CASE STUDY
Members Credit Union, with over $400 million in assets, 117 employees, and 48,000 members, was operating without enough visibility into their systems and did not have the bandwidth to efficiently keep up with the everyday process of cybersecurity monitoring and management. It was simply impossible to manually monitor and keep up with the volume of logs and events their systems were generating. With a goal to find a vendor to support their smaller internal cyber team, Members CU sought a partnership in cyber risk management that could not only assist in monitoring but also provide 24/7/365 support.


“DefenseStorm has our back so we can focus on the operational aspects of the business because they will let us know if there is an issue.”
Matt Baldwin
Information Technology Director
Members Credit Union

Great Lakes Credit Union (GLCU), located in Bannockburn, Illinois, manages $1.4 billion in assets, serves 111,090 members, and employs approximately 231 people. The credit union faced challenges with disjointed security and risk systems, limited capacity within a small security team, and manual, labor-intensive processes. These issues made it difficult to correlate data for actionable insights and expand cyber event monitoring, leading to inefficiencies in operations and delayed responses to potential threats.

Axos Bank, headquartered in San Diego, California, employs approximately 1,375 people and manages over $23 billion in assets. The bank faced challenges with a previous cybersecurity provider that lacked attention to detail and operated inefficient global processes that were not customized for the bank’s specific needs. This lack of tailored service led to inefficiencies and vulnerabilities across its digital infrastructure.

Community West Credit Union, located in Kentwood, Michigan, operates with approximately $250 million in assets, 65 employees, and around 19,000 members. In early 2021, Community West CU was preparing for an examination that would elevate them to the next peer group. Faced with the challenges of having only two personnel managing their security, numerous disjointed systems, and impending reporting obligations, they recognized the need for a more efficient cybersecurity solution.