This resource is no longer available

Case Study: Protecting Trusted Insiders

Cover

Recently, a slew of malicious phishing emails penetrated a customer’s network at a large energy company. They made it past a tried-and-true network defense system and straight into employee inboxes.

A proxy service eventually detected and flagged that users had visited malicious URLs, but there was limited visibility into where and how the attackers entered the network, the number of users affected and the extent of the potential damage.

View this case study to understand how they were able to mitigate future phishing attacks by gaining visibility into:

  • When a malicious email enters an organization
  • Which users open the malicious email
  • Which endpoints are potentially compromised
  • And more
Vendor:
Dtex
Posted:
Apr 1, 2021
Published:
Nov 23, 2020
Format:
PDF
Type:
Case Study

This resource is no longer available.