealth

As a leader in insurance and asset management, this Fortune 200 company recognizes that its security must protect its employees and customers from cyber attacks. Customers place their trust and their assets in the control of this company, so the security team built a robust solution reducing risk, gaining visibility, and securing user identity—the new perimeter.

After experiencing thousands of credential phishing attacks and a number of successful account takeovers, where threat actors would gain access to employee email accounts, this insurance company knew they needed additional protection for their Microsoft 365 environment. Despite having a secure email gateway and other additional protections, they were still uncomfortable with the number of advanced email attacks bypassing their security infrastructure.

They chose Abnormal Security due to the visibility it provided into their email environment, the number of advanced email threats it detected, and the number of compromised accounts it remediated. With this added layer of security, this company is better protected from business email compromise and account takeovers, ensuring that they—and their customers—remain safe from cyber attacks.

High efficacy is important to us. We need to protect our employees and clients from all angles. We had multiple layers of email security, but it wasn’t enough… we needed Abnormal to catch what others missed.
- Vice President, Cyber Security

See Abnormal in Action

Schedule a Demo

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email and collaboration application attacks with Abnormal.
See a Demo

Related Resources

B Seg WS
Explore how your security team can simplify email security by eliminating legacy secure email gateways (SEGs).
Watch Now
B 08 30 23 Avery Dennison Vid
Materials science and digital identification leader saves time and protects vendor relationships with Abnormal for Google Workspace.
Read More
B EAB
Discover how EAB modernized their email security stack and blocked advanced attacks by saying goodbye to their SEG.
Watch Now
B 08 23 23 BRD03 Evan Asheem Video v2
Abnormal CEO and Co-Founder Evan Reiser sits down with Asheem Chandna, Greylock Partner and Investor to talk about the email security landscape and how Abnormal continues to protect its customers.
Watch Now
B 8 4 23 Integrations DS
Integrate with your security tools to centralize insights and speed up remediation.
Read More
B 7 27 23 SEG Webinar
Discover how DexKo Global modernized their email security stack and blocked advanced attacks by removing their legacy SEG.
Watch Now
B 07 07 22 Noname Vid
Fast-growing API protection provider protects its email ecosystem from advanced impersonation threats.
Read More
B 07 10 23 MKT338 CISO Roadshow One Pager
Discover how to protect your cloud email from the most advanced attacks.
Read More
B 08 25 23 MKT006 08 28 23 Updated cover graphics for Evan Changing Landscape Video
See how Abnormal is working to make the cloud a safer place for business by protecting against all types of attacks across all types of cloud applications.
Watch Now