Legato Security is a full-service Managed Security Service Provider (MSSP) with a team of highly trained employees providing advanced 24/7 threat detection and comprehensive incident response services. Organizations served range from small and mid-sized firms to the Fortune 100, spanning legal, political entities and campaigns, healthcare, technology, government, and finance.
Legato’s managed, customizable security services include continuous security monitoring, incident response, penetration testing, malware removal, security staff augmentation, and dark web monitoring.
The company’s tailored, technology-agnostic cybersecurity approach helps firms plan, build, and implement programs that address security challenges from every possible angle, and keep pace with evolving cyber threats.
As a provider of cybersecurity services, Legato takes the trust of its customers and their security infrastructure very seriously. As Jennifer Greulich, the company’s SVP of Security Operations, notes, “A majority of the technology solutions we sell to our clients are the same ones we use and rely on to protect our business. We wouldn’t promote or endorse anything we hadn’t used or weren’t completely confident in.”
Like many of its customers, Legato uses Office 365 for email, relying on its native email security features to protect it from cyber threats. But the company quickly recognized that numerous phishing emails were bypassing Office 365’s security. This “phishing gap” resulted in incidents that required investigation and remediation. The company realized it needed specific anti-phishing technology that goes above and beyond Office 365’s native capabilities.
Legato made the decision to integrate the Cloudflare email security solution in-house first. “Deployment was complete in a couple of hours,” said Greulich.
The Cloudflare technology made an immediate difference, drastically reducing phishing incidents “from 10-15 per week to one or two.” Over time, the results became even more striking. “Cloudflare has performed outstandingly for us,” said Greulich. “We have seen a significant and prolonged drop in phishing emails. Not only that, the Cloudflare service has had little to no impact on email productivity, which means there are minimal false positives.”
Legato is pleased that employees who previously had to interrupt their work to report, investigate and deal with phishing incidents are now freed up to remain focused on their jobs. And of course, Cloudflare reduced the concern, endured by all organizations, that even a “security awareness trained” employee can be manipulated into clicking on a phish or complying with a business email compromise (BEC) scheme.
Legato’s own clients often rely on Office 365, or G Suite defenses, along with their respective native email security tools to protect their organizations from cyber threats. But typically, these clients did not have specific anti-phishing resources or tools before working with Legato.
“Since it’s our business to select and manage technology for our customers, it’s important for us to understand those unique customers’ environments and challenges,” said Greulich. “In many cases customers come with a specific issue to be addressed. So in working with what the customer has, we then see additional needs calling for the addition of an anti-phishing layer to deal with or prevent breaches. When our customers ask us for suggestions on phishing protection, we always recommend Cloudflare,” said Greulich.
In fact, for their Managed Services customers, Legato actually builds in Cloudflare’s anti-phishing service when it develops quotes for securing the customer’s email. In those situations, Legato manages administrative control of the Office 365 or G Suite environment, configuring it for maximum security and adding Cloudflare Cloud Email Security service as the phishing protection layer.
“Cloudflare Cloud Email Security deployment goes really well: We rely on a simple guide for the steps to follow when installing Office 365 and G Suite protection.”
Legato checks in regularly with their customers and shares Cloudflare reports that document the messages that were blocked. In some cases, customers with the skills and technological resources can access the Cloudflare portal directly.