Request a Demo of Tessian Today.

Automatically stop data breaches and security threats caused by employees on email. Powered by machine learning, Tessian detects anomalies in real-time, integrating seamlessly with your email environment within minutes and starting protection in a day. Provides you with unparalleled visibility into human security risks to remediate threats and ensure compliance.

Prepare for the next wave of email attacks at Fwd: Thinking on Nov 2 | Save Your Seat →

Tessian Blog

  • All
  • Customer Stories
  • Compliance
  • Email DLP
  • Integrated Cloud Email Security
  • Data & Trends
  • NULL
    array(14) { [0]=> object(WP_Term)#11415 (11) { ["term_id"]=> int(5) ["name"]=> string(16) "Customer Stories" ["slug"]=> string(16) "customer-stories" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(5) ["taxonomy"]=> string(8) "category" ["description"]=> string(155) "Read our latest Customer Stories, interviews and news. Learn how Tessian protects organisations in Financial Services, Legal, Technology and other markets." ["parent"]=> int(0) ["count"]=> int(46) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "2" } [1]=> object(WP_Term)#12382 (11) { ["term_id"]=> int(120) ["name"]=> string(10) "Compliance" ["slug"]=> string(10) "compliance" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(120) ["taxonomy"]=> string(8) "category" ["description"]=> string(143) "Read our latest articles, tips and news on Compliance including GDPR, CCPA and other industry-specific regulations and compliance requirements." ["parent"]=> int(0) ["count"]=> int(40) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "5" } [2]=> object(WP_Term)#12381 (11) { ["term_id"]=> int(116) ["name"]=> string(9) "Email DLP" ["slug"]=> string(20) "data-loss-prevention" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(116) ["taxonomy"]=> string(8) "category" ["description"]=> string(144) "Read our latest articles, tips and industry-specific news around Data Loss Prevention (DLP). Learn about the implications of data loss on email." ["parent"]=> int(0) ["count"]=> int(99) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "4" } [3]=> object(WP_Term)#12380 (11) { ["term_id"]=> int(2) ["name"]=> string(31) "Integrated Cloud Email Security" ["slug"]=> string(20) "human-layer-security" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(2) ["taxonomy"]=> string(8) "category" ["description"]=> string(301) "Integrated Cloud Email Security solutions were introduced as a new category, and positioned as the best defense against advanced phishing threats that evade traditional email security controls.  Learn more about what they are, the benefits of using them, and how you can best evaluate those on offer." ["parent"]=> int(0) ["count"]=> int(138) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "1" } [4]=> object(WP_Term)#12379 (11) { ["term_id"]=> int(486) ["name"]=> string(17) "Data & Trends" ["slug"]=> string(11) "data-trends" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(486) ["taxonomy"]=> string(8) "category" ["description"]=> string(0) "" ["parent"]=> int(352) ["count"]=> int(1) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "3" } [5]=> object(WP_Term)#12378 (11) { ["term_id"]=> int(341) ["name"]=> string(13) "Insider Risks" ["slug"]=> string(13) "insider-risks" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(341) ["taxonomy"]=> string(8) "category" ["description"]=> string(154) "Access Tessian's library of free data exfiltration posts, guides and trend insights. Acidental data loss, insider threats, and misdirected emails content." ["parent"]=> int(490) ["count"]=> int(39) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "2" } [6]=> object(WP_Term)#12377 (11) { ["term_id"]=> int(433) ["name"]=> string(14) "Remote Working" ["slug"]=> string(14) "remote-working" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(433) ["taxonomy"]=> string(8) "category" ["description"]=> string(163) "Access free tips from security leaders and new research related to remote working and hybrid-remote structures. Level-up your cybersecurity for a remote workforce." ["parent"]=> int(116) ["count"]=> int(16) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "1" } [7]=> object(WP_Term)#12376 (11) { ["term_id"]=> int(384) ["name"]=> string(7) "Podcast" ["slug"]=> string(7) "podcast" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(384) ["taxonomy"]=> string(8) "category" ["description"]=> string(345) "Cybersecurity podcast series on the human factor, discussing why we need to focus on people - not just machines and data - to stop breaches and empower employees. Tim Sadler, CEO of Tessian meets with business, IT and security leaders to flip the strict on cybersecurity and share best practices, cybersecurity challenges, threat intel and more." ["parent"]=> int(2) ["count"]=> int(9) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "1" } [8]=> object(WP_Term)#12375 (11) { ["term_id"]=> int(411) ["name"]=> string(14) "Threat Stories" ["slug"]=> string(14) "threat-stories" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(411) ["taxonomy"]=> string(8) "category" ["description"]=> string(155) "Tessian Threat Intelligence and Research team uncovers trends and insights in email security related to phishing, social engineering, and more. Learn more!" ["parent"]=> int(0) ["count"]=> int(24) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "3" } [9]=> object(WP_Term)#12374 (11) { ["term_id"]=> int(3) ["name"]=> string(22) "Advanced Email Threats" ["slug"]=> string(22) "advanced-email-threats" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(3) ["taxonomy"]=> string(8) "category" ["description"]=> string(166) "Get up to speed on the latest tips, guides, industry news and technology developments around phishing, spear phishing, Business Email Compromise, and Account Takeover" ["parent"]=> int(490) ["count"]=> int(156) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "6" } [10]=> object(WP_Term)#12373 (11) { ["term_id"]=> int(352) ["name"]=> string(15) "Life at Tessian" ["slug"]=> string(12) "team-culture" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(352) ["taxonomy"]=> string(8) "category" ["description"]=> string(149) "Learn more about Tessian company news, events, and culture directly from different teams. Hear from engineering, product, customer success, and more." ["parent"]=> int(0) ["count"]=> int(49) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "7" } [11]=> object(WP_Term)#12338 (11) { ["term_id"]=> int(435) ["name"]=> string(21) "Interviews With CISOs" ["slug"]=> string(21) "ciso-spotlight-series" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(435) ["taxonomy"]=> string(8) "category" ["description"]=> string(164) "Learn how to navigate the threat landscape, how to get buy-in, and how to break into the industry from these cybersecurity leaders from Shell, Penn State, and more." ["parent"]=> int(0) ["count"]=> int(33) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "8" } [12]=> object(WP_Term)#12339 (11) { ["term_id"]=> int(436) ["name"]=> string(16) "Engineering Blog" ["slug"]=> string(16) "engineering-blog" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(436) ["taxonomy"]=> string(8) "category" ["description"]=> string(134) "Tessian's engineering team shares tips for solving complex problems. Get advice related to QAs, 502 errors, team management, and more." ["parent"]=> int(352) ["count"]=> int(18) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "1" } [13]=> object(WP_Term)#12317 (11) { ["term_id"]=> int(434) ["name"]=> string(16) "Cyber Skills Gap" ["slug"]=> string(16) "cyber-skills-gap" ["term_group"]=> int(0) ["term_taxonomy_id"]=> int(434) ["taxonomy"]=> string(8) "category" ["description"]=> string(149) "Learn more about the cybersecurity skills gap and cybersecurity gender gap. Research and interviews with industry leaders and champions of diversity." ["parent"]=> int(435) ["count"]=> int(19) ["filter"]=> string(3) "raw" ["term_order"]=> string(1) "1" } }
Compliance
GDPR’s Anniversary: What We’ve Learned and What’s Next
Thursday, May 23rd, 2019
The General Data Protection Regulation – or GDPR – sprang into life 12 months ago, on May 25th 2018. To mark GDPR’s anniversary, we sat down with Tessian’s Head of Legal and Compliance, to see what’s changed in the last year and discuss what’s still to come.
I’m sure you’re celebrating GDPR’s first birthday this week. In general, do you think it’s been a positive step? My general opinion is that GDPR’s been a very positive step in relation to the promotion of data subject rights. I certainly think that data protection legislation was ripe for change – developments in this field were long overdue. Importantly, our clients also see GDPR in a positive light, despite the potential for an increased administrative and compliance burden. So what do you think the biggest benefits of GDPR have been? In the last 12 months the GDPR has provided much-needed consistency when it comes to the protection of data across the continent (and beyond). Organizations used GDPR as an opportunity to “spring clean”, critically assessing their information security systems and processes and identifying opportunities for continued improvements. In my experience, organizations are taking these changes very seriously, as are regulatory bodies. We have seen more reports of breaches to the ICO in the UK, and the EU has started to levy some blockbuster fines. Looking ahead, I see no reason why this trend would stop. I also think that GDPR’s onset has been helpful in starting widespread debate in relation to data protection and privacy. Almost everyone now has at least some understanding of what GDPR does and what it means for people and business. Increased data literacy is enormously helpful, and this may have helped bump data protection and security up the priority list at board level. What were the biggest challenges for Tessian in the build-up to GDPR? As a relatively young company, Tessian was fairly fortunate in the run-up to GDPR as we didn’t have a huge archive of legacy data and systems. Mobilization and project management in larger organizations would likely have been much more difficult! That being said, businesses of all sizes can still find it challenging to understand every piece of data that they hold: where data is located, whether it’s compliant with each of the major GDPR principles, and so on. The difference now with GDPR is that the penalties are potentially much more severe if you get it wrong. To stay on the right side of GDPR, it’s so important to spend the time doing diligence on data flows and data mapping – understanding how data moves in and out of the organization, how it’s protected, and making sure that there are individuals taking responsibility and ownership of the issue internally. Even a year on, this requirement is still absolutely necessary. So is this it now as far as GDPR goes? Or is there more still to be done? It’s been fascinating to see the global impact that GDPR has had. So far, we’re still yet to see the true extent of regulators’ “teeth” when it comes to fines. While there’s still more to come, the progress made in a year has been really encouraging.  
Read Blog Post
Customer Stories
Human-Centered Cybersecurity in a Historic Industry
Saturday, May 11th, 2019
North P&I Club (North) is a leading mutual maritime liability insurer based in Newcastle upon Tyne with regional offices and subsidiaries in Australasia, China (Hong Kong and Shanghai), Greece, Ireland, Japan, Singapore and the USA. North’s IT department embraces modern technologies by creating leading-edge solutions to support over 350 staff across the globe on a 24/7 basis, enabling the shipowners we insure to trade with confidence. North is protecting over 350 employees with Tessian Guardian and Tessian Enforcer.
The voyage beyond policy and training “As you can imagine, in the shipping sector a lot of business is conducted on email.” James Holmes, Chief Information Officer at marine insurer North, has a broad range of priorities to tackle in his role. Until adopting Tessian, North had principally aimed to educate employees through policy and training initiatives. James saw that there was an opportunity for technological solutions to also play their part: “We have to acknowledge that people are going to make mistakes – we are human, after all – but at the same time we have to mitigate errors as much as we can.” James was made aware of Tessian’s software through another Tessian customer, and was immediately impressed by the prospect of intelligently being able to identify misdirected emails before they happen. Insurance companies control many kinds of sensitive data, and James wanted to make sure data wouldn’t be put at risk because of human error. North’s IT team scoped out the market and found that Tessian would be the platform that best served the company’s needs. North’s cross-departmental Information Security Committee approved, and gave the green light for James’s team to deploy Tessian.
Better email security with intelligent technology James was eager to take advantage of the way Tessian impacts people’s behavior in the moment, prompting them to think carefully about potentially taking a dangerous action on email. “It’s about empowering people to make decisions having all salient information to hand.” Since rolling out Tessian across the business, North has seen a number of employees receiving Tessian alerts and, as a result, double-checking emails to ensure mistakes are not made. Digesting Tessian’s reports on people’s alerts helps James to quantify the Guardian filter’s impact. “People can react in the moment to Tessian’s notifications and make the right decision for themselves and the business.”
Encouraging cybersecurity oversight across the business With more people working from home and using different devices to get work done, it’s important for companies in all industries to understand where new threats may emerge. James says, “We all know that personal addresses are more susceptible to hacking. Having technology that reminds people of the dangers of inappropriate data transfers is incredibly useful.” Today, North is in the process of improving its data loss prevention capabilities by bringing in Tessian’s Enforcer filter. Enforcer identifies when sensitive data is being transferred out of an organization to personal or unauthorized addresses. Because of Enforcer’s importance when it comes to regulatory alignment, North’s risk and compliance team will take responsibility for managing the new filter. Shipping is one of the oldest trades in the world, and marine insurance is moving quickly as a sector. By embedding best-in-class technology across the company and building out the organization’s suite of Tessian products, James is orienting North for longterm success. Learn more about how Tessian prevents human error on email Tessian is building the world’s first Human Layer Security platform to automatically secure all human-digital interactions within the enterprise. Today, our filters use stateful machine learning to protect people using email and to prevent threats like spear phishing, accidental data loss, data exfiltration and other non-compliant email activity. To book a demo and learn more about how we can help your organization, click here.
North Case Study hbspt.cta.load(1670277, '1f1bf7bc-c0ea-4b6d-9511-304b26346158', {"region":"na1"});
Read Blog Post
Interviews With CISOs
Tessian Spotlight: Mark Ramsey, Chief Information Security Officer of Americas Division at ASSA ABLOY Group
Tuesday, April 30th, 2019
Mark Ramsey has over 30 years’ experience in software engineering and security. He initially trained as a software engineer and transitioned into the security side of Information Technology, as it became a growing area within enterprises. He has set up security teams from scratch in a handful of businesses including Assa Abloy, where he is currently Chief Information Security Officer. Alongside this, he is committed to knowledge and education around cybersecurity, and teaches masters-level students at Fairfield University where he has been a Professor for the past 33 years. What can you share from your experience creating a security function from scratch? I’ve done this for three companies now. I find most people are cooperative because there is a growing understanding that security is crucial for the successful running of a company. Most people want to be secure and to do things right, but it’s important to strike a balance. You must be sure to make things secure, but flexible enough so people are able to do their jobs and do them well. For Assa Abloy, security has always been a priority; it is in our DNA given we are a security lock company. We have been building up our security profile but it is an on-going process with new challenges. We are preparing for the expansion to the Internet of Things. What are the greatest challenges you have overcome since you have been CISO of Assa Abloy – Americas? My biggest fear is the employees. You can put in all the technology in the world, but sometimes people will not be thinking; that is human nature. The risk is not just malicious in nature, mistakes can be unintentional. It is not just on email where this can happen, it can happen in file sharing environments. All it takes is one click. We have set up many training sessions to help combat this, with training on secure business processes, and security awareness. I am lucky to have many years’ experience in university lecturing, so I know how to translate technical aspects into easy to learn steps. We do know people are getting better. What is making it tougher is that there are two things accelerating. Everything is increasingly global and accessible, and everything relies on cyber. You need to know where your data is stored, who the owners are and how it is classified. We can put protection in one area, but if we find a breach in another then you have wasted time and money. It’s not a security project its a programme – a case of on-going management. How should senior cybersecurity executives ideally work with the board? I’ve been fortunate to work with security conscious boards, but I would advise people not to scaremonger. It’s best to communicate honestly, to make them aware of risk levels and explain what can be done. Security teams ultimately don’t make the company money, but they certainly can generate value in the long run. Security is a wise expense that can keep boards out of the news if they’re provided with the right information to make an educated decision. We’re lucky now with GDPR and CCPA providing external standards and pressure. Most boards now know they will be held responsible, this means they are actually seeking out help from security leaders. Do you have any advice for new CISO’s to set them up for success? Communicate, communicate, and communicate. Keep the business leaders and employees informed of the risks and what needs to be done to mitigate them. Be willing to compromise; there are some areas might not have all policies we want in place, but we have to find what will realistically be adopted. Security practices must still allow people to do their jobs properly and securely.  
Read Blog Post
Interviews With CISOs
Tessian Spotlight: Giampiero Astuti, Group CIO at Astaldi
Wednesday, April 24th, 2019
Giampiero Astuti has served as Group Chief Information Officer at global construction company Astaldi since 2003. Before joining Astaldi, he worked as CIO in different industries (financial services, IT, and pharma / biotech) both in Italy and abroad. What are your principal responsibilities at Astaldi? My role is to define Astaldi’s information and digital strategy and, consequently, plan the evolution of the Group’s information systems. I am supported by a team of around 50 people, spread across different functions and countries. A vital part of my job is to enable better information management and communication across the business: Astaldi operates more than 250 sites in 20+ different countries, so our information requirements are quite complex. How do you manage security risks in such a complicated global business? Astaldi has more than 50,000 different active suppliers worldwide: we have a very varied range of product and service partners. This creates inevitable security risks. We also need to be careful when working with other construction companies on joint venture projects, which is a very common occurrence in our industry. We could be working together with a company on one project, but simultaneously competing with that same company for another separate tender. This makes information governance extremely important. What are some of the most interesting problems CIOs in the construction sector have to tackle? It’s worth stating that every sector has its own particular opportunities and threats, of course. But considering the fact that the construction sector can be quite traditional and conservative, CIOs have to maximize innovation by focusing on great change management and creating value from relatively limited IT budgets. So how has the sector changed since you started working at Astaldi? When I joined Astaldi there were no web apps or content management solutions: some information was still being shared by fax. Inevitably, much more of our activity is digital these days. There are so many fascinating new paradigms becoming more and more popular in the sector, such as BIM (Building Information Modelling) and Industry 4.0. These are great opportunities for us, but they are also significant security threats. As more and more devices and machines are connected to networks, the potential risks increase dramatically. In construction, we must also think of physical safety as well as data loss, so the risks are magnified even more if systems are corrupted or hijacked. There are also challenges bringing these new ideas into our work. We are experimenting with the possibilities of machine learning and other next-generation technologies, but when competing to win contracts it can be tricky to persuade a customer that a newer technology is going to be practical and cost-effective. Our projects range from hundreds of millions of euros up to multiple billions of euros: this scale can make the implementation of new technologies very expensive and complex. Lastly, what are the key qualities of the best CIOs? Firstly, I think it’s very important that CIOs are much more than just technical experts. I studied economics, for instance, and I think a broad understanding of business and project management is very important in this role. Technology knowledge will always be important, but CIOs must also have good soft skills like motivation and leadership. In my view, these are just as important as IT expertise.  
Read Blog Post
Customer Stories
Staying Proactive with Data Loss Prevention
Tuesday, April 23rd, 2019
Morrisons Solicitors is a leading law firm in the south east of England. Founded nearly 300 years ago, Morrisons provides an integrated commercial service to clients ranging from bluechip corporates to SMEs, OMBs and family-run businesses. The firm also offers a full range of services to private individuals, including family, residential conveyancing, wills, estates and tax planning, probate, personal injury and clinical negligence. Tessian is protecting people with Tessian Guardian, Tessian Enforcer and Tessian Constructor.
The problem Given the highly sensitive nature of the R&D performed, securing their email environment from human error is a key priority for the company. The company had heard of incidents in the past where project related information had been sent to the wrong person and wanted to proactively address this step. The management team is acutely aware of the potential risks from misaddressed emails, and had spent some time looking at various vendors before choosing to work with Tessian because of the way in which the machine learning approach solves the problem. The solution Tessian was rolled out firm-wide to over 150 users, with Guardian effectively detecting and preventing misaddressed emails and mitigating the risk that comes along with data loss via email. Tessian also gave Morrisons an insight into some significant email statistics that equipped them with the data needed to design key rules and policies on outgoing emails using Constructor. Tessian now protects Morrisons from multiple risks around confidential and sensitive data leakage every day. Learn more about how Tessian prevents human error on email Tessian is building the world’s first Human Layer Security platform to automatically secure all human-digital interactions within the enterprise. Today, our filters use stateful machine learning to protect people using email and to prevent threats like spear phishing, accidental data loss, data exfiltration and other non-compliant email activity. To book a demo and learn more about how we can help your organization, click here.
Morrisons Case Study hbspt.cta.load(1670277, 'b83b546b-b2aa-4ff8-a251-984531919c6d', {"region":"na1"});
Read Blog Post
Customer Stories
Protecting Sensitive Client Data
Friday, April 12th, 2019
DC Advisory is a mid-market corporate finance company with a specific expertise in cross-border transactions. Operating in a highly regulated industry, it is important for them to take measures to ensure that their clients’ data is adequately protected. DC Advisory is protecting employees with Tessian Guardian and Tessian Constructor. 
From the outset, the team at DC Advisory understood the risk involved in accidentally emailing highly sensitive information to the wrong person and the detrimental effects that can have on a company’s reputation and integrity. Off the back of this insight, they set out to discover a solution that could intelligently identify and prevent misdirected emails while having minimal disruption to the end user. After having a demo of the Tessian platform and exploring its functionality, DC Advisory decided to adopt Tessian as a part of their cybersecurity framework. The results from their first Tessian threat report – indicating the volume of misdirected email prevention activity Tessian performed for DC Advisory – were very positive. The report revealed that Guardian was able to detect and prevent misdirected emails and remove that threat from the organization, whilst being non- obtrusive to the end user. Learn more about how Tessian prevents human error on email Tessian is building the world’s first Human Layer Security platform to automatically secure all human-digital interactions within the enterprise. Today, our filters use stateful machine learning to protect people using email and to prevent threats like spear phishing, accidental data loss, data exfiltration and other non-compliant email activity. To book a demo and learn more about how we can help your organization, click here.
Read Blog Post
Customer Stories
Moving Beyond Rule-Based Systems to Protect Employees
Thursday, April 11th, 2019
Top 100 UK Law Firm, Foot Anstey, enjoys a reputation as an energetic, proactive firm, combining technical efficiency with a problem solving approach. This is supported by the firm’s top band rankings in independent legal directories, Chambers UK and Legal 500. Putting clients at the heart of the business and developing and investing in talent have been key to growth. The firm now operates out of seven locations and has over 500 employees. Foot Anstey is protecting employees with Tessian Guardian. 
The firm’s innovative IT and Risk teams identified that the risk of sensitive information being accidentally sent to the wrong person needed addressing. After dismissing the rule-based solutions on the market due to high user interruption, Foot Anstey opted for Tessian’s unique approach of intelligently preventing misdirected emails through machine learning. After an initial period, Tessian presented a detailed report containing email statistics and misaddressed emails caught by Guardian. As well as protecting several emails from being sent to the wrong recipient, Tessian has also provided Foot Anstey with a valuable insight into their email traffic and common sending behaviors. Tessian is now used by Foot Anstey to prevent multiple potential data leaks every day. Learn more about how Tessian prevents human error on email Tessian is building the world’s first Human Layer Security platform to automatically secure all human-digital interactions within the enterprise. Today, our filters use stateful machine learning to protect people using email and to prevent threats like spear phishing, accidental data loss, data exfiltration and other non-compliant email activity. To book a demo and learn more about how we can help your organization, click here.
Foot Anstey Case Study hbspt.cta.load(1670277, 'ba3237d2-ac23-40a8-81fe-fa3e554ec9a1', {"region":"na1"});
Read Blog Post
Customer Stories
Better Email Security with Intelligent Technology
Thursday, April 11th, 2019
JTC is a publicly listed, award-winning provider of fund, corporate and private wealth services to institutional and private clients. Founded in 1987, JTC have c.600 people working across their global office network and are trusted to administer assets of c.US$85 billion. Putting clients at the heart of the business and developing and investing in talent have been key to JTC’s growth. JTC is protecting employees with Tessian Guardian, Tessian Enforcer and Tessian Constructor.
A shared journey There is a natural fit between JTC and Tessian. Tessian’s machine intelligent approach is revolutionising the way companies prevent against data loss is well suited to JTC’s forward thinking attitude, and entrepreneurial mindset. This natural fit was demonstrated early on in the relationship between JTC and Tessian. In the space of one month JTC listed on the London Stock Exchange, chose Tessian as their machine intelligent based email solution, and Tessian secured their $13 million Series A funding round led by Balderton and Accel. “Enterprises must contend with a vast array of scenarios where email can be used or abused to cause severely damaging yet avoidable incidents for the business,” says Tim Sadler, CEO and co-founder at Tessian. “This is especially true for JTC and other firms that are dealing with highly sensitive financial information. Machine intelligence can give organisations a way to learn normal sending patterns and automatically step in to check or prevent something that appears out of character or breaks policy. This mitigates any interruption to innocuous email use, meaning employees and IT teams won’t have to deal with needless, time-consuming administration.” JTC’s attitude to data protection, coupled with increasing regulatory demands and its higher profile following its listing on the LSE Main Market, catalysed them to seek out a solution that matched their forward-thinking attitude and appreciation for a seamless user experience.
The problem JTC’s innovative IT team had been actively seeking a machine intelligent solution to assist in remaining competitive, innovative and at the forefront in the financial services sector. This led JTC to identify that the risk of sensitive information being inadvertently sent to the wrong recipient or to unauthorized accounts as a priority. After looking around the market, JTC dismissed the rule-based solutions, due to unacceptably high user interruption and resource hungry administration and management, and opted for Tessian’s unique approach of intelligently preventing misaddressed emails, and unauthorized emails through machine learning. JTC also recognised spear phishing as a key inbound risk vector. In assessing the risk, they identified that, whilst existing rule-based email security controls are adequate for preventing weak-form impersonation spear phishing attempts, the risks of highly targeted strong-form impersonation spear phishing attacks were increasing. To combat this risk, JTC opted for Tessian’s Defender module which uses machine intelligence and an understanding of historical email relationships to prevent strong-form impersonation spear phishing attacks. The solution Explaining the reason for his firm’s adoption of the technology, JTC’s Chief Information Officer, Adam Jeffries says “Tessian stands head and shoulders above other providers, it requires no admin and creates zero disruption for employees. The technology directly helps our business in solving critical problems and we were very impressed with this. “IPOs are one of the most sensitive times for organisations and a single misaddressed email could put the entire process in jeopardy. For us, it made complete sense to invest in a tool like Tessian to stop the very apparent risk of email data loss.” Deployment The Outlook Add-in was straightforward to implement and fully installed to all users within a week. The seamless integration was then completed by the Gateway solution to provide full coverage across the organisation and ensure all our mobile workers had the protection available to them. Success JTC continue to find Tessian’s reporting to be fantastic, allowing them to realise and demonstrate to the various boards immediate value. Tessian’s ease of use allowed JTC’s GDPR team to actively prevent breaches whilst ensuring minimum impact on users in the form of Outlook pop-ups. The team found Tessian intuitive and easy to use, fitting seamlessly into their existing workflow with no disruption to users. They appreciated the speed and accuracy of the machine learning. Learn more about how Tessian prevents human error on email Tessian is building the world’s first Human Layer Security platform to automatically secure all human-digital interactions within the enterprise. Today, our filters use stateful machine learning to protect people using email and to prevent threats like spear phishing, accidental data loss, data exfiltration and other non-compliant email activity. To book a demo and learn more about how we can help your organization, click here.  
JTC Case Study hbspt.cta.load(1670277, '5be0eaf0-6cab-4873-808e-47bcba1e42db', {"region":"na1"});
Read Blog Post
Customer Stories
Protecting Against Data Loss Caused by Human Error
Thursday, April 11th, 2019
Premier Asset Management is a fast-growing UK retail asset management group with a focus on delivering good investment outcomes for investors through relevant products and active management. Its range of investment strategies include multi-asset, equity and absolute return funds. Premier Asset Management is protecting employees with Tessian Guardian and Tessian Enforcer.
Enterprises face increased pressure to control, monitor and restrict the movement of their data. Premier Asset Management, a fast-growing UK retail asset management group, maximizes their resources to ensure they have the tools in place to do so. Premier Asset Management cares about resource maximization. The UK firm aims to deliver good value to its clients through generating long-term investment outcomes, offering a range of strategies to produce either income, capital growth or a combination of both.  Premier Asset Management turns to Tessian to provide effective, tailored solutions – all with high returns at a minimal cost. Tessian’s machine intelligent security platform protects against email-related data loss, while making the most effective and efficient use of resources. Its core technology is the Tessian Relationship Graph. By applying machine intelligent algorithms to historic email data, Tessian extracts metadata to learn about users’ unique relationships with their contacts. This mapping of baseline conversation patterns is then used to automatically detect inconsistencies and deviations from normal activity, which could signal a security threat. When abnormal activity occurs, the appropriate filters ensure that emails can be traced, redacted, kept confidential, or have appropriate access restrictions imposed on them – all without administrative burden. Tessian Guardian and Enforcer filters perform real-time, automatic analysis of outbound emails, preventing information from being accidentally or deliberately sent outside the secure confines of an enterprise network. Email security breaches can occur where there is malicious intent, such as when a person who is leaving a company sends client or competitive data to their personal account. However, these breaches can also occur when employees with good intentions send documents to their personal accounts to finish up work over the weekend. Premier Asset Management depends on Enforcer to address these problems by preventing people from sending highly sensitive data to personal, or unauthorized, email accounts. Learn more about how Tessian prevents human error on email Tessian is building the world’s first Human Layer Security platform to automatically secure all human-digital interactions within the enterprise. Today, our filters use stateful machine learning to protect people using email and to prevent threats like spear phishing, accidental data loss, data exfiltration and other non-compliant email activity. To book a demo and learn more about how we can help your organization, click here.
Premier Miton hbspt.cta.load(1670277, 'e3d6c287-f151-4e14-b8c4-8741652ae2df', {"region":"na1"});
Read Blog Post
Customer Stories
Reducing the Risk of Human Error on Email
Thursday, April 11th, 2019
Forming part of the NEX Group, Traiana operates the leading market infrastructure for post-trade processing and risk management across asset classes, and provides client service and risk management technology across the financial sector. Global banks, broker/dealers, buyside firms and trading platforms use their cross asset class services to automate risk management and pre-trade/post-trade processing of listed and over the counter transactions. Triana is protecting employees with Tessian Guardian and Tessian Constructor.
The problem Due to sensitivity of the information that Traiana deal with on a regular basis, they set out to find a tool that could prevent misdirected emails without warning the user every time they sent an external email. They found that Tessian’s machine learning approach provided them with the intelligent solution they needed. The solution Tessian was rolled out firm-wide at Traiana. After an initial period, Tessian presented a detailed report containing email statistics and misdirected emails caught by Guardian. As well as preventing several emails from being sent the wrong recipient, Tessian also provided Traiana with a valuable insight into their email traffic and common sending behaviors. Tessian is now used by Traiana to prevent multiple potential data leaks every day. Learn more about how Tessian prevents human error on email Tessian is building the world’s first Human Layer Security platform to automatically secure all human-digital interactions within the enterprise. Today, our filters use stateful machine learning to protect people using email and to prevent threats like spear phishing, accidental data loss, data exfiltration and other non-compliant email activity. To book a demo and learn more about how we can help your organization, click here.
Traiana Case Study hbspt.cta.load(1670277, '4af529a0-d88d-478a-8ef2-f5ec8879b7f8', {"region":"na1"});
Read Blog Post