Global MFG Co

“With Reach, I’m using terms like ‘these users provide more risk to the company overall’, and I’m actually able to give concrete numbers and something valuable to leadership.”

Global MFG Co
circleslines
stars
banner wave decorativebackground

Global Manufacturer boosts security with Reach

A global leader in the manufacturing industry knew the benefits of utilizing SSL decryption on their Palo Alto Networks firewalls, but were cautious to implement the capability. It’s been a top priority for their IT Security Manager, an expert in PAN-OS, since joining the company. Since 80-90% of their network traffic was encrypted,extending visibility would allow his team to get a more complete picture of threats entering and exiting the network.

Concerns from the business around privacy and operational impact kept the project on hold for the better part of 6 years. Deploying this capability for all SSL traffic and to every employee in the workforce was not feasible. If he wanted buy in, the IT Security Manager knew he needed a data-driven, threat informed approach to rolling it out in phases, and to do so he needed to Identify who was being attacked the most in the organization and Identify where attackers were hiding their activities in encrypted web-traffic.

Using data to automate control hardening & attack prevention

Global MFG Co

Within minutes, Reach connected to their security stack and Analyzed email forensics to quantify the number of threats and threat types utilizing encryption in their Delivery. Reach then Correlated these threats with workforce data to determine which users received these attacks, which were riskier than average, and which had a higher risk contribution relative to the rest of the workforce.

“I could write scripts to parse email forensics related to URLs used in attacks, or iterate through alerts tied to our workforce’s endpoints - but that is a manual, lengthy, and a resource-intensive process.”

The result? A prioritized list of risky users derived from threat data and a realization that 4% of the population accounted for 70% of the company’s overall risk. Leadership now had data to understand that a majority of risk lived with a minority of users and gave the green light to start SSL decryption on a test group of those that were most attacked.

Enabling Risk-Based SSL Decryption Without the Complexity

Balancing Security, Performance, and Business Needs

Security teams often struggle to implement SSL decryption due to concerns around privacy, operational impact, and resource constraints. At Global MFG Co., leadership was hesitant to enable decryption company-wide without clear data justifying the need. Reach provided a threat-informed approach, allowing the security team to roll out targeted decryption policies where they would have the greatest impact. This secured executive buy-in while avoiding network performance degradation and expensive hardware upgrades. By automating data aggregation and risk analysis, Reach transformed what was once an all-or-nothing debate into a measured, high-impact strategy that balanced security with business needs.
Security teams often struggle to implement SSL decryption due to concerns around privacy, operational impact, and resource constraints. At Global MFG Co., leadership was hesitant to enable decryption company-wide without clear data justifying the need. Reach provided a threat-informed approach, allowing the security team to roll out targeted decryption policies where they would have the greatest impact. This secured executive buy-in while avoiding network performance degradation and expensive hardware upgrades. By automating data aggregation and risk analysis, Reach transformed what was once an all-or-nothing debate into a measured, high-impact strategy that balanced security with business needs.
Security teams often struggle to implement SSL decryption due to concerns around privacy, operational impact, and resource constraints. At Global MFG Co., leadership was hesitant to enable decryption company-wide without clear data justifying the need. Reach provided a threat-informed approach, allowing the security team to roll out targeted decryption policies where they would have the greatest impact. This secured executive buy-in while avoiding network performance degradation and expensive hardware upgrades. By automating data aggregation and risk analysis, Reach transformed what was once an all-or-nothing debate into a measured, high-impact strategy that balanced security with business needs.
Laptop with Reach Dachboard
play button iconplay button icon
Reach’s platform integrates seamlessly with your existing infrastructure, ensuring minimal disruption during deployment. Our compatibility with a wide range of tools and environments allows you to quickly optimize your security posture without overhauling current processes.

Measuring, improving & reporting on product effectiveness

For Nutanix, Reach Security delivered exactly what was needed — enhanced protection, increased efficiency, and the confidence to scale securely. This partnership exemplifies the power of combining world-class infrastructure with intelligent, data-driven security solutions.

Reach’s approach to measuring product effectiveness consists of the following:
  1. Continuously analyzing data from active deployments.
  2. Gathering direct feedback from customers.
  3. Measuring key outcomes, such as reduced risk exposure.
  4. Using insights from these measurements to enhance product.

By combining seamless integration, proactive threat detection, automation, and adaptability, Reach Security delivers a comprehensive approach to cybersecurity that empowers organizations to stay ahead of the curve and confidently face an ever-changing threat landscape.

"Reach provides a single pane of glass for viewing your entire security ecosystem. Comprehensive dashboards and detailed reports enable you to understand your risk posture, track trends over time, and make informed decisions. These insights help refine your overall security strategy, ensuring that you stay ahead of emerging threats. Reach’s platform integrates smoothly with your existing infrastructure, ensuring minimal disruption during deployment. Our compatibility with a wide range of tools and environments allows you to quickly enhance your security posture without overhauling current processes."

Global MFG Co & Reach: The Story Continues

"With Reach, I’m using terms like ‘these users provide more risk to the company overall’, and I’m actually able to give concrete numbers and something valuable to leadership.

1000

9.6%

Of your organization’s risk
diagram
130
People in this group 1.2% of your organization
"With Reach, I'm now able to say 'I'm not decrypting all URL traffic, I'm decrypting these categories based on attacks that we've seen and reviewed. I'm decrypting these categories for our highest risk users. It's much more manageable."
This global manufacturer is just getting started with Reach. After a successful risk-based SSL decryption deployment, the company is now looking to further enhance security protections across the network. With decryption providing greater visibility into traffic, the IT Security team plans to leverage Reach’s automation for file blocking and other advanced security capabilities. Additionally, enriched network telemetry is improving SIEM data quality, enabling faster, more effective incident response. Over the next year, the company aims to expand SSL decryption across the entire workforce, using Reach to ensure security enhancements remain strategic, scalable, and risk-informed.

Getting Started with Reach

Unlock the full power of your security stack with a free tool rationalization assessment.

An API key to start
key icon

Read-only API key for a security tool of your choice

Setup in 3 minutes
settings icon

Create your account and setup the integration

Results in < 5 days
diagram icon

Get results across licensing, control mapping, risk exposure, and posture

Just Released: TAG Cyber's ROI analysis of the Reach platform
Read the Report
arrow rightarrow right