Securing EKWB’s Digital Frontiers

EKWB is a global leader in high-performance liquid cooling for computers, operating across the EU, US, China, and Serbia. As their operations scaled internationally, their IT systems evolved organically—creating fragmented environments and security blind spots.

these businesses trust in benchmarked to stay secure, compliant, and in control

100,000+ Exposed Records Secured

We uncovered and helped secure over 100,000 untraceable lead records previously exposed

1 Unified Identity System Across 4 Regions

EKWB transitioned from siloed IT environments in the EU, US, China, and Serbia to a centralized identity and access framework

Access Secured

Eliminated all shared administrator accounts and implemented mandatory MFA across 100% of critical platforms, including AWS, O365, Magento, and Salesforce — closing major attack vectors.

How we uncovered critical gaps at EKWB

EKWB is a global leader in high-performance liquid cooling for computers, operating across the EU, US, China, and Serbia. As their operations scaled internationally, their IT systems evolved organically—creating fragmented environments and security blind spots.

The Problem #1

High growth caused big gaps

As EKWB’s workforce and infrastructure expanded, their internal systems failed to evolve in a unified manner. Business units operated in silos, each using their own cloud tools, identity providers, and authentication standards. This fragmented ecosystem introduced several high-risk vulnerabilities, including:

  • Lack of centralized identity governance: Employees were onboarded and offboarded in isolated systems with no oversight or synchronization.

  • Unmonitored shared email accounts: Key business functions such as sales and support were relying on common email inboxes with generic passwords, leading to accountability gaps.

  • Decentralized admin controls: Admin access was scattered across AWS, Office 365, Magento, and other platforms, without any unified role management or policy enforcement.

  • Insufficient security posture: Tools like MailerLite, Salesforce, and Asana were being accessed without multi-factor authentication (MFA) or audit logs—creating blind spots for compliance and attack surface monitoring.

  • Data sprawl: Sensitive customer and lead data resided in unencrypted Google Sheets, unmanaged CRM exports, and personal devices—raising concerns about GDPR and CCPA compliance.

The Real Problem

Everything on the line...

Together, these issues made EKWB vulnerable to:

  • Data breaches and reputational damage

  • Regulatory non-compliance

  • Internal misuse and external hijacking of privileged accounts

The Solution

Secure Access Management and Protection

Benchmarked designed and proposed a secure identity and access governance model, aligned with Microsoft’s Entra ID, Intune, and Sentinel for advanced monitoring.

Key Solutions:

  • Mandatory MFA across all systems
  • Centralized account provisioning through Entra ID
  • Full audit and revocation of unauthorized or shared credentials
  • Endpoint protection and device compliance using Intune
  • Azure cost monitoring and role-based access controls (RBAC)

The Solution

Customized Protection Plan

Enabled Threat Detection and Security Monitoring

  • Configured Microsoft Sentinel to monitor authentication anomalies, privilege escalations, and suspicious activity across AWS, O365, and Magento portals

Azure Cost and Resource Governance Proposal

  • Deployed budget alerts, consumption reports, and policy enforcement via Azure Policy to prevent resource sprawl and unauthorized service deployment.

Secure SaaS Ecosystem

  • Integrated third-party services (e.g., Salesforce, MailerLite, Trello) into Entra SSO, ensuring auditability and secure access through conditional access policies.

The Results

Reduce privileged access exposure

Limit how often and how widely high-level access (like admin rights) is granted to minimize risk if accounts are compromised.

Consolidate 12+ identity sources into a single management plane

Combine multiple identity systems (e.g., Active Directory, HR systems, apps) into one platform to simplify user management and boost security.

Achieve real-time threat visibility and compliance audit readiness

Gain immediate insights into security threats and ensure your systems meet regulatory requirements at all times.

Introduced Microsoft Entra ID, Defender for Endpoint, and DLP tools

Rolled out Microsoft’s identity management (Entra ID), endpoint protection (Defender), and data loss prevention (DLP) solutions to enhance security.

Enhanced onboarding/offboarding, file-sharing, and device control

Rolled out Microsoft’s identity management (Entra ID), endpoint protection (Defender), and data loss prevention (DLP) solutions to enhance security.

Bring endpoints under policy enforcement

Ensure all user devices (laptops, phones, etc.) follow security policies like encryption, antivirus, or access controls.

Streamline user onboarding and offboarding with zero-touch provisioning workflows

Automate the setup and removal of user accounts and devices without manual steps, reducing errors and saving time.

Testimonial

“Matt and the Benchmarked team have been a game-changer for EKWB. We uncovered over 100,000 untraceable lead records that were potentially exposed. With benchmarked’s security-first realignment, we’re now confident in our digital hygiene. Highly recommend!”

Frequently Asked Questions

Got concerns? Let’s address those
Why should I trust benchmarked with our IT when we’ve gotten by fine without dedicated IT so far?

Because ‘getting by’ isn’t the same as being safe. Most breaches don’t happen because a company is reckless — they happen because no one noticed the gaps. EKWB was operating creatively and efficiently, but their shared admin credentials, lack of MFA, and unsecured production assets made them a prime target. We don’t fix what isn’t broken — we show you what is quietly broken and risky, even if it hasn’t failed… yet. We also collaborate with existing team and existing infrastructure, and adapt to only gaps identified within budget constraints. We are a true partner, not another service.

Aren’t tools like Google Workspace and LastPass already secure enough?

Yes — if configured and integrated accross all applications correctly, maintained properly, and backed by clear policies. But without multi-factor authentication, role-based access, or data classification, these tools become potential liabilities.

In case of EKWB, these were not integrated, meaning no centralised access management. Remember, Last Pass is only centralized password manager not access manager.

We don’t sell fear — we show you how misuse or neglect of otherwise good tools can silently increase your risk.

Are you just going to give us a long list of expensive tools to buy?

No. In fact, one of our goals is to help you avoid wasting money. We presented Bright Visuals with two right-sized options based on their team, budget, and risk tolerance. Our assessment often highlights tools you don’t need or aren’t using well — which can lead to cost savings, not just new spending.

At EKWB, they were able to reduce cost by 35% while also improving their infrastructure and cybersecurity systems.

Will this slow down our creative team or disrupt our projects?

Quite the opposite. EKWBs workflow was preserved and even improved. We focused on lightweight rollout plans, better onboarding/offboarding, and more consistent tool usage — which reduced friction in day-to-day work. Our goal is to protect creative teams without turning them into IT managers.

Why do we need to classify our data or map our tools? We know what we use

You think you do — until you look deeper. EKWBs was using 30+ SaaS tools, but no one had a full view.

That led to waste, duplicate tools, poor security, and slower onboarding. Once we mapped their application ecosystem and data usage, it was clear where they could streamline, protect, and save money.

Visibility is power. And it should be continuous – its almost a full-time to job. But we implement automations and dedicated team at a fraction of a cost, so you can focus on business, while we manage that for you.

Can’t we just hire a full-time IT person to fix all this?

Sure — but a single hire can’t match the speed, breadth, or objectivity of a focused external assessment.

benchmarked delivered a full security audit, app rationalization, and roadmap within weeks, not months. We don’t replace your IT team — we give you the clarity they’ll need to be effective, whether internal or outsourced.

Isn’t this overkill for a creative company? We’re not a bank.

Exactly — which is why our approach isn’t overkill. We don’t give you enterprise-grade bloat you don’t need.

EKWB got a realistic, scaled plan that aligned to their actual workflows, risk profile, and business goals — not a Fortune 500 checklist.

What if we don’t implement your roadmap?

You’ll still walk away smarter. Even without execution, you’ll gain clarity on your risks, tools, and options. But we design everything for action — including budget ranges, effort levels, and timelines — so it’s doable, not just theoretical.

What makes Benchmark different from other IT consultants?

We don’t just install tools or throw jargon at you. We specialize in fast-moving, tool-heavy, creative environments — and we speak the language of both risk and design.

We turn invisible vulnerabilities into visible, actionable choices — and we don’t waste your time.

We do it-as-a-service, end-to-end, with implementation. We are a perfect blend of speed, price performance, de-risk. We don’t leave you with “strategy document”, but we guide and implement measures for you.

On the other hand, if you have capacity and internal teams, we work with them, not causing additional overheads. We are all about being lean.

Sounds nice, but where’s the proof this made a real difference?
  • Critical vulnerabilities were closed

  • Secure onboarding/offboarding now exists

  • Work continues uninterrupted

  • IT chaos is now mapped and managed

  • The leadership called it “risk translated into business decisions.

This isn’t fluff — it’s functional change, with clear outcomes.

Why choose us

At benchmarked, we specialize in connecting; IT data, financial structure, and strategic impact. Our methodology bridges the gap between spreadsheets and executive decisions by:

Going beyond surface-level audits

We don’t just tell you to cut costs — we show you where, how, and with what trade-offs, all grounded in your operational reality.

Diving deep into cost structures, contracts, and utilization

Implemented SSO and MFA while securely managing Bright's infrastructure

Translating raw IT data into actionable business insights

IT cost optimization isn’t about cutting corners — it’s about making sure every dollar spent serves a purpose.

Case studies.
Hear what others have say.

4.9

All chances are you'll impressed too.

5.0

Many thanks Mat. Really appreciate your team's hard work over the last few months. This has not been an easy task.

Dr. S.Iyabo Tinubu-Karch
CEO Sidra Medicine

4.5

RMI being ISO 27001 and 14001 certified. These certifications are a testament to the hard work, dedication, and collaborative efforts of everyone.

Claire Todd
QHSE Manager, RMI

4.3

Thank you for your outsdanding work without any setbacks.

Devid Palcic
CEO Robotina

Start Your Journey

We’re not just financial auditors. We’re your IT cost transformation partner. We help you gain full visibility, cut waste, and align every riyal with value.

from

4.900 eur

Time is money. Save both. Book a Free Strategy Call With Our Experts.
Guaranteed 20-30% IT Cost Savings - Stop wasting money on unused licenses and over-provisioned cloud services.
Complete Clarity – Track every SaaS subscription, cloud resource, and software license in real time.
Streamline and optimize IT services, cybersecurity, compliance and vendors, with oversight
Full Mapping of IT OPEX (Apps, Infra, Licenses)
Discovery of Hidden or Duplicated Costs
License & Vendor Optimization
Quick Wins (low-effort savings initiatives)
No lock-in. Fixed fee. Zero risk.