Case study: Bank

Company name:

Major Polish bank




One of the largest banks in Poland, offering a full range of banking products with an offer targeted at individual and institutional clients, including the sector of small and medium-sized enterprises.


  • Incomplete network visibility
  • Fast-evolving and novel cyber threats
  • Inability to identify subtle threats inside the organization
  • The need to comply with GDPR


  • Improved organization visibility of data flow in the network in real-time
  • Enhanced threat detection and response time
  • A better understanding of user and device behavior
  • Implemented a dedicated data leakage monitoring module


As part of critical infrastructure and public institutions, banks cannot afford to discredit and lose customers’ trust caused by data leakage, theft of funds, or lack of access to financial resources generated by attacks aimed at IT infrastructure. Financial institutions nowadays depend on IT systems more than ever. Thus, it is essential to have technical means to analyze the behavior of network users (also inside users), who are familiar originators of cybersecurity incidents. Due to the complex network and a large amount of data downloaded from various systems, cybersecurity teams often face problems with faster responses and prioritization of cyber-attacks.

As financial institutions manage large quantities of sensitive personal data – an essential aspect of their cybersecurity is also necessary to comply with GDPR. To face that challenge bank was looking for a solution that could not only monitor sensitive data but also help to provide required information and reports for Data Protection Inspectors.

Our customer recognized its cyber defense strategy as a priority to maintain data confidentiality and integrity. As the cybersecurity team perceives a lack of complete network visibility as a potential vulnerability, it is crucial to strengthen its cybersecurity defense by deploying technology to detect threats early on in the attack and mitigate the risk.


The three-month Proof of Value (POV) entirely presented the capabilities of Cryptomage Cyber Eye™ to detect emerging threats in the early stage coming from both external and internal sources. Cryptomage Cyber Eye™ probe powered by AI, machine learning, and in-house developed algorithms provided better protection against security threats, reducing the risk to which the bank is exposed and triaging incidents. As a result of the traffic analysis, based on the observation of users’ connections, servers, and data flow, the Cryptomage Cyber Eye™ allowed for easy and effective detection of potentially dangerous user traffic and immediate detection and tracking of the new and interactive devices on the network. The clear and straightforward user interface helped the cybersecurity team to manage the technology efficiently with a graphical overview of the network activity and to investigate incidents with a forensic tool from different angles.

Implementing the Cryptomage Cyber Eye™ with an advanced, tailor-made data leakage monitoring module helps immediately detect any abnormal behavior and applications on the server that are potential sources of data loss. The GDPR compliance module is also equipped with easy to use report generator.

From the first analyzed data package, Cryptomage Cyber Eye™ started to study and investigate network behavior in real-time, raised flags, and exposed them to the cybersecurity team.


As a result of deploying Cryptomage Cyber Eye™, the bank’s cybersecurity team gained better network visibility and an additional security layer for faster reaction and investigation of threats and attacks on the company’s infrastructure. Extended network visibility provides cyber experts with a better understanding of the actions taken by users and devices. With Cryptomage Cyber Eye™, cybersecurity and compliance teams receive a trustworthy and reliable solution alongside experienced analysts available on demand.

All the above combined helped to fight and stay ahead of evolving, modern cyberattack techniques and ultimately protected the bank’s credibility and reputation.