Customer Company Size
SME
Region
- America
Country
- United States
Product
- Office 365
- Avanan Cloud Security Platform
- Check Point Antivirus
- Solebit Predictive Malware Protection
- Cyren Anti-Phishing
- Global Velocity Data Leakage Prevention
Tech Stack
- Cloud Security
- Malware Protection
- Anti-Phishing
- Data Leakage Prevention
Implementation Scale
- Enterprise-wide Deployment
Technology Category
- Cybersecurity & Privacy - Cloud Security
- Cybersecurity & Privacy - Malware Protection
- Cybersecurity & Privacy - Network Security
Applicable Industries
- Professional Service
Applicable Functions
- Business Operation
Use Cases
- Cybersecurity
Services
- Cybersecurity Services
About The Customer
Founded in 2007 and headquartered in Chantilly, VA, ALEX Alternative Experts, LLC (ALEX) provides technical, logistical and management services for both government and commercial organizations. Their core service offerings include science, technology & engineering, facilities management, logistics and operations, professional services, and staff augmentation. It was one of Washington Business Journal’s Fastest 50 Growing Companies from 2012 to 2014. The company was faced with a challenge to comply with Executive Order 13587 from the National Counterintelligence and Security Center’s National Insider Threat Policy – which requires federal contractors to establish a program to detect, deter and mitigate insider threats.
The Challenge
Jeff Madsen, CTO of ALEX (Alternative Experts, LLC), was tasked with complying with Executive Order 13587 from the National Counterintelligence and Security Center’s National Insider Threat Policy. This policy required federal contractors to establish a program to detect, deter and mitigate insider threats. Jeff needed to protect the company’s Office 365 email and OneDrive file sharing beyond Microsoft’s native security capabilities. He was looking for protection against malware, ransomware, phishing, and compromised credentials for mailboxes; and for OneDrive, he needed a way to ensure that sensitive information wasn’t being used inappropriately by his employees or getting leaked externally. Jeff initially considered Microsoft’s own Advanced Threat Protection (ATP), but it failed to detect the zero-day malware he tested it with. ATP also lacked malware protection for OneDrive, and its data leakage policies were very basic and were not compatible with his current DLP tools.
The Solution
Jeff deployed the Avanan Cloud Security Platform in October 2016. With his deadline nearing, he was thrilled to find that within minutes he was able to implement his choice of malware protection, antiphishing and data leakage prevention, all from a variety of top security tools. The Avanan platform already served him with several tools for each one of his security gaps, all preconfigured, vetted out, and easily enabled. Not needing to spend time on individual evaluations but rather testing, buying and using everything from one place, was beyond anything he had seen before. Within the first 15 minutes, Jeff deployed the following security layers to protect ALEX Office 365: Check Point Antivirus and Malware Sandboxing, Solebit Predictive Malware Protection, Cyren Anti-Phishing, and Global Velocity Data Leakage Prevention.
Operational Impact
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
Related Case Studies.
Case Study
SET Creative Ditches Google Vault for Datto Backupify
When Kienholz first started at SET, the staff was using Microsoft Outlook for email with no form of data backup. It became apparent that something needed to change as the staff was often burdened with trying to recover emails from departed employees. Kienholz transitioned the team to Google’s Gmail and implemented Google Vault for backup purposes. While SET employees quickly adjusted to Gmail, which many use for personal email, the same could not be said for Google Vault. “Unlike most Google products, Vault was not user friendly at all. It’s very hard to search for items. We never really figured out how to do a restore either,” explained Kienholz. Due to SET’s work with high-profile brands, projects often go through many rounds of revisions right down to the eleventh hour. This means that every bit of information - especially data living in project managers’ emails - is crucial to delivering clients a polished design at deadline.
Case Study
Infosys achieves a 5–7 percent effort reduction across projects
Infosys, a global leader in consulting, technology, and outsourcing solutions, was facing significant challenges in application development and maintenance due to its distributed teams, changing business priorities and the need to stay in alignment with customer needs. The company used a mix of open source, home-grown and third-party applications to support application development projects. However, challenges resulting from distributed teams using manual processes increased as the company grew. It became more and more important for Infosys to execute its projects efficiently, so they could improve quality, reduce defects and minimize delays.
Case Study
Arctic Wolf Envelops Teamworks with 24x7 Cybersecurity Protection and Comprehensive Visibility
Teamworks, a leading athlete engagement platform, faced rising cyberthreats and needed enhanced visibility into its network, servers, and laptops. With software developers connecting from all over the world, the company sought to improve its security posture and position itself for future growth. The company had a secure platform but recognized the need for a more proactive solution to identify gaps within its technology infrastructure. Data exfiltration and malicious access were top concerns, prompting the need for a comprehensive security upgrade.
Case Study
Sawback IT and Datto Save Client From a Costly Mistake
Ballistic Echo, a software development house, faced a critical challenge when human error led to the deletion of thousands of lines of unique code. This incident occurred before the code was pushed to source control, resulting in significant loss of time, revenue, and work. The previous file-level backup solution they used was slow and inefficient, making it nearly impossible to manually recreate the lost work. The need for a more reliable and efficient business continuity solution became evident to avoid such disasters in the future.
Case Study
Opal Helps Customers Shine Thanks to Datto
SP Flooring & Design Center faced a ransomware attack that encrypted and locked their files. The attack was initiated through a compromised service account set up by an outside vendor. The ransomware infection was isolated quickly, but there was a concern about the extent of the data at risk. The company had backups in place but was unsure of how much information was compromised. The situation required immediate action to prevent further damage and restore the affected data.
Case Study
Pipeline Insight Case Study: YARCDATA
YarcData faced challenges in determining the conversion rates of prospects into customers through various marketing efforts and identifying the source of its leads. They wanted to know the percentage of opportunities in the sales pipeline that came from different marketing events, web downloads, or self-sourced sales opportunities. Additionally, they needed the ability to drill down into the data to guide where to allocate more marketing dollars based on the success of previous efforts. Previously, YarcData relied heavily on spreadsheets and Salesforce.com reports, which made it difficult to extract the exact information they needed. This reliance on spreadsheets represented about 70% of their data presentation.