Pegasystems Displaces SEG for Better Email Security at a Lower Cost
公司规模
Large Corporate
地区
- America
- Asia
- Europe
国家
- United States
产品
- Abnormal Inbound Email Security
- Abnormal Email Account Takeover Protection
- Abnormal Abuse Mailbox Automation
- Abnormal Email Productivity
技术栈
- Microsoft 365 E5
- API-based email security
- Behavioral AI
实施规模
- Enterprise-wide Deployment
影响指标
- Cost Savings
- Productivity Improvements
- Customer Satisfaction
适用行业
- Software
适用功能
- 商业运营
- 质量保证
服务
- 系统集成
- 软件设计与工程服务
关于客户
Pega’s low-code platform for AI-powered decisioning and workflow automation “fuels organizations for the future” by providing the tools its customers need to work smarter, unify experiences, and adapt instantly. The company, which serves many of the world’s largest and most successful enterprises and government agencies, operates across the Americas, Europe, and Asia. Pega routinely wins industry awards for its technology, its commitment to sustainability, and its dedication to the workplace experience.
挑战
When Corporate Security Operations Director Steve Tieland joined Pega, the company’s internal corporate email environment was flooded by VIP impersonation attacks bypassing the SEG and Microsoft Defender. Tieland made email reform a priority to improve security and relieve his team of the 60 hours per week they were spending on manual investigation and remediation. Employees and executives also spent hundreds of hours each month managing graymail. “We would change the filter settings, but one change would add more spam, and another would quarantine too many emails. The SEG offered new features to help, but they broke things in our email system,” said Tieland.
解决方案
By that point, Pega was looking for a more effective solution. Tieland researched API-based email security solutions and thought they offered a good opportunity to test a new approach without risking email disruption. He also knew that AI functionality could help eliminate the graymail problems caused by the SEG’s rigid rules. Finally, he wanted a solution that would complement their Microsoft 365 E5 security features. Abnormal is designed to work with Microsoft 365 even without a SEG and uses advanced behavioral AI to baseline normal user behavior to detect anomalies that can indicate sophisticated attacks like executive impersonation. Email Productivity applies the same behavioral AI to individual user preferences to filter out unwanted graymail, allow wanted promotions, and free the security team from having to manually manage filtering rules. Abuse Mailbox Automation puts investigation and remediation for user-reported phishing emails on autopilot, so the security team doesn’t have to manually address threats as they’re reported.
运营影响
数量效益
Case Study missing?
Start adding your own!
Register with your work email and create a new case study profile for your business.
相关案例.
Case Study
Infosys achieves a 5–7 percent effort reduction across projects
Infosys, a global leader in consulting, technology, and outsourcing solutions, was facing significant challenges in application development and maintenance due to its distributed teams, changing business priorities and the need to stay in alignment with customer needs. The company used a mix of open source, home-grown and third-party applications to support application development projects. However, challenges resulting from distributed teams using manual processes increased as the company grew. It became more and more important for Infosys to execute its projects efficiently, so they could improve quality, reduce defects and minimize delays.
Case Study
Arctic Wolf Envelops Teamworks with 24x7 Cybersecurity Protection and Comprehensive Visibility
Teamworks, a leading athlete engagement platform, faced rising cyberthreats and needed enhanced visibility into its network, servers, and laptops. With software developers connecting from all over the world, the company sought to improve its security posture and position itself for future growth. The company had a secure platform but recognized the need for a more proactive solution to identify gaps within its technology infrastructure. Data exfiltration and malicious access were top concerns, prompting the need for a comprehensive security upgrade.
Case Study
Sawback IT and Datto Save Client From a Costly Mistake
Ballistic Echo, a software development house, faced a critical challenge when human error led to the deletion of thousands of lines of unique code. This incident occurred before the code was pushed to source control, resulting in significant loss of time, revenue, and work. The previous file-level backup solution they used was slow and inefficient, making it nearly impossible to manually recreate the lost work. The need for a more reliable and efficient business continuity solution became evident to avoid such disasters in the future.
Case Study
Opal Helps Customers Shine Thanks to Datto
SP Flooring & Design Center faced a ransomware attack that encrypted and locked their files. The attack was initiated through a compromised service account set up by an outside vendor. The ransomware infection was isolated quickly, but there was a concern about the extent of the data at risk. The company had backups in place but was unsure of how much information was compromised. The situation required immediate action to prevent further damage and restore the affected data.
Case Study
Zapier Aggregates Multiple Analytics in a Single Dashboard with the New Relic Platform
Zapier, a company that enables non-technical users to push data between hundreds of web applications, was facing a challenge in automating and provisioning servers for optimal performance. The company's environment consisted of 50 Linux servers on the Amazon Elastic Compute Cloud (EC2), a Django application split across several servers, and a backend consisting of a dynamic number of celery task workers fed by messages published to a RabbitMQ cluster. They also maintained a number of internal web services on nginx in front of Gunicorn and Node.js processes. Redis handled simple key and value stores, with logging handled by Graylog2 and ElasticSearch. However, they realized that no level of automation would be sufficient without an effective monitoring solution in place. They needed a tool that could provide immediate alerts when something was breaking and could be easily implemented into their environment.
Case Study
Pipeline Insight Case Study: YARCDATA
YarcData faced challenges in determining the conversion rates of prospects into customers through various marketing efforts and identifying the source of its leads. They wanted to know the percentage of opportunities in the sales pipeline that came from different marketing events, web downloads, or self-sourced sales opportunities. Additionally, they needed the ability to drill down into the data to guide where to allocate more marketing dollars based on the success of previous efforts. Previously, YarcData relied heavily on spreadsheets and Salesforce.com reports, which made it difficult to extract the exact information they needed. This reliance on spreadsheets represented about 70% of their data presentation.