Announcing ICES, Your Integrated Cloud Email Security Platform

October 4, 2021

Advanced email attacks that use social engineering are more prevalent than ever, accounting for nearly half of all cybercrime losses in 2020. Unfortunately, secure email gateways are unable to stop them, as they do not contain traditional indicators of compromise like malicious attachments or suspicious links, and they are launched from known domains.

Because these attacks prey on human emotions, often containing urgent language from high-profile executives or known vendors, they are highly effective at tricking people into sending money, paying fake invoices, or providing access to sensitive information. Abnormal was built to stop these attacks, and we’ve been highly successful since we launched our platform nearly two years ago. We now protect enterprises worldwide, including 100% of employees at 5% of the Fortune 1000.

The Abnormal Integrated Cloud Email Security Platform

That said, there was more work to be done, as we searched for better ways to protect our customers from the types of attacks that lead to severe financial losses and reputational damage. We’ve been working on something big, and I am delighted to share with you our next major release—the Abnormal Integrated Cloud Email Security (ICES) platform.

We’ve significantly advanced our capabilities with today’s introduction. Abnormal ICES offers all-in-one email security, delivering a precise approach to combat the full spectrum of email-borne threats. Powered by behavioral AI technology and deeply integrated with Microsoft 365 (and soon, Google Workspace), Abnormal ICES allows you to simplify your email security architecture, expand your protection, improve employee productivity, and streamline operations and reporting.

Key Benefits of the Abnormal Integrated Cloud Email Security Platform

Our latest product innovation offers unique value to our customers while protecting you from the full spectrum of email-based threats.

Remove Secure Email Gateways and Simplify Your Email Security Architecture

Organizations that want comprehensive inbound email protection are often stuck with multiple products, incompatible architectures, unnecessary expenses, and management overhead. They often disable Microsoft 365’s native protection to avoid any conflict between spam management, to prevent sender authentication failure, and to avoid juggling multiple dashboards.

Seg before ices

This architecture does little to protect them from the most nefarious email attacks, including external and lateral phishing, employee and VIP impersonation, invoice and payment fraud, vendor email compromise, cloud account takeover, and other socially-engineered attacks. According to the FBI, 44% of all cybercrime losses in 2020 were due to business email compromise, and this number continues to grow year-over-year.

Now, organizations can simplify their stack by eliminating the redundant email gateway layer, and re-enabling and enhancing Microsoft’s cloud gateway capabilities. Abnormal ICES will unify your entire inbound email security defenses, from email hygiene to zero-day advanced attacks.

Ices after ices

Expand Protection to Handle Spam and Malware, Reduce Inbox Clutter Due to Graymail

Our customers have recognized Abnormal for its superior ability to block the full spectrum of email attacks. By applying the same behavioral, data science-based approach to spam and graymail we are able to increase your end-users’ productivity by providing the highest efficacy detection and keeping their inboxes free of unwanted email. Further, our API-driven approach allows us to tailor this detection on a per-user basis enabling us to understand what types of messages are relevant to your end-users, and what is not.

Spam graymail ices

ICES also delivers a new approach for detecting malware attacks using behavioral analysis, and improves detection of targeted phishing and social engineering attacks. Abnormal ICES is the only cloud-native solution to defend against all email attacks, including external and lateral phishing, employee and VIP impersonation, invoice and payment fraud, vendor email compromise, cloud account takeover, malware and ransomware, spam, and graymail.

Improve Employee Productivity and Modernize Their Experience

Abnormal ICES puts an end to spam digests and portals, bringing in a fresh, new consumer-grade experience to corporate email. End users no longer have to leave Outlook or their mobile mail client. The ICES platform learns each end user’s preference as they move emails between inbox, spam, and promotional folders, and automatically creates and manages individualized safe and blocklists. This enables ICES to deliver incoming emails directly into their appropriate folders.

Spam graymail learn ices

And that’s not all. We know that not all emails and URLs are malicious. Yet secure email gateways rewrite every URL because of their inability to detect some of these advanced attacks at time of delivery. ICES only rewrites suspicious URLs within emails that look like borderline attacks. With this selective approach to URL rewriting, security teams will find that end users will no longer need to whitelist URLs or complain about getting stuck on a web page that blocked access to a legitimate site. Plus, security teams can focus on reviewing interactions with only those URLs that are deemed suspicious.

Suspicious urls ices

With these new capabilities, ICES dramatically improves end user experience and productivity.

Streamline Operations and Reporting. Less Effort. Better Insights. Greater Impact.

You will no longer need to juggle between dashboards to gather email security insights and reports to better understand your overall email security posture. A consolidated, single-pane-of-glass dashboard across both Microsoft and Abnormal provides a 360-degree view of the entire email stream.

Dashboard ices

ICES centralizes insights, and actions—from edge protection, spam, and malware right down to user-reported email attacks—and the management of global blocklists, across hundreds of tenants, for both Microsoft and Google environments, upon a single pane of glass.

Abnormal ICES is the only cloud-native solution to defend against all email attacks, including external and lateral phishing, employee and VIP impersonation, invoice and payment fraud, vendor email compromise, cloud account takeover, malware and ransomware, and spam and graymail.

We’re thrilled to launch the product, and we can’t wait to see what you think.

Interested in learning more about the new Abnormal ICES platform? Request a demo today.

Previous
Cover cybersecurity month kickoff
It’s time to turn the page on the calendar, and we are finally in October—the one month of the year when the spooky becomes reality. October is a unique juncture in the year as most companies are making the mad dash to year-end...
Read More
Next
Account takeover cover
Account takeovers are one of the biggest threats facing organizations of all sizes. They happen when cybercriminals gain legitimate login credentials and then use those credentials to send more attacks, acting like the person...
Read More

Related Posts

Blog hiring cybersecurity leaders
As with every equation, there are always two sides and while it can be easy to blame users when they fall victim to scams and attacks, we also need to examine how we build and staff security teams.
Read More
Cover automated ato
With an increase in threat actor attention toward compromising accounts, Abnormal is focused on protecting our customers from this potentially high-profile threat. We are pleased to announce that our new Automated Account Takeover (ATO) Remediation functionality is available.
Read More
Email spoofing cover
Email spoofing is a common form of phishing attack designed to make the recipient believe that the message originates from a trusted source. A spoofed email is more than just a nuisance—it’s a malicious communication that poses a significant security threat.
Read More
Cover cybersecurity month kickoff
It’s time to turn the page on the calendar, and we are finally in October—the one month of the year when the spooky becomes reality. October is a unique juncture in the year as most companies are making the mad dash to year-end...
Read More
Ices announcement cover
Abnormal ICES offers all-in-one email security, delivering a precise approach to combat the full spectrum of email-borne threats. Powered by behavioral AI technology and deeply integrated with Microsoft 365...
Read More
Account takeover cover
Account takeovers are one of the biggest threats facing organizations of all sizes. They happen when cybercriminals gain legitimate login credentials and then use those credentials to send more attacks, acting like the person...
Read More
Blog podcast green cover
Many companies aspire to be customer-centric, but few find a way to operationalize customer-centricity into their team’s culture. As a 3x SaaS startup founder, most recently at Orum, and a veteran of Facebook and Palantir, Ayush Sood...
Read More
Blog attack atlassian cover
Credential phishing links are most commonly sent by email, and they typically lead to a website that is designed to look like common applications—most notably Microsoft Office 365, Google, Amazon, or other well-known...
Read More
Blog podcast purple cover
Working at hyper-growth startups usually means that unreasonable expectations will be thrust on individuals and teams. Demanding timelines, goals, and expectations can lead to high pressure, stress, accountability, and ultimately, extraordinary growth and achievements.
Read More
Blog yellow skyline
No one wants to receive an email from human resources that they aren’t expecting. After all, that usually means bad news. And when we think there may be bad news, cybersecurity training tends to fall by the wayside. Threat actors know this, and they’re taking advantage of human emotions.
Read More
Blog rising building
There is little doubt that business email compromise and other advanced email threats are causing significant damage–both financial and reputational—to organizations worldwide. Because these never-before-seen attacks contain few indicators of compromise, they evade secure email gateways and other traditional email infrastructure...
Read More
Blog purple person outline
Identity theft is not a joke, impacting more than 14 million people each year in the United States alone. Over the course of their lifetime, nearly one-third of all people will become victims of identity theft—often as a result of a corporate data breach. Once attackers have access to identifying information like your full name, address, date of birth, and/or social security number...
Read More