Real Estate Leader Jellis Craig Safeguards Clients and Its Brand With Proofpoint
Established in 1991, Jellis Craig has continually evolved and grown to become one of Melbourne's leading real estate groups. Its network of strategically located offices are positioned across Melbourne's most sought-after suburbs and reach into local, interstate and international markets.
Like most businesses, Jellis Craig places a high priority on security, so when its existing solutions began to fall behind emerging threats, its IT team knew it would have to move fast to put stronger protection in place.
'The security platform we were using for email was not functioning that well, and a lot of phishing email attempts were making their way through,' said Christian Marotta, group IT manager at Jellis Craig. 'At the same time, the real estate industry was increasingly becoming a high target for ransomware threats and business email compromise threats. Since we are quite a well-known brand, I could see us being targeted more and more.'
Jellis Craig has earned a reputation as a highly customer-centric organisation, and robust security was especially critical to protecting its clients from fraud.
'We had two key priorities: to protect our brand, and our clients,' said Marotta. 'If a client puts down a large deposit on an expensive home, and a bad actor pretending to be us reaches out to them and provides fraudulent banking details, the results could be disastrous.'
After considering a variety of options, Jellis Craig chose to migrate its email security to Proofpoint Enterprise Protection, which scans inbound and outbound email messages for malware, phishing and spam threats.
Download this customer story now to see the results of using Proofpoint Enterprise Protection!
Read More
By submitting this form you agree to Proofpoint contacting you with marketing-related emails or by telephone. You may unsubscribe at any time. Proofpoint web sites and communications are subject to their Privacy Notice.
By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email dataprotection@techpublishhub.com
Related Categories: AIM, Cloud, Compliance, Email, Email Security, Email Threats, ERP, Malware, Network, Spam
More resources from Proofpoint
Metrics that Matter: The CISO’s Guide to As...
As a CISO, your cybersecurity budget must contend with growing cybersecurity risks, evolving regulations and a fundamental shift in the way people ...
The Hidden Costs of Free: Are Microsoft 365's...
All email, cloud, and compliance solutions are not created equal. As organisations make the move to Microsoft 365, many assume that the platform's ...
Threat Brief: Cloud Account Compromise and Ta...
Cyber criminals are getting bolder and more sophisticated with their threats. As more business assets move to the cloud, attackers have followed cl...