Abnormal Security: Stop Business Email Compromise - Abnormal Security

Microsoft and Abnormal have joined forces to bring next-generation email security to enterprises. Learn more here.

Microsoft and Abnormal have joined forces to bring next-generation email security to enterprises. Learn more here.

Complete Email Security with Abnormal

The next generation of email security for today’s cloud office environments.

Abnormal uses AI to compute Business Insights: a deep understanding of your organization. Applying behavioral anomaly detection to these Business Insights, Abnormal stops BEC and detects account compromises that lead to the most advanced social engineering attacks.

Abnormal uses AI to compute Business Insights: a deep understanding of your organization. Applying behavioral anomaly detection to these Business Insights, Abnormal stops BEC and detects account compromises that lead to the most advanced social engineering attacks.

Recognized as the industry leader in AI powered cyber security

Recognized as the industry leader in AI powered cyber security CB Insights
Most Promising AI Firms Forbes 2020 AI 50
Gartner Cool Vendor 2020

Available in Azure Marketplace and via Microsoft Sellers

Recognized as the industry leader in AI powered cyber security

Recognized as the industry leader in AI powered cyber security CB Insights
Most Promising AI Firms Forbes 2020 AI 50
Gartner Cool Vendor 2020
Available in Azure Marketplace and via Microsoft Sellers
Available in Azure Marketplace and via Microsoft Sellers

Available in Azure Marketplace and via Microsoft Sellers

What Makes Abnormal Unique?

Cloud-Native Architecture

Abnormal integrates directly into Microsoft 365 APIs. Unlike email gateways, Abnormal:

  • Deploys in seconds without disrupting existing security controls or changing mailflow
  • Leverages non-email data: identity, calendar, contacts, collaboration tools, event logs, in addition to ERP, HRIS systems and more
  • Seamless integration to your existing security stack: SIEM, SOAR, detection tools, and ticketing systems

Business Insights

No configuration required. Abnormal learns your organization, gaining the required context to stop socially engineered email attacks.

  • Unified profile of each person, containing thousands of dimensions of attributes, behavioral norms and predictions
  • Maps the internal and cross-functional relationships and captures tribal knowledge of organization processes
  • Global, federated supply chain graph of hundreds of thousands of business entities for real-time risk assessment of 3rd-parties

Anomalous Behavior Detection

Abnormal detects anomalies by comparing individual and sequences of events against behavioral norms to determine level of risk.

  • Abnormal detects anomalies by comparing individual and sequences of events against behavioral norms to determine level of risk.
  • Stop socially engineered attacks and attacks from compromised accounts
  • Explainable AI ensures the results of the decision engine can be understood and trusted by your team

Cloud-Native Architecture

Abnormal integrates directly into Microsoft 365 APIs. Unlike email gateways, Abnormal:

  • Deploys in seconds without disrupting existing security controls or changing mailflow
  • Leverages non-email data: identity, calendar, contacts, collaboration tools, event logs, in addition to ERP, HRIS systems and more
  • Seamless integration to your existing security stack: SIEM, SOAR, detection tools, and ticketing systems

Business Insights

No configuration required. Abnormal learns your organization, gaining the required context to stop socially engineered email attacks.

  • Unified profile of each person, containing thousands of dimensions of attributes, behavioral norms and predictions
  • Maps the internal and cross-functional relationships and captures tribal knowledge of organization processes
  • Global, federated supply chain graph of hundreds of thousands of business entities for real-time risk assessment of 3rd-parties

Anomalous Behavior Detection

Abnormal detects anomalies by comparing individual and sequences of events against behavioral norms to determine level of risk.

  • Abnormal detects anomalies by comparing individual and sequences of events against behavioral norms to determine level of risk.
  • Stop socially engineered attacks and attacks from compromised accounts
  • Explainable AI ensures the results of the decision engine can be understood and trusted by your team
Abnormal Security is the Next Generation of Email Security

Abnormal Security completes your Office 365 deployment by using AI to compute a deep understanding of the people in your enterprise. Abnormal’s anomalous behavior detection is the most effective way to detect account compromise and stop socially engineered email attacks such as BEC.

Abnormal Security is the Next Generation of Email Security

Abnormal Security completes your Office 365 deployment by using AI to compute a deep understanding of the people in your enterprise. Abnormal’s anomalous behavior detection is the most effective way to detect account compromise and stop socially engineered email attacks such as BEC.

How Enterprises use Abnormal Security with Office 365 and G Suite

Protect Against Advanced Email Attacks

Business Email Compromise

Executive and Employee Impersonations
Spear-phishing and Credential Phishing
Supply chain attacks / Invoice Fraud
Internal Phishing
Teams Protection
Protect Against Advanced Email Attacks
How Enterprises use Abnormal Security with Office 365 and G Suite

Business Email Compromise

Executive and Employee Impersonations
Spear-phishing and Credential Phishing
Supply chain attacks / Invoice Fraud
Internal Phishing
Teams Protection
How Enterprises use Abnormal Security with Office 365 and G Suite
Protect Against Advanced Email Attacks
  • Business Email Compromise
  • Executive and Employee Impersonation
  • Spear-phishing and Credential Phishing
  • Supply chain attacks / Invoice Fraud
  • Internal Phishing
  • Microsoft Teams Protection
How Enterprises use Abnormal Security with Office 365 and G Suite

Identify and Resolve
Account Compromise

Email Account Compromise Detection
Vendor Compromise Detection
Customer Compromise Detection
Compromised Account Remediation
Identify and Resolve Account Compromise
Identify and Resolve Account Compromise
Email Account Compromise Detection
Vendor Compromise Detection
Customer Compromise Detection
Compromised Account Remediation
Identify and Resolve Account Compromise
  • Email Account Compromise Detection
  • Vendor Compromise Detection
  • Customer Compromise Detection
  • Compromised Account Remediation

Automate Response to Email Attacks and Account Compromise

Automatically triage End User reported threats
Automated email attack campaign clustering

Auto-remediate emails from inboxes

Reset passwords or trigger response workflow & tickets
Auto-remediate emails from 3rd-party detection tools
Automate Response to Email Attacks and Account Compromise
Automate Response to Email Attacks and Account Compromise
Automate Response to Email Attacks and Account Compromise
Automatically triage End User reported threats
Automated email attack campaign clustering

Auto-remediate emails from inboxes

Reset passwords or trigger response workflow & tickets
Auto-remediate emails from 3rd-party detection tools
Automate Response to Email Attacks and Account Compromise
Automate Response to Email Attacks and Account Compromise
  • Automatically triage End User reported threats
  • Automated email attack campaign clustering
  • Auto-remediate emails from inboxes
  • Reset passwords or trigger response workflow & tickets
  • Auto-remediate emails from 3rd party detection tools
Automate Response to Email Attacks and Account Compromise

We identified socially-engineered email attacks as our number one security risk. We selected Abnormal Security based on the innovative way it uses data science married with behavioral and predictive analytics to prevent attacks before they happen.

Dr. Alissa Abdullah aka “Dr. Jay”

Fmr. CISO at Xerox

Abnormal Security has removed my biggest cybersecurity concerns. If we were to suffer a supply chain attack, the damage extends beyond just the financial impact - but strikes at the core of our growth - to move and adapt quickly to a dynamic market. Abnormal Security isn’t just protecting us, it’s an enabler for our growth strategy.

Justin Yoshimura

CEO at CSC Generation

Adopting Abnormal Security is one of our key successes of 2019, and our execs talked about it at our last town hall. We look forward to continuing to expand on those successes with Abnormal in place.

Director of Cyber Operations

F500 Technology Company

If I had to say one thing it's Abnormal...It'd be the best five minutes of integration effort that you've ever had to return on investment because it's just so clear and direct from what we've experienced.

Dean Perrine

SVP, Deputy CISO at Fox

We identified socially-engineered email attacks as our number one security risk. We selected Abnormal Security based on the innovative way it uses data science married with behavioral and predictive analytics to prevent attacks before they happen.

Dr. Alissa Abdullah aka “Dr. Jay”

Fmr. CISO at Xerox

Abnormal Security has removed my biggest cybersecurity concerns. If we were to suffer a supply chain attack, the damage extends beyond just the financial impact - but strikes at the core of our growth - to move and adapt quickly to a dynamic market. Abnormal Security isn’t just protecting us, it’s an enabler for our growth strategy.

Justin Yoshimura

CEO at CSC Generation

Adopting Abnormal Security is one of our key successes of 2019, and our execs talked about it at our last town hall. We look forward to continuing to expand on those successes with Abnormal in place.

Director of Cyber Operations

F500 Technology Company

Want to learn more?

Schedule a personalized product demo to see:

  • Threat analytics, insights and reporting
  • Automated Triage, Investigation and response tools
  • Platform integrations into SIEM, SOAR
  • …and more

Want to learn more?

Schedule a personalized product demo to see:

  • Threat analytics, insights and reporting
  • Automated Triage, Investigation and response tools
  • Platform integrations into SIEM, SOAR
  • …and more