Case Studies

Real numbers.
Real Indiana businesses.
Names redacted on request.

These six case studies are pulled directly from real tickets in our PSA system. The numbers are real. The outcomes are real. The names are redacted because most of our clients work in regulated industries — healthcare, pharma, education, finance — where being publicly identified as anyone's IT customer is itself a security exposure. We respect that.

Why we don't name names: Most of our clients work in regulated industries (HIPAA, FDA, FERPA, PCI). Being publicly identified as someone's IT customer is itself an attack vector — bad actors target by association. So we keep our clients anonymous unless they ask to be named. The numbers below are pulled directly from our PSA system. They're real. The clients are real. We just don't put bullseyes on them.
CASE STUDY 01 Industrial Manufacturing · US Subsidiary of European Group · Indianapolis HQ + nationwide field-service techs · Indianapolis, IN · Client since 2023

Bridging a European parent's IT mandates with
American factory-floor reality.

0.5hr
median ticket resolution
54%
resolved < 1 hour
135
security events caught (12mo)
0
successful breaches
The Challenge

The Indianapolis subsidiary of a global European machine-tool manufacturer needed IT that could bridge the parent company's European IT mandates and security baselines with American operational reality — supporting a hybrid workforce of HQ engineers, sales staff, and traveling field-service technicians who service customer factory floors across North America. Their data wasn't generic business data: it was proprietary CNC machine designs, customer drawings, and manufacturing IP — actively targeted by industrial espionage operators.

What We Did
  • Standardized backups across HQ servers and field/remote workstations with monitored failure alerting
  • Deployed our Managed SOC with advanced endpoint detection & response — every workstation, server, and traveling-tech laptop monitored 24/7
  • Microsoft 365 hybrid identity management with conditional access — European parent logins work seamlessly while anomalous geographies get flagged
  • Active phishing defense with employee reporting workflow
  • Dark web monitoring on the corporate domain
  • Field-tech laptop hardening: these laptops physically travel into customer factory floors and connect to customer networks; we treat them like they're hostile by default
The Outcome

The internal team focuses on running the manufacturing business — sales engineering, customer service, machine deployments. JPtheGeek runs the IT infrastructure that supports it. Phishing attempts are caught before clicks. Microsoft 365 anomalies are intercepted at the cloud-activity monitoring layer. Field-tech laptops travel through hostile networks and come home clean.

Running Today
GeekGuard ProtectManaged SOC + EDRMicrosoft 365 Hybrid IdentityCloud Activity MonitoringDark Web MonitoringField-Tech Hardening
CASE STUDY 02 Multi-Campus Faith-Based Non-Profit · 7 campuses · thousands of weekly attendees · Greenwood, IN (HQ) + 6 campuses · Client since 2015

Seven campuses. One IT team. Zero ransomware. On a non-profit budget.

31,000+
total tickets
145
security events caught (12mo)
3
campuses, one team
0
successful breaches
The Challenge

A 7-campus Indiana non-profit serving thousands of weekly attendees across the metro area, with dozens of staff, A/V production teams, kids' ministry security cameras across all sites, and a strict non-profit budget. After 10+ years as a JPtheGeek client, they need enterprise-grade reliability and security — without an enterprise-grade bill.

What We Did
  • Standardized backups across every campus server with cross-site replication
  • Deployed our Managed SOC — picking up failed admin logins, MFA failures, and O365 risk detections (we've blocked logins from Denver, Atlanta, and other unexpected geographies tied to compromised credentials)
  • Active phishing defense: every reported phishing email runs through our SOC, gets blocked at the email layer, and triggers a sweep of related messages across the org
  • Multi-campus printer fleet management
  • Annual PCI compliance scans run, reviewed, and remediated
  • Children's ministry physical security camera infrastructure across all campuses
The Outcome

Multiple confirmed phishing attempts blocked before payload click. Zero successful breaches across all campuses. Annual PCI scans pass clean. Kids' ministry stays safe and connected.

Running Today
GeekGuard ProtectMulti-Campus BackupManaged SOCDomain ManagementPhysical Security
CASE STUDY 03 Pharmaceutical / Diagnostic Lab · FDA-adjacent operations · Indianapolis, IN · Client since 2013

Two weeks. 31 critical security findings.
All remediated.

31 → 0
critical findings cleared
2 weeks
to full remediation
100%
tickets resolved <24hr
2.1hr
median ticket time
The Challenge

A pharmaceutical/diagnostic lab serving FDA-regulated clients had operations spanning a decade-plus, and during a recent comprehensive security review, JPtheGeek surfaced 31 distinct hardening opportunities — an inflated Domain Administrator count, user passwords set to never expire, insecure listening ports exposed externally, inactive computer accounts littering Active Directory, no redundant domain controller, and gaps in OU governance.

What We Did
  • Reduced Domain Admin count to a least-privilege baseline — only what each role actually needs
  • Enforced password rotation policy aligned with FDA CFR Part 11 expectations
  • Closed insecure listening ports; deployed application-aware firewall rules
  • Cleaned up Active Directory — removed inactive accounts, restructured organizational units
  • Stood up a redundant domain controller for high availability
  • Built a custom monitoring profile (GeekGuard Custom) tuned to lab-specific compliance needs
The Outcome

From a lab that wouldn't have passed a serious audit to one that's now continuously monitored, hardened, and compliance-ready — in under two weeks. Their next external assessment came back with zero critical findings.

Running Today
GeekGuard CustomContinuous RMMHardened ADRedundant Domain Controllers
CASE STUDY 04 K-12 Private Education · ~1,000 students · 50+ classrooms · Greenwood, IN · Client since 2018

Tech that keeps up with 1,000 students, 50+ classrooms,
and the school year that never sleeps.

7,800+
tickets resolved
113
hardware tickets (12mo)
49
onboarding/offboarding (12mo)
< 1hr
response on classroom outages
The Challenge

An Indiana private K-12 school managing technology for roughly a thousand students, 50+ classrooms, faculty laptops, classroom projectors, printers across multiple buildings, BYOD policies, online assessment platforms, and the perpetual cycle of new staff onboarding before each school year. Limited internal IT capacity. Real stakes — student data, FERPA, and the simple fact that broken tech disrupts education.

What We Did
  • Full managed cloud productivity & identity for education — accounts, MFA, conditional access, organizational-unit policies separating student and faculty access
  • Per-classroom asset management: every projector, every Chromebook, every desktop tracked
  • Pre-school-year onboarding sprint: 10–15 new hires set up with email, group memberships, and software installs in days, not weeks
  • Enterprise print management across the entire campus
  • Security awareness training for faculty — phishing simulations through our training portal
  • Endpoint security and active threat detection on every faculty/staff machine
  • Physical security camera infrastructure tied into central management
The Outcome

Faculty start each school year with working tech. Phishing attempts get caught before they reach the classroom. The school's IT footprint scaled with enrollment without scaling the IT budget. The administration calls one number — we handle the rest.

Running Today
GeekGuard PlusCloud Productivity MgmtEndpoint SecurityEnterprise Print MgmtPhysical SecurityAwareness Training
CASE STUDY 05 Professional Services / B2B Advisory · 100% cloud-native · fully remote-capable · Indianapolis, IN · Client since 2023

0 successful breaches in a 100% cloud-first business —
where 71% of all tickets are security events.

356
security events resolved (12mo)
71%
of all tickets are security
0
successful breaches
Hours
from breach disclosure to alert
The Challenge

A fully cloud-native Indianapolis professional services firm — Microsoft 365, SharePoint, OneDrive, no on-prem servers, fully remote-capable team. The challenge with cloud-first: every employee's M365 identity becomes the perimeter. A single compromised credential can mean SharePoint exfiltration, OneDrive data theft, or business email compromise — in minutes.

What We Did
  • Deployed SaaS-layer activity monitoring — every Microsoft 365 IAM event, policy change, file deletion, mass download, and compliance event monitored 24/7
  • Dark web scan integrated with their domain — when employee credentials show up in third-party breaches, we know within hours
  • Advanced endpoint detection & response on every device, including remote and personal-use machines
  • Active phishing reporting flow: any employee can report an email as phish with one click; our SOC investigates and shares the lesson with the org
  • Identity-first security: conditional access policies, MFA enforcement, geo-fencing on sensitive workloads
The Outcome

Multiple phishing attempts blocked before clicks. Multiple file-download anomalies investigated and shut down before exfiltration. Compromised passwords from third-party breaches caught via dark web monitoring before attackers could use them. Zero successful breaches.

Running Today
GeekGuard ProtectCloud Activity MonitoringAdvanced EDRDark Web MonitoringManaged SOCPhishing Response
CASE STUDY 06 Multi-Location Healthcare · 2 clinic locations · EHR-driven workflow · Greenwood & Franklin, IN · Client since 2020

Two locations. EHR uptime that doesn't quit.
HIPAA done right.

919
total tickets
32%
resolved < 1hr
0
ransomware incidents
0
HIPAA incidents
The Challenge

A multi-location Indiana healthcare practice with offices in two cities running an electronic health records (EHR) system, x-ray imaging, diagnostic equipment, point-of-sale, and a real concern about HIPAA exposure if patient data ever leaked. Healthcare downtime isn't an inconvenience — it's lost patient appointments and lost revenue, every hour.

What We Did
  • Managed cloud backup deployed with 24/7 monitoring — when a backup misses a window, we know in minutes (not when we discover the data is gone)
  • HIPAA-aligned password policies enforced and audited
  • Endpoint security with active threat detection — antivirus catching threats in real time and quarantining them before spread
  • Multi-location server replication so an outage at one office doesn't take down the other
  • EHR integration support — installation, troubleshooting, version compatibility for clinical software and equipment
  • Specialty clinical equipment integration — vendor coordination so the clinical team only has one number to call
  • Microsoft 365 license management with renewal monitoring — no surprise lapses
The Outcome

Multiple endpoint threat detections caught and quarantined automatically — including malware that would have hit patient records. Zero successful ransomware attacks. Zero HIPAA incidents. The clinical team has been able to grow patient volume without IT being the bottleneck.

Running Today
GeekGuardManaged Cloud BackupEndpoint Security (EDR + AV)Managed SOCMulti-Site ReplicationM365 License Mgmt
CASE STUDY 07 National Membership Organization HQ · Indianapolis HQ + 100+ chapters nationwide · Indianapolis, IN · Client since 2024

86% of all support tickets are security events.
That's how they want it.

86%
of tickets are security events
429
security events resolved (12mo)
78%
resolved < 24hr
0
successful breaches
The Challenge

The Indianapolis-based national headquarters of a 100+-chapter membership organization stewards decades of alumni records, active member data, donor information, chapter operational data, and financial records. They're the trustees of trust for tens of thousands of members across the country. A breach wouldn't just hurt the org — it would betray the lifelong members who trusted them with their data.

What We Did
  • Deployed cloud-layer activity monitoring across the entire Microsoft 365 tenant — file events, application events, IAM changes, policy events, and downloads logged and analyzed in real time
  • Advanced endpoint detection & response on every staff endpoint and laptop with automated threat response
  • Identity-first security: conditional access, MFA enforcement, risk-based policies tuned to actual usage patterns
  • Active phishing reporting workflow — one-click reporting from any inbox, our SOC investigates and clears across the org
  • Dark web monitoring on the org's domains
  • Tiered access controls separating financial systems, donor data, and member records
  • Chapter-network support: HQ staff supporting chapters in 50 states need clean, fast, secure remote access
The Outcome

The org runs national operations with the security posture you'd expect from a Fortune 500 — without the headcount to match. Member trust is preserved. Chapter operations stay connected. Phishing attempts get caught before clicks. Multiple file-event anomalies investigated and shut down before exfiltration. The leadership team gets to focus on member experience.

Running Today
Managed Services PlanCloud Activity MonitoringAdvanced EDRDark Web MonitoringIdentity-First SecurityPhishing Response
CASE STUDY 08 Pharmaceutical / Life Sciences Consulting · Serves major pharma manufacturers, biotechs & med-device firms · Franklin, IN · Client since 2023 · managed contract through 2028

The loudest endorsement an MSP can earn?
A quiet client who keeps renewing.

215
security events resolved (24mo)
93
phishing threats blocked (24mo)
Thru 2028
current managed contract term
0
successful breaches
The Challenge

A pharmaceutical and life sciences consulting firm whose clients include major pharmaceutical manufacturers, biotech innovators, and medical-device companies. They handle their clients' validation documentation, process designs, MES configurations, manufacturing IP, and FDA compliance work. Their IT exposure isn't first-degree — it's second-degree FDA exposure. An IT failure here cascades to their pharma clients' regulatory standing. The bar isn't "good security." It's "invisible security with zero downtime."

What We Did
  • Deployed GeekGuard Protect with full endpoint detection & response and managed antivirus across every machine
  • Active phishing defense pipeline — every reported email gets investigated, classified, and (if real) swept across the org within hours
  • Microsoft 365 risk-based conditional access — anonymized IP detections, anomalous logins, and unusual device patterns caught at the identity layer
  • Layered Microsoft 365 protection: document classification, file event monitoring, mail-flow rules tuned to consultancy-specific patterns
  • Account lifecycle automation: new consultant joins, account spun up; consultant leaves, account locked and data preserved
  • Long-term partnership posture: managed services contract locked in through 2028
The Outcome

The leadership team works on what they're paid for: helping pharmaceutical manufacturers solve hard validation, automation, and compliance problems. They don't think about IT. They don't worry about phishing campaigns sneaking through. They don't sweat over whether their security is current. JPtheGeek runs underneath — quietly — with the same discipline they bring to their pharma clients. The clearest signal of the relationship: they've already locked in their managed services contract through 2028. That's the loudest endorsement an MSP can earn — a quiet client who keeps renewing.

Running Today
GeekGuard ProtectEndpoint Security (EDR + AV)Microsoft 365 Conditional AccessMicrosoft 365 HybridPhishing Response PipelineAccount Lifecycle Automation
Real human is standing by

Want one of these stories to be yours?

Get a free, no-obligation audit. We'll show you exactly where you stand and what your story could look like.

No commitment No high-pressure pitch Real human, not a bot Response < 1hr