CASE STUDY

Beyond Investments: Strengthening IT & Security for a North American Financial Services Firm

When a leading North American financial services firm needed a security and IT partner, trust was paramount. They turned to Bulletproof, whose Microsoft expertise, innovative cybersecurity approach, and results-driven mindset helped modernize their IT infrastructure and strengthen their security strategy.

This case study explores how the partnership safeguarded operations and aligned with the firm’s core values—exceeding expectations in the process.

Looking for a PDF? You can access it here.

Download a PDF version as a takeaway and share with your coworkers.

ACCESS PDF

The Client

This financial services firm provides discretionary investment management and advisory services to private clients, foundations, endowments, pensions, and family offices.

Known for its long-term perspective, the firm is 100% employee-owned, fostering stability, accountability, and client trust.

The Situation

The Need for Enhanced Cybersecurity and IT Support 

For a firm managing private wealth, privacy and security are paramount. Clients expect operations to remain discreet, seamless, and free from disruption—a cornerstone of trust in their services.

As the threat landscape evolved, the firm recognized the need for a proactive cybersecurity strategy to safeguard client assets and ensure uninterrupted service.

This realization led them to search for a new cybersecurity partner—one that could match their commitment to excellence and provide non-disruptive solutions to strengthen their IT security.

Finding the Right Partner  

During a competitive Request for Proposal (RFP) process, Bulletproof stood out for its energy, professionalism, and clear commitment to securing the client’s business.

The decision was shaped by:

  • Proven Microsoft security expertise and certifications
  • Ability to unlock Microsoft funding and provide early access to new capabilities
  • A flexible engagement model addressing long-term contract concerns
  • Willingness to invest in the partnership through in-person collaboration and hands-on support

The Solution

Seamless Onboarding and Proactive Guidance  

From the outset, Bulletproof provided a structured and prescriptive onboarding plan, using Microsoft methodologies and detailed playbooks to ensure a smooth transition.

The approach included:

  • Microsoft security workload configuration and tuning
  • Networking infrastructure upgrades to improve reliability and reduce downtime
  • Governance processes tailored to the firm’s compliance needs
  • Proactive monitoring and SOC support for 24/7 protection

Bulletproof’s expertise in Microsoft Azure Security was particularly valued, with precise, carefully managed security adjustments executed to the highest standards.

Today the firm utilizes these services: 

  • Managed IT Services, Bulletproof 365 
  • Managed Security Services, Bulletproof 365 Enterprise 
  • E5 Security Management 
  • Network Re-design of Firewalls, Switches, and APs 
  • Microsoft Secure Access Gateway Implementation 
  • Dedicated Project Manager to Assist with Managing Various IT Projects
     

The Impact

Linkedin (24)

Process and System Improvements 

Upgraded network infrastructure improved operations, reduced downtime, and ensured uninterrupted client service.

Linkedin (21)

Microsoft Partnership Advantages 

Bulletproof’s strong relationship with Microsoft provided access to funding, expert support, and early insights into innovations.

Enhanced Security-1

Enhanced Security Posture

Advanced threat detection and strong security have made the firm safer and more reliable for its clients.

Linkedin (23)

Institutional Confidence 

Refined cybersecurity processes enabled the firm to confidently meet RFP requirements, ensuring compliance and safeguarding trust. 

Linkedin (22)

Time and Cost Savings 

Vendor consolidation saved time and operational costs while increasing productivity and system reliability. 

Cody McNeill

When we initially reviewed the client’s firewall, we discovered that years of convoluted configurations and patchwork policies had made troubleshooting a nightmare. Previous MSPs had taken shortcuts, using broad ‘allow-any’ policies that left the network both vulnerable and difficult to manage.
 
By eliminating years of redundant data and implementing clear, precise policies, we ensured the firewall was not only secure but also easy to navigate in high-pressure situations. 
 
Hearing the clients express their relief at finally having a properly configured system was especially rewarding. Their surprise at the smooth deployment of the first few firewalls—even on the initial try—spoke volumes about the impact of a thoughtful, clean approach.
 
Cody McNeill, Associate Network Architect, Professional Services

 

The Conclusion

A Trusted Long-Term Partner 

Bulletproof established a foundation of confidence and trust. by remining adaptable and transparent. The success of the initial engagement led to a multi-year agreement, expanding the scope to include Managed IT, Managed Security Services, and SOC support.

By aligning with the client’s culture and delivering on its promises, Bulletproof has become a strategic partner in securing operations and enabling growth.

Bulletproof's Security Operations Center Expert.
Bulletproof Managed Security Case Study Image
Bulletproof Managed Security Case Study Image
Bulletproof Managed Security Case Study Image


Bulletproof Credentials

“I’m so pleased to congratulate Bulletproof this year’s Microsoft Security Excellence awards recipient for Security Trailblazer award.
 
Our partner community plays such an important role in helping our customers navigate a rapidly evolving cybersecurity landscape. 
 
We are so proud to work alongside them in a shared commitment to building a safer world for everyone.”  

Vasu Jakkal

Vasu Jakkal, CVP, Microsoft Security

Next Steps

SOC Video Image

Make Your Business Immune to Disruption with Our Security Operations Center

 

Did you know that there are 1.7 million ransomware attacks every day? That’s 19 every second! If that number doesn’t alarm you, consider this: the average cost of a ransomware attack is a staggering $1.85 million!

Watch this video for an exclusive inside look at how we keep your business secure with our Security Operations Center (SOC).

 

WATCH NOW

eBook: supercharge your security operations

Supercharge Your Security Operations

Enhance the efficiency of your Security Operations Center (SOC) by integrating cutting-edge threat intelligence that provides real-time insights into emerging threats and vulnerabilities.

This advanced intelligence enables your team to anticipate and respond to potential security breaches with precision and speed. Additionally, implement automated attack disruption technologies that swiftly neutralize sophisticated cyber threats, such as ransomware, before they can inflict damage. 

ACCESS EBOOK

Call Us

1.866.328.5538