No Stone Unturned
As the threat landscape diversifies, so does the suite of tools Greystone leverages to protect their clients.
“When we first started using ĢTV, it was just the Managed EDR product,” remembers McDougall. “It’s very simple to deploy and complements our remote tooling well. It’s a completely touchless
install. In terms of day-to-day monitoring, there’s very little we need to do. We’re a small team – we don’t have a fleet of cybersecurity experts.”
“External Recon has also been quite eye-opening,” he continues. “I don’t think we realized how powerful that was initially, but it highlights every exposed port that our customers have, any that could lead to a breach or a cyberattack.”
But Managed EDR isn’t the only tool in the kit. ĢTV continues to innovate far beyond Managed EDR to meet Greystone’s security needs – and the needs of its clients.
“We use ĢTV Managed Security Awareness Training for monthly awareness training, which keeps everybody on their toes and up to speed with security,” says McDougall. “But what’s really been instrumental for us is the Managed Identity Threat Detection and Response solution. At the beginning of our partnership, it was still quite new, an unexpected and beneficial addition that, once again, addressed a gap, protecting even more attack vectors for clients, such as email or identity-based attacks. It’s been so useful for us.”
Team Player
Above all else, this is a partnership – one that McDougall has deep appreciation for.
“The relationship we have with ĢTV is second to none,” he praises. “The communications team works so closely with our account manager. It truly feels like a partnership – it’s not just another product in our stack.
“One of the best things about ĢTV is that it’s constantly evolving as a partner. The team is always looking at new ways it can assist or improve its offering and that’s what gives me confidence for the future. The team will probably see opportunities to do that before we do.
“Our clients know that ĢTV will keep them secure, even when the Greystone offices are closed. Having access to, and working alongside, such professional, highly trained security analysts is critical. It’s not just a script or AI working in the background – it’s real people.”