Consumer Goods Leader

Throughout its successful, multi-decade long history, the confidential subject of this case study has always strived for advancing technology to address the needs of its consumers worldwide.

In a pivotal example of its commitment to innovation and growth, and to modernize its collaboration company-wide, the company successfully migrated to G Suite. In doing so, the company initially elected to rely on its existing information security infrastructure to keep the business safe from cyber threats.

However, as technologies and industries evolve, the risk of cyberattacks that could lead to a data breach or system disruption also evolves - and increases. Particularly for an S&P 100 company that serves customers around the world, such attacks can inflict major operational downtime, brand harm, significant cost, and government investigations and fines.


The information security team recognized that the most significant cyber risk is email-borne threats: it was time to prioritize a project to defend against these attacks.

Of greatest concern were end users clicking on malicious links or falling for business email compromise (BEC), with high potential for theft of funds and information.

Although the company relied on industry-known email and web security technology to protect it from phishing attacks, the team found itself frequently “tuning” the security gateways and adding rules to block messages after attacks got through. Therefore, executives and end users worried their email was not secure. While the IT team can control software updates, they can’t control which links end users click on or whether they fall for a BEC email. The team recognized the need for technology to better defend the company against malicious links and phishing attacks.


The company worked with Cloudflare to bring the attacks to a halt. Cloudflare's innovative technology continuously and proactively crawls the web, discovering phishing campaigns and infrastructure before attacks launch. On average, the solution detects malicious sites and payloads a full 24 days before industry benchmarks. The resulting early insight and threat information empowers Cloudflare's anti-phishing service to detect and block phish that other defenses miss, adding a layer of protection against attacks.

To evaluate effectiveness, Cloudflare was deployed with the company’s Gmail instance. The Cloudflare service is automated, operationally simple, and cloud-based, so it required no new on-site equipment.

The Cloudflare service successfully detected and blocked substantial numbers of phishing emails, including credential harvesting and BEC attacks. In one incident, an email sent to the CFO that appeared to be from the CEO, requesting a transfer of funds, was detected and blocked before it reached the CFO’s inbox, averting potential financial loss.

In addition to protecting against phishing email, Cloudflare also includes a recursive DNS service that protects against web-based attacks. The company successfully deployed the Cloudflare recursive DNS service with their Windows DNS server to block end-user access to phishing sites. The Cloudflare service is updated hourly with newly discovered phishing domains to maximize protection.

Cloudflare is now operational company-wide, protecting this Fortune 500 leader against email and web-based phishing attacks. Over one year, the service processed 375 million email messages and stopped upwards of eight million targeted phishing attempts. The multitude of stopped attacks includes credential harvesting threats that spoof brands such as Outlook, Paypal, UPS, and Apple; links resolving to sites or files with malicious payloads; and email attachments with embedded malicious code or links.

Consumer Goods Leader
Related Products
Key Results
  • The IT team now provides specific metrics and reporting to the Board about the number of emails processed and malicious messages caught.

  • Cloudflare's preemptive, comprehensive, targeted phishing protection has helped improve productivity, and significantly reduced cybersecurity risk.