chat
expand_more

First-Rate Care, First-Rate Security: How Abnormal Overcame Proofpoint’s Shortcomings for a Leading Hospital System

Discover how Abnormal's AI helped a leading hospital system by detecting 2,181 malicious messages that Proofpoint missed.
February 5, 2025

About the Customer

  • Industry: Healthcare

  • Mailboxes: 51,800+

  • Email Infrastructure: Microsoft 365 E3 + Proofpoint Secure Email Gateway + Abnormal Human Behavior AI Platform

Customer Challenges: Concerns with Proofpoint's Secure Email Gateway

Abnormal transformed this award-winning hospital system’s overall security stack, offering more comprehensive protection and detecting advanced attacks that its Proofpoint SEG was failing to catch.

Positioned downstream in the mail flow, Abnormal detects only threats that bypass the gateway, capturing data that demonstrates the SEG’s shortcomings, including:

  • Detection Efficacy: During a three-month period, Abnormal detected 2,181 malicious messages that Proofpoint missed, including 1,177 credential phishing attacks. Abnormal also detected 21 account takeover cases where email accounts had been successfully compromised.

  • SOC Productivity Impact: Within this timeframe, employees reported 1,629 emails for review. Since each email takes an average of 15 minutes to manually review, the SOC faced a potential loss of up to 135 hours of productivity each month without AI-powered automatic remediation.

Abnormal’s Solution: Better Protection for Defense in Depth

With Abnormal’s AI fortifying its security framework, this leading healthcare provider has reduced its risk and boosted SOC productivity. Abnormal’s behavioral AI analyzes thousands of signals to baseline normal employee and vendor behavior and identifies high-risk anomalies with precision—protecting the organization from sophisticated attacks that traditional defenses like Proofpoint can miss.

  • Risk Avoidance: Based on the number of attacks identified for remediation, the average compromise rate Abnormal has observed for the customer’s industry segment*, and the average cost per incident**, the malicious emails missed by Proofpoint during the three-month period could have resulted in estimated potential annual losses of more than $1,000,000 if similar undetected attacks had continued at this pace.

  • Improved SOC Productivity: Abnormal’s AI Security Mailbox fully automated the handling of user-reported emails. Because each email previously required an average of 15 minutes of SOC analyst time to review, this freed up an average of 108 SOC hours per month during the one-quarter observation period.

Because of Abnormal, this major academic medical center can now feel more confident in its defense-in-depth security stack. Implementing the Abnormal Human Behavior AI Platform additional attacks are stopped and the SOC team is freed to focus on higher-priority tasks.

Find out why enterprises across industries are moving from Proofpoint to Abnormal. Get started with a demo today, and we’ll show you the proof of the Abnormal value.

Schedule a Demo

*Source: Abnormal Internal Operations Data

**Source: Average cost figures taken from the following third-party studies: NetDiligence Cyber Claims Study 2023 Report, 2023 Unit 42 Ransomware and Extortion Report, IBM Cost of a Data Breach, The Parallax View

First-Rate Care, First-Rate Security: How Abnormal Overcame Proofpoint’s Shortcomings for a Leading Hospital System

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B AI Use Cases
AI is another tool to combat cybersecurity threats. We dive into common uses and challenges of AI in cybersecurity and how Abnormal Security can help.
Read More
B Nonprofit Attack Trends Blog
Advanced email attacks on nonprofits surged 35% year-over-year. Learn why cybercriminals are targeting the sector and how to stay protected.
Read More
B PDF Annotations Mask Malicious QR Codes Blog
Attackers are exploiting PDF annotations to disguise phishing QR codes, bypassing security and deceiving users. Learn how this sophisticated threat works.
Read More
B Phishing Attacks
Discover the most common types of phishing attacks and their impacts. Learn how cybercriminals exploit deception to compromise security and steal sensitive information.
Read More
B Proofpoint Customer Story Blog 13
Learn how a trusted fuel and convenience retailer blocked 2,300+ attacks missed by Proofpoint and reclaimed 300+ employee hours per month by adding Abnormal.
Read More
B BEC in the Age of AI
Business email compromise (BEC) has seen growth due to criminals adopting AI tools. See the trends and discover how to protect your business from cybercriminals.
Read More