Cisco Email Security for Insurance company
Description
This case study of a small business insurance company is based on a June 2018 survey of Cisco Email Security customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.
“Cisco Email Security allows us to get insight and control spam/malicious email. It also allows us to better track all email.”
Challenges Evaluated the following vendors prior to choosing Cisco Email Security: None. Our 3rd party vendor offered no alternatives. Use Case The key features and functionalities of Cisco Email Security that the surveyed company uses:
TechValidate stands behind the authenticity of this data.
Company Size: Small Business
Industry: Insurance
About Cisco Email Security Defend against ransomware, business email compromise, spoofing, phishing, and spam while protecting sensitive data with data loss prevention (DLP) and encryption.
“Cisco Email Security allows us to get insight and control spam/malicious email. It also allows us to better track all email.”
Challenges Evaluated the following vendors prior to choosing Cisco Email Security: None. Our 3rd party vendor offered no alternatives. Use Case The key features and functionalities of Cisco Email Security that the surveyed company uses:
- Purchased Advanced Malware Protection (AMP) after purchasing Cisco Email Security.
- Using the following Cisco products in addition to Cisco Email Security:
- Identity Services Engine (ISE)
- Protected users from threats in incoming email to prevent breaches
- Act as a Spam and Graymail filter
TechValidate stands behind the authenticity of this data.
Company Size: Small Business
Industry: Insurance
About Cisco Email Security Defend against ransomware, business email compromise, spoofing, phishing, and spam while protecting sensitive data with data loss prevention (DLP) and encryption.
Details
Business tasks
Reduce Costs
Enhance Staff Productivity
Ensure Security and Business Continuity
Problems
Risk or Leaks of confidential information
Malware infection via Internet, email, storage devices
High costs
Risk of lost access to data and IT systems
Risk of data loss or damage