Real Estate Leader Jellis Craig Safeguards Clients and Its Brand With Proofpoint
Established in 1991, Jellis Craig has continually evolved and grown to become one of Melbourne's leading real estate groups. Its network of strategically located offices are positioned across Melbourne's most sought-after suburbs and reach into local, interstate and international markets.
Like most businesses, Jellis Craig places a high priority on security, so when its existing solutions began to fall behind emerging threats, its IT team knew it would have to move fast to put stronger protection in place.
'The security platform we were using for email was not functioning that well, and a lot of phishing email attempts were making their way through,' said Christian Marotta, group IT manager at Jellis Craig. 'At the same time, the real estate industry was increasingly becoming a high target for ransomware threats and business email compromise threats. Since we are quite a well-known brand, I could see us being targeted more and more.'
Jellis Craig has earned a reputation as a highly customer-centric organisation, and robust security was especially critical to protecting its clients from fraud.
'We had two key priorities: to protect our brand, and our clients,' said Marotta. 'If a client puts down a large deposit on an expensive home, and a bad actor pretending to be us reaches out to them and provides fraudulent banking details, the results could be disastrous.'
After considering a variety of options, Jellis Craig chose to migrate its email security to Proofpoint Enterprise Protection, which scans inbound and outbound email messages for malware, phishing and spam threats.
Download this customer story now to see the results of using Proofpoint Enterprise Protection!
Read More
By submitting this form you agree to Proofpoint contacting you with marketing-related emails or by telephone. You may unsubscribe at any time. Proofpoint web sites and communications are subject to their Privacy Notice.
By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email dataprotection@techpublishhub.com
Related Categories: AIM, Cloud, Compliance, Email, Email Security, Email Threats, ERP, Malware, Network, Spam
More resources from Proofpoint
The Data Breach is Coming from Inside the Hou...
Real-Life Tales of Data Loss, Insider Threats and User Compromise
Data doesn't lose itself. People lose it. But in today's distributed, cloud...
Threat Briefing: Supply Chain Attacks
Cyber criminals are getting bolder and more sophisticated with their threats. Supply chain attacks can create multiple victims from a single breach...
Redefining Data Loss Prevention
Data doesn't move itself. People—whether they are negligent, compromised or malicious—move data in secure and risky ways. Legacy approaches to ...