Search
Close this search box.

CASE STUDY

A Large US University

Industry: HIGHER EDUCATION

A Large US University Freed Up Precious Resources and Solidified its Account Protection Using the Automated Capabilities of SpyCloud

Challenge

With few resources to dedicate to account takeover prevention, this large US university was settling for a mediocre security solution that required too much manual effort.

Scroll to Challenge

Solution

The university leverages SpyCloud’s seamless integration with Splunk to automate its account takeover prevention strategy, enabling the institution to strengthen its security stance.

Scroll to Solution

Result

Using SpyCloud automation and data, the university consistently discovers more account exposures and remediates in a fraction of the time as before and with fewer resources.

Scroll to Result

A Large US University Finds More Exposed Credentials 10X Faster with SpyCloud

Challenge

Keeping Information Accessible While Protecting Accounts

This featured university takes cyber security seriously and is aware of the constant threats to its students, faculty and staff. Like many higher education institutions, however, this university has few dedicated security professionals on staff to implement and manage technologies and processes.

For security professionals at higher education institutions, there is often an identity access management dilemma. On the one hand, they want to restrict account access to only authorized individuals, yet they also want to remain “open” for students and staff to get any information they may need. This transparent framework fosters self-reliance and efficiency, but it makes it challenging to limit and control security.

The university understands account takeover is a pervasive problem throughout the college systems that is growing exponentially. They believed they were addressing threats with a product, but it failed to live up to its sales pitch, leaving them to perform additional work to get the most from the solution. “We had to do so many manual tasks after finding any issues and knew we might be missing other ATO threats. These efforts took time away from performing other necessary tasks in our security cycles,” says a manager in the Office of Information Technology at the university. “We were introduced to SpyCloud and were eager to compare credential matches. Even more so, we wanted to see how the integrations would speed remediation with fewer resources.”

Solution

Integrate SpyCloud and Splunk for Automation Efficiencies

The institution chose SpyCloud for several reasons, including the fact that the SpyCloud API could dump their robust breach data into its Splunk instance. According to the manager, integration into Splunk was key. “Our previous tool lacked Splunk integration, forcing us to use up resources to investigate suspicious accounts and take manual action in Splunk,” he says. “Splunk scripts pull in the SpyCloud data automatically to provide instant visibility into which of student’s or staff’s credentials have been exposed. The quantity and quality of their data is amazing, we’ve never seen anything like it.”

The Splunk integration means developers no longer have to take extra manual steps to consume the SpyCloud data. The SpyCloud API provides an efficient and reliable way for the Office of IT to access their exposed credentials that are being traded in underground communities.

Many other account takeover prevention solutions and tools find exposed credentials only after they are on public forums, much too late for remediation efforts to secure accounts.

“As a higher education institution with students, faculty and staff using school emails to access everything from financial aid to housing data to meal plans, we have a responsibility to protect those accounts as best we can from cyber criminals who hope to gain access to those accounts,” says the manager. “With SpyCloud, we feel like our security staff finally have the tool they require to know the who, what, when and where as it relates to compromised accounts.”

Results

Faster, More Reliable Results with Fewer Resources

Since implementing SpyCloud, the school finds more exposed credentials than ever before. Thanks to the seamless API integration with Splunk, they are finding those exposures and taking action ten times faster than in the past.

“We have to do more with fewer resources every year,” says the manager. “SpyCloud digs deeper into the dark web and cyber underground than other tools and finds more stolen credentials sooner. We have more hits than we did with the other system because SpyCloud data is fresher and more complete.”

Exposures found 10X faster than with previous tools

With SpyCloud, you get enterprise-level, automated account takeover and ransomware prevention powered by Cybercrime Analytics based on actionable darknet insights.

SpyCloud offers the largest collection of recaptured darknet data in the world, combined with the earliest possible recovery. Our proprietary engine quickly ingests data from breaches, malware-infected devices, and other underground sources, then cleanses and enriches the data – adding context to the records so you understand the severity of the exposures (the source, breach description, and the actual password in plaintext). Our customers get notifications of compromised accounts and passwords far sooner with SpyCloud than any other provider.

Billion
0 +
Recaptured
Assets
0 K+

Breaches

Billion
0 +

Assets Ingested Monthly

0 +

Malware
Families

Download the PDF version of the case study to print or share with others.

The 2024 Malware & Ransomware Defense Report is here. Read it now

X
Search
Close this search box.