The Reality of Email Threats

Around the world, over 90% of data breaches are the direct result of phishing emails. For Vaco, a global professional services firm with roughly 10,000 employees sprawled across over 45 offices, phishing threats loomed large.

Why? The nature of Vaco’s business requires that, on a frequent basis, employees share resumes and other critical data with email-based contacts. We don’t need to tell you – it’s easy for cyber criminals to intercept a communication and to send a fictitious resume laced with malware.

On the employee side of things, one click on the wrong attachment could result in malware deployment across the entire network, end-user credential theft, or other negative and lasting consequences. To that effect, email represented a significant threat vector for Vaco.

The Challenge: Balancing Security and Productivity

When Check Point spoke with Vaco’s Vice President of Infrastructure and Governance, Lee Kaiser, he highlighted a common concern: How could he implement robust email security without slowing down employee productivity?

Vaco’s existing solution had fallen short – it was blocking genuine emails and triggering a flood of support tickets.

Frustrated employees were continuously contacting the IT department, which was then stymied in its efforts to execute on other essential responsibilities.

Searching for Effective Email Protection

Vaco’s search for a more agile email security platform led the company to Check Point’s Harmony Email & Collaboration.

Kaiser and his team were impressed by the promise of advanced threat detection without productivity compromises. But would the technology live up to expectations and deliver as promised?

 

Surprising Result: Security That Delivers

 

The implementation of Harmony Email & Collaboration yielded impressive outcomes. These included a 20% reduction in support tickets, – freeing up the time of 3-4 full-time staff members  – improved threat intelligence, enhanced threat visibility and protection beyond email.

“That translates to real hard dollars saved for us,” stated Kaiser.

“Our experience with Check Point has been top-notch from start to finish. That includes the testing, the setup, and the changeover, which went incredibly smoothly. The product does what Check Point says it will do, if not more,” Kaiser continued.

For B2B Enterprises: Elevating Email Security

Based on Vaco’s experience, here are key recommendations for B2B organizations looking to enhance their email security:

  1. Focus on user experience: Select a platform that balances advanced email security with disruptions to legitimate communications. The latter should be nearly non-existent.
  2. Prioritize AI-powered solutions: Look for platforms that leverage artificial intelligence to adapt to evolving threats while minimizing false positives.
  3. Leverage threat intelligence: Use insights from your email security solution to strengthen awareness and threat prevention.
  4. Evaluate potential cost savings: Consider how improved email security can reduce IT support burdens and free up resources for other initiatives.
  5. Plan for scalability: Select a solution that can grow with your organization and adapt to changing business needs.

For more information about Check Point’s Harmony Email & Collaboration platform click here or speak with one of our sales representatives today – Get a demo.

You may also like