chat
expand_more

ESG Technical Validation of Abnormal Security: Key Takeaways

ESG’s technical validation proves the risk reduction capabilities of Abnormal Cloud Email Security.
January 17, 2023

When it comes to selecting the right cybersecurity solution for your organization, there are several factors to consider, but first and foremost—does the technology really work? It’s easy for companies to boast the quality of their software, but that holds very little value to security leaders who are trying to decide between a dozen different providers. So, instead of us talking about Abnormal’s capabilities, we’ll let you take a look at a third-party validation proving that our solution does what we say it does.

The Enterprise Strategy Group (ESG) Technical Validation of Abnormal is a commissioned analyst report distributed under license from TechTarget, Inc. ESG evaluated the Abnormal Cloud Email Security platform to examine how Abnormal Behavior Technology (ABX) can protect organizations from socially engineered attacks that bypass traditional email security solutions. ESG focused specifically on Abnormal’s API integration, behavioral AI capabilities, and VendorBase to determine efficacy.

Here are a few key takeaways from this report.

Abnormal’s API integration is Fast and Easy to Set Up

Enterprise Strategy Group (ESG) research has found that the high resource cost of remediation is one of the most common impacts of security incidents cited by organizations. Adding to the burden of an already overworked security team will not lead to optimal results. ESG validated Abnormal's API integration's ease of use and speed. A couple of clicks and an OAuth authorization is all that is needed to get started.

ESG Blog1

While this saves time and effort, since administrators don’t need to configure complicated rules and policies or make any changes to MX records (like they would with traditional security solutions), this isn’t the whole story. Once Abnormal is connected to the cloud email service, it has visibility to correlate user identity and behavior indicators with signals in email content and east-west traffic communication.

In practice, Abnormal is detecting missed attacks within hours of deployment—without requiring security professionals to manage the platform after integration.

Abnormal’s Advanced Machine Learning Algorithms Find and Remediate Difficult-to-Detect Email Attacks

In today's world, social engineering over email is prevalent, and it is effective. Eloquent emails sent from a trusted email address can be malicious and incredibly difficult to detect by both tools and end users. ESG observed how Abnormal’s advanced machine learning algorithms analyzed several factors that may be overlooked and used them to determine abnormal email activity.

ESG Blog2

Abnormal can find and remediate difficult-to-detect email attacks that may otherwise look legitimate and evade traditional detection methods. These emails are less frequent but can be the costliest for organizations. Detecting these gives companies incredible value and ensures that their users do not have to make decisions on the legitimacy of each email.

Abnormal Protects Customers From Compromised Vendors Through VendorBase

Email attacks are dangerous due to their unpredictable nature. With early threat detection, companies can anticipate and prepare for future attacks to avoid devastating losses. Enterprise Strategy Group (ESG) reviewed the VendorBase maintained by Abnormal. This federated database contains data collected from all Abnormal customers and helps to determine the relative risk of each vendor—especially useful as threat actors are increasingly using vendor relationships to initiate attacks.

ESG Blog3

Using advanced risk data, companies can be alerted to compromised vendor emails and inform their vendors about potential risks. In turn, when suspicious emails are detected by Abnormal for one customer, that vendor risk score is updated across all customers to help others within the Abnormal community.

Why This Matters

In recent years, social engineering through email has become one of the most dangerous attack vectors. Socially engineered emails impersonate legitimate vendors or members of the executive team in order to steal credentials, data, or money. And because they rarely contain traditional indicators of compromise, they can be incredibly difficult to detect.

ESG’s validation of Abnormal Cloud Email Security demonstrates its efficacy and value in protecting end-users from business email compromise and other advanced email attacks. View and download the full report here to discover why ESG believes that you should consider the risk reduction capabilities of Abnormal Cloud Email Security.

Interested in learning more about how Abnormal can protect your organization? Schedule a demo below.

Schedule a Demo
ESG Technical Validation of Abnormal Security: Key Takeaways

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B Proofpoint Customer Story F500 Insurance Provider
A Fortune 500 insurance provider blocked 6,454 missed attacks and saved 341 SOC hours per month by adding Abnormal to address gaps left by Proofpoint.
Read More
B Malicious AI Platforms Blog
What happened to WormGPT? Discover how AI tools like WormGPT changed cybercrime, why they vanished, and what cybercriminals are using now.
Read More
B MKT748 Open Graph Images for Cyber Savvy 7
Explore insights from Brian Markham, CISO at EAB, as he discusses cybersecurity challenges, building trust in education, adapting to AI threats, and his goals for the future. Learn how he and his team are working to make education smarter while prioritizing data security.
Read More
B Manufacturing Industry Attack Trends Blog
New data shows a surge in advanced email attacks on manufacturing organizations. Explore our research on this alarming trend.
Read More
B Dropbox Open Enrollment Attack Blog
Discover how Dropbox was exploited in a sophisticated phishing attack that leveraged AiTM tactics to steal credentials during the open enrollment period.
Read More
B AISOC
Discover how AI is transforming security operation centers by reducing noise, enhancing clarity, and empowering analysts with enriched data for faster threat detection and response.
Read More