RFA Case Study

Grigoriy Milis’ story: 80% fewer phishing incidents for tenants using Radiant

Facing AI-powered phishing attacks targeting hundreds of financial clients, an MSSP’s CIO onboards a self-serve AI-powered solution for triage


Challenges

Thousands of alerts flooding the SOC

Sophisticated phishing attacks  bypassing traditional defenses

Slow triaging increases the window for end users to click on phishing emails

Solution

AI SOC platform enabling self-serve email triage with instant verdicts

Results

80% fewer phishing incidents for clients that use radiant

77% decrease in triage time 

Increased capacity  to handle additional types of use cases (i.e., IAM)

Impeccable security no longer depends on having experienced employees 24/7

Grigoriy Milis, CIO at the MSSP RFA, oversees cybersecurity operations for over 800 financial services organizations, an industry segment heavily targeted by phishing attacks. For the past 30 years, RFAs’ SOC team has worked 24/7, processing thousands of alerts monthly with excellence, yet now breach risks are lurking around every corner. Milis wasn’t going to let their reputation sink under his watch.

With phishing campaigns evolving dramatically, impeccable security no longer depended on having experienced employees 24/7; new vulnerabilities across the entire detection workflow needed to be addressed. 

First, relying on employee training as a first layer of defense was failing. The indicators employees had been taught to recognize, such as misspellings, formatting, and unfamiliar sender addresses, were no longer reliable. Even when employees did spot a suspicious email, they faced two poor options: report it and wait an hour or more for a SOC response, or simply click and see what happens. Too often, they chose the latter. 

Second, traditional detection tools were failing for the same reasons: the indicators determined to detect malicious cases were easily bypassable when it came to sophisticated AI attacks.

As a result, RFA’s SOC became the bearer of the entire load: detecting, investigating, and remediating threats, all while drowning in alerts.

“Slow triage of suspicious emails not only increased the risk of a breach but also increased the likelihood that end-users would click on risky email links.”

Grigoriy Milis
RFA

Grigoriy Milis

  • CIO
  • MSSP leadership
  • AI for phishing

New York, USA

300 employees

Managed Security Services

Challenges

Contextual intelligence: separating a successful MSSP from the rest

One key factor that separates top MSSPs from others is their understanding of their customers’ unique environments. Within any security use case, what seems abnormal in one organization can be completely normal in another. Consequently, MSSPs often escalate too many or too few alerts. In these cases, MSSPs observe low client satisfaction because nuances are either misunderstood or lost in communication. 

Milis understood this very well and sought specific requirements  from his triage solution:

  • Contextual understanding: Capability to understand nuanced context from 800+ organizations
  • Speed: Needs to boost both investigation and response
  • Breadth of coverage: Needs sophisticated alerts that have never seen before alerts

Milis understood that increasing headcount or relying on static SOAR automations were not options; therefore, his attention was focused on AI automation tools.

Goals & limitations
at a glance

Goals

  • Introduce a speedy workflow for phishing triage and response
  • Introduce a triage tool that can handle complex and unknown alerts
  • Improve capabilities to understand the organizational context of clients

Limitations

  • Complexity to understand 800+ unique client environments 

Solution

The tipping point

Assessing AI automation tools, the one tool that stood out for speed, contextual understanding, and breadth was Radiant Security. Radiant is uniquely positioned with an adaptive AI that triages sophisticated and unknown alerts with full context. It delivers investigations that are fully transparent and auditable.

“Radiant’s biggest strength is its ability to pull data from multiple sources and assemble a full incident picture in seconds.”

Surprising time to onboard: one new tenant = one hour max

Milis was surprised by Radiant Security’s speed and simplicity of provisioning a new client. For every new tenant, data sources were connected in a single click and went live in less than an hour.

Once deployed, Radiant transformed the email investigation workflow into a seamless, self-service experience for the tenant. Instead of submitting a ticket and waiting for SOC feedback, employees could now simply click the native “Report Email” button in their Outlook or Gmail. Radiant immediately acknowledges the email, triages it, and delivers a fully automated or 1 click executable remediation within minutes.

“Radiant allows us to triage a phishing incident with a single click: remove the email from inboxes, block the sender, and see instantly whether anyone clicked.”

800 tenants MSSP

80% less phishing alerts

-77% MTTR

Accelerating daily operations: triage time reduced  by 77%

Beyond email, Radiant significantly expanded the SOC team’s capacity to respond to other security events. Previously, investigating identity-related alerts required time-consuming manual analysis across client environments. Partnering with radiant changed that:

  • RFA gained access to relevant telemetry and contextual insights
  • Triage time reduced from 45 minutes to 10–15 minutes

RFA continued to accelerate, as analysts began automating more response workflows as they learned to trust Radiant’s AI and audited its transparent reasoning.

“What used to take 45 minutes now takes 10. That speed is critical; a faster response means significantly less risk.”

RFA discovers a unique selling point via their Radiant-powered self-serve interface for emails

Milis saw an opportunity in the market. By deploying Radiant across his client base, RFA could offer something most competitors couldn’t: an intuitive self-serve interface that delivers instant verdicts. RFA began leveraging this as a selling point, placing them ahead of competitors still relying on traditional SOC models.

“We see self-service as a differentiating component.”

Impact on Daily operations at a glance

  • Triage time cut from 45 to 10–15 minutes
  • Complete visibility into AI reasoning for every verdict
  • Increased capacity to respond to additional security events
  • Under one hour to onboard tenants, immediate self-serve triage capability

Results

Speed, client satisfaction & differentiation

RFA’s partnership with Radiant Security delivered both operational efficiency and threat mitigation. Moreover, it gave RFA a competitive edge that equipped them with a modern interface that their competitors didn’t offer.

“As much as I would like to keep Radiant a secret for my own competitive advantage, I would definitely recommend it to any MSSP who is serious about their cybersecurity.”

Results at a glance

  • 80% reduction in phishing incidents among tenants using Radiant
  • Triage time reduced by 77%
  • Increased capacity: Coverage of more security use cases, such as identity
  • Enhanced client satisfaction with a more responsive, proactive security posture

Proven results from the field

MSSP: 80% fewer phishing incidents per tenant

With phishing campaigns evolving dramatically, impeccable security no longer depends on having experienced employees 24/7.

Automating tier 1 workload freed up 200-300 hours monthly

When sensitive partnerships demanded the highest security standards, it was time to deliver detection speed 10x over industry average with an agentic AI platform.

An MSSP’s shift to AI SOC saved them >$10M per tenant

MSSP automates triage and response and achieves 100% alert coverage across all clients, while saving millions 

Reduced MTTR
from days to hours

Kyowa Kirin automated triage and investigation of tier-1 alerts by using AI

Saved hundreds of hours
monthly on tier-1 triage

AI SOC analysts freed Spellman engineers to work on proactive security

Boosted human analyst
productivity by 1,000%

AI-powered triage allowed SPoC to focus on real threats

Cut phishing attacks by 80%

AI enabled RFA to deliver self-serve triage with far fewer incidents

Finally, an AI that
triages all your alerts

A short demo can save your team 1000s of wasted hours

See what your SOC could look like:

See what your SOC could look like:

Radiant Security is an unbounded AI SOC platform built to triage every alert that hits your SOC. It automates investigation across 100% of alert types and escalates only real threats to analysts, who can then respond in one click. Radiant’s integrated log management analyzes and stores all your security logs without the SIEM tax.

© Radiant Security, Inc. 2026.

Radiant Security is an unbounded AI SOC platform built to triage every alert that hits your SOC. It automates investigation across 100% of alert types and escalates only real threats to analysts, who can then respond in one click. Radiant’s integrated log management analyzes and stores all your security logs without the SIEM tax.

© Radiant Security, Inc. 2026.