Region
- America
Country
- United States
Product
- Avanan
- Mimecast
- Check Point Harmony Email & Collaboration
Tech Stack
- Microsoft 365
- APIs
Implementation Scale
- Enterprise-wide Deployment
Applicable Industries
- Professional Service
Applicable Functions
- Business Operation
Use Cases
- Cybersecurity
Services
- Cybersecurity Services
About The Customer
Brodeur and Giroux is a law firm based in New England. The company had been using Mimecast to protect its Microsoft 365 users. However, they began to notice a pattern in the types of attacks coming through to the inbox. These Business Email Compromise attacks are of particular concern since they are incredibly effective and tough to stop. Gartner has found that BECs increased by nearly 100% in 2019 and through 2023, they predict that BEC attacks will continue to double each year, at a cost of over $5 billion to its victims. The payment for a BEC attack nearly doubled between the first and second quarter of 2020, now at an average cost of $80,183. Plus, the so-called gift card scams are actually quite popular. The Internet Crime Complaint Center tracked a 1,240% increase in 2018 of these types of attacks.
The Challenge
Brodeur and Giroux, a New England-based law firm, had been using Mimecast to protect its Microsoft 365 users. However, they began to notice a pattern in the types of attacks coming through to the inbox. These Business Email Compromise attacks are of particular concern since they are incredibly effective and tough to stop. Beyond that, the firm was struggling with standard credential harvesting schemes, including fake invoices. All he was left to do was hope “that our end-users catch and don’t fall for it,” he says. For Reaves, that’s a risk he wasn’t willing to take.
The Solution
When looking at solutions that excel against Business Email Compromise attacks, he came across Gartner’s recommendations for stopping such attacks. When he spun up the trial of Avanan, he quickly found that it ticked off all the boxes for stopping BECs. Specifically, he liked how it started with a deployment-day analysis of a year’s worth of email conservations to build out a trusted reputation network. He appreciated that Avanan scanned and quarantined internal emails and files in real-time, to better protect against east-west and inside attacks. Finally, he appreciated how Avanan’s AI consistently trained itself on the most evasive attacks, including BECs. Further, he was getting slammed with fake invoices. Fake invoices are an incredibly popular form of a credential harvesting scheme, as it’s a relatively easy way to get users to click. Reaves realized that his solution needed to do a better job of doing sophisticated sender reputation and relationship graph analysis to stop them. Mimecast wasn’t doing that. On the trial, though, he saw how Avanan excelled at it.
Operational Impact
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
Related Case Studies.
Case Study
SET Creative Ditches Google Vault for Datto Backupify
When Kienholz first started at SET, the staff was using Microsoft Outlook for email with no form of data backup. It became apparent that something needed to change as the staff was often burdened with trying to recover emails from departed employees. Kienholz transitioned the team to Google’s Gmail and implemented Google Vault for backup purposes. While SET employees quickly adjusted to Gmail, which many use for personal email, the same could not be said for Google Vault. “Unlike most Google products, Vault was not user friendly at all. It’s very hard to search for items. We never really figured out how to do a restore either,” explained Kienholz. Due to SET’s work with high-profile brands, projects often go through many rounds of revisions right down to the eleventh hour. This means that every bit of information - especially data living in project managers’ emails - is crucial to delivering clients a polished design at deadline.
Case Study
Infosys achieves a 5–7 percent effort reduction across projects
Infosys, a global leader in consulting, technology, and outsourcing solutions, was facing significant challenges in application development and maintenance due to its distributed teams, changing business priorities and the need to stay in alignment with customer needs. The company used a mix of open source, home-grown and third-party applications to support application development projects. However, challenges resulting from distributed teams using manual processes increased as the company grew. It became more and more important for Infosys to execute its projects efficiently, so they could improve quality, reduce defects and minimize delays.
Case Study
Arctic Wolf Envelops Teamworks with 24x7 Cybersecurity Protection and Comprehensive Visibility
Teamworks, a leading athlete engagement platform, faced rising cyberthreats and needed enhanced visibility into its network, servers, and laptops. With software developers connecting from all over the world, the company sought to improve its security posture and position itself for future growth. The company had a secure platform but recognized the need for a more proactive solution to identify gaps within its technology infrastructure. Data exfiltration and malicious access were top concerns, prompting the need for a comprehensive security upgrade.
Case Study
Sawback IT and Datto Save Client From a Costly Mistake
Ballistic Echo, a software development house, faced a critical challenge when human error led to the deletion of thousands of lines of unique code. This incident occurred before the code was pushed to source control, resulting in significant loss of time, revenue, and work. The previous file-level backup solution they used was slow and inefficient, making it nearly impossible to manually recreate the lost work. The need for a more reliable and efficient business continuity solution became evident to avoid such disasters in the future.
Case Study
Opal Helps Customers Shine Thanks to Datto
SP Flooring & Design Center faced a ransomware attack that encrypted and locked their files. The attack was initiated through a compromised service account set up by an outside vendor. The ransomware infection was isolated quickly, but there was a concern about the extent of the data at risk. The company had backups in place but was unsure of how much information was compromised. The situation required immediate action to prevent further damage and restore the affected data.
Case Study
Pipeline Insight Case Study: YARCDATA
YarcData faced challenges in determining the conversion rates of prospects into customers through various marketing efforts and identifying the source of its leads. They wanted to know the percentage of opportunities in the sales pipeline that came from different marketing events, web downloads, or self-sourced sales opportunities. Additionally, they needed the ability to drill down into the data to guide where to allocate more marketing dollars based on the success of previous efforts. Previously, YarcData relied heavily on spreadsheets and Salesforce.com reports, which made it difficult to extract the exact information they needed. This reliance on spreadsheets represented about 70% of their data presentation.