Customer Communication Leads to Continuous Product Innovation

January 18, 2022

Here at Abnormal, our product management team continuously looks for ways on how they can make incremental improvements that compound over time and lead to even better customer experiences. Plus, our entire team is abnormally focused on our customers and takes their feedback seriously. As a result, we’ve implemented many refinements in our latest product update to address even the most nuanced improvements suggested by our customers.

Here are some of the latest customer-driven improvements.

Threat Log Exports Increased to 90 Days

We have increased our 30-day export to 90 days to more effectively support our customers with quarterly reporting requirements. Customers can now download a spreadsheet of threat log data matching any filtering criteria in a comma-separated values (CSV) file for offline analysis and archival purposes.

Abnormal Threat Log data dashboard
Threat log data can now be exported up to 90 days from within the portal with the click of a button.

If continual data exports and offline analysis is your primary use case, we recommend integrating Abnormal into your existing SIEM infrastructure to automate the operation.

Streamlined Operations: Search and Respond Speed Improvement

Abnormal has decreased the response time by 60%, now providing instant results in mere seconds. The speed improvements help IT security and messaging teams locate messages and remediate them more quickly. Customers of Microsoft 365 and Google Workspace can use Search and Respond to find and delete messages with only a few clicks.

Our Search and Respond functionality enhances Microsoft 365 with rapid results for the last 30 days of email messages in seconds. Through our customer research, we found that approximately 92% of our customer’s searches were done within the first 30 days which means the majority of messages can be instantly retrieved. In the rarer circumstance where customers need to locate older messages, usually for investigations, we are fully integrated with Microsoft and can perform a full search to locate data within Microsoft’s store, as far back as the data retention policy is configured all from a unified interface.

These features can be useful in security and compliance scenarios, including:

  • When an employee unintentionally sends a critical internal communication.
  • When an employee is unsure where a message is located.
  • When harmful or undesirable mail gets past email security solutions in extremely rare circumstances.

Admins can search by fields like sender, recipient, and subject, and see a list of messages that were sent and the metadata contained in them, and view message bodies and headers. From there, admins can choose to remediate those messages.

Abnormal security email search and respond dashboard
Abnormal Search and Respond removing a misdirected email.

Streamlined Operations: Threat Log Navigation Enhancement

Users can now navigate via convenient arrow keys to swipe through the threat log details page to rapidly locate the most recent or older email campaigns. Customers benefit from increased productivity and control as messaging admins or IT security analysts navigate between email campaigns to complete investigations and identify attacks requiring significantly less time and clicks.

Improving Customer Satisfaction, One Feature at a Time

We aim to have open and transparent communications with our customers and relentlessly work to continually improve and expand our product capabilities. Together, we can solve the problem that matters most, which is providing the highest level of protection for all email threats. If you’re a current customer who would like to request a new feature, please reach out to your Customer Success representative.

Not yet an Abnormal customer? Request a demo today to learn how Abnormal can enhance your email security capabilities and provide visibility into email threats that other solutions miss.

Image

Prevent the Attacks That Matter Most

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

0
Demo 2x 1

See the Abnormal Solution to the Email Security Problem

Protect your organization from the attacks that matter most with Abnormal Integrated Cloud Email Security.

Related Posts

B 10 3 22 Cobalt Terrapin Blog
Threat group Cobalt Terrapin uses sophisticated impersonation techniques with multiple steps to commit invoice fraud.
Read More
B 09 29 22 CISO Cybersecurity Awareness Month
October is here, which means Cybersecurity Awareness Month is officially in full swing! These five tips can help security leaders take full advantage of the month.
Read More
B Email Security Challenges Blog 09 26 22
Understanding common email security challenges caused by your legacy technology will help you determine the best solution to improve your security posture.
Read More
B 5 Crucial Tips
Retailers are a popular target for threat actors due to their wealth of customer data and availability of funds. Here are 5 cybersecurity tips to help retailers reduce their risk of attack.
Read More
B 3 Essential Elements
Legacy approaches to managing unwanted mail are neither practical nor scalable. Learn the 3 essential elements of modern, effective graymail management.
Read More
B Back to School
Discover how threat group Chiffon Herring leverages impersonation and spoofed email addresses to divert paychecks to mule accounts.
Read More
B 09 06 22 Rearchitecting a System Blog
We recently shared a look at how the Abnormal engineering team overhauled our Unwanted Mail service architecture to accommodate our rapid growth. Today, we’re diving into how the team migrated traffic to the new architecture—with zero downtime.
Read More
B Industry Leading CIS Os
Stay up to date on the latest cybersecurity trends, industry news, and best practices by following these 12 innovative and influential thought leaders on social media.
Read More
B Podcast Engineering 11 08 24 22
In episode 11 of Abnormal Engineering Stories, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, continues his conversation with Zehan Wang, co-founder of Magic Pony.
Read More