Launching Multi-Tenant Support for Abnormal Abuse Mailbox

Abnormal Abuse Mailbox from Abnormal Security is a product that is designed to collect, collate, and automate the handling of phishing, spam, and other user-reported messages. With Abnormal Abuse Mailbox, SOC teams report saving multiple hours each day...
November 19, 2020

Abnormal Abuse Mailbox from Abnormal Security is a product that is designed to collect, collate, and automate the handling of phishing, spam, and other user-reported messages. With Abnormal Abuse Mailbox, SOC teams report saving multiple hours each day, as they no longer need to manually triage all those “Abuse” messages reported by end users. Most customers have single-tenant operations with a single “Abuse” Mailbox for all employees. However, for those customers that have a more complex multi-tenant deployment, Abnormal now supports multi-tenant Abuse Mailbox setups.

Abuse mailbox multi tenant

Customers who have multiple tenants while leveraging a unified phishing mailbox can now set up Abnormal Abuse Mailbox without altering their workflow. Abnormal automatically extracts abuse reports, regardless of their tenant origination, and performs search operations to identify other messages sitting in Inboxes that belong to the same campaign. Furthermore, Abnormal Abuse Mailbox will automatically remediate these campaigns across all tenants. As a result, customers can benefit from increased visibility and coverage when looking at abuse reports cross-tenant with minimal operational intrusion.

See how Abnormal Abuse Mailbox can work for your environment by requesting a demo today.

Launching Multi-Tenant Support for Abnormal Abuse Mailbox

See Abnormal in Action

Schedule a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
 
Integrates Insights Reporting 09 08 22

Related Posts

B Firebrick Ostrich Blog
Discover how Firebrick Ostrich uses open-source intelligence to run their BEC scams in these supply chain compromise examples.
Read More
B 1 30 23 Product Recap
This winter, Abnormal added three new Knowledge Bases, multi-tenant management, and more to protect cloud users against email platform attacks.
Read More
B Artificial Intelligence Address Email Threats
In part 3 of our 5-part series, Ed Amoroso discusses how artificial intelligence (AI) technology is particularly useful for reducing cyber risks to cloud email.
Read More
CFO2 B
CFO Adam Meister of Clari discusses cybersecurity spending and risk tolerance amid unpredictable economic shifts.
Read More
SEG
Secure email gateways (SEGs) have proven effective in the past, but they are ineffective against modern social engineering tactics and targeted email threats.
Read More
B 1500x1500 Knowledge Base People Base L1 R1
Discover how Abnormal uses contextual, behavioral data to uncover anomalous activity across logins and devices with PeopleBase.
Read More