Customer Success: Utility Cooperative – SEIEC

Prevailion Customer Story - Matt Ohmes - featured image

Matt Ohmes, IT Manager with SEIEC, said Prevailion gives his organization an extra tool to help verify whether a vendor is serious about security before it awards costly projects. If a vendor is found to be compromised, Ohmes can take that information to his CEO and the board to evaluate that relationship.

Prevailion empowers Ohmes and his organization to:

  • Verify if a vendor is serious about security before it awards a costly project
  • Monitor existing third-party vendors and identify Evidence of Compromise
  • Act on that evidence by limiting a vendor’s access to their network
  • Share compromise information with leadership to make informed partner choices

“Prevailion has given me some assurance. My vendors I have found in the platform were green and stable — that gave me a sigh of relief, because you never know what you’re going to find.”

The Latest

Post thumbnail image

Information Technology Manager

The Information Technology Manager works to support Prevailion’s IT assets, employees and mission critical systems. In this role, you will wear many hats and work collaboratively with internal teams to deploy, manage, and maintain systems and infrastructure key to the company’s success and growth of Prevailion.

Post thumbnail image

Threat Intelligence Researcher

The Threat Intelligence Researcher works in Prevailion’s Intelligence team. In this role, you will work collaboratively with internal teams to deploy, manage, and maintain systems and infrastructure key to the Intelligence team’s success and growth and that of Prevailion.

Post thumbnail image

Senior Threat Intelligence Researcher

The Senior Threat Intelligence Researcher works in Prevailion’s Intelligence team. In this role, you will work collaboratively with internal teams to deploy, manage, and maintain systems and infrastructure key to the Intelligence team’s success and growth and that of Prevailion.

Copyright 2021 Prevailion, Inc. All rights reserved.    

Disclaimer: Gartner “Cool Vendors in Security Operations and Threat Intelligence,” Mitchell Schneider, Ruggero Contu, John Watts, Craig Lawson, October 13, 2020. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner Disclaimer: The GARTNER COOL VENDOR badge is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s Research & Advisory organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.