ESG Technical Validation of Abnormal Security: Key Takeaways

ESG’s technical validation proves the risk reduction capabilities of Abnormal Cloud Email Security.
January 17, 2023

When it comes to selecting the right cybersecurity solution for your organization, there are several factors to consider, but first and foremost—does the technology really work? It’s easy for companies to boast the quality of their software, but that holds very little value to security leaders who are trying to decide between a dozen different providers. So, instead of us talking about Abnormal’s capabilities, we’ll let you take a look at a third-party validation proving that our solution does what we say it does.

The Enterprise Strategy Group (ESG) Technical Validation of Abnormal is a commissioned analyst report distributed under license from TechTarget, Inc. ESG evaluated the Abnormal Cloud Email Security platform to examine how Abnormal Behavior Technology (ABX) can protect organizations from socially engineered attacks that bypass traditional email security solutions. ESG focused specifically on Abnormal’s API integration, behavioral AI capabilities, and VendorBase to determine efficacy.

Here are a few key takeaways from this report.

Abnormal’s API integration is Fast and Easy to Set Up

Enterprise Strategy Group (ESG) research has found that the high resource cost of remediation is one of the most common impacts of security incidents cited by organizations. Adding to the burden of an already overworked security team will not lead to optimal results. ESG validated Abnormal's API integration's ease of use and speed. A couple of clicks and an OAuth authorization is all that is needed to get started.

ESG Blog1

While this saves time and effort, since administrators don’t need to configure complicated rules and policies or make any changes to MX records (like they would with traditional security solutions), this isn’t the whole story. Once Abnormal is connected to the cloud email service, it has visibility to correlate user identity and behavior indicators with signals in email content and east-west traffic communication.

In practice, Abnormal is detecting missed attacks within hours of deployment—without requiring security professionals to manage the platform after integration.

Abnormal’s Advanced Machine Learning Algorithms Find and Remediate Difficult-to-Detect Email Attacks

In today's world, social engineering over email is prevalent, and it is effective. Eloquent emails sent from a trusted email address can be malicious and incredibly difficult to detect by both tools and end users. ESG observed how Abnormal’s advanced machine learning algorithms analyzed several factors that may be overlooked and used them to determine abnormal email activity.

ESG Blog2

Abnormal can find and remediate difficult-to-detect email attacks that may otherwise look legitimate and evade traditional detection methods. These emails are less frequent but can be the costliest for organizations. Detecting these gives companies incredible value and ensures that their users do not have to make decisions on the legitimacy of each email.

Abnormal Protects Customers From Compromised Vendors Through VendorBase

Email attacks are dangerous due to their unpredictable nature. With early threat detection, companies can anticipate and prepare for future attacks to avoid devastating losses. Enterprise Strategy Group (ESG) reviewed the VendorBase maintained by Abnormal. This federated database contains data collected from all Abnormal customers and helps to determine the relative risk of each vendor—especially useful as threat actors are increasingly using vendor relationships to initiate attacks.

ESG Blog3

Using advanced risk data, companies can be alerted to compromised vendor emails and inform their vendors about potential risks. In turn, when suspicious emails are detected by Abnormal for one customer, that vendor risk score is updated across all customers to help others within the Abnormal community.

Why This Matters

In recent years, social engineering through email has become one of the most dangerous attack vectors. Socially engineered emails impersonate legitimate vendors or members of the executive team in order to steal credentials, data, or money. And because they rarely contain traditional indicators of compromise, they can be incredibly difficult to detect.

ESG’s validation of Abnormal Cloud Email Security demonstrates its efficacy and value in protecting end-users from business email compromise and other advanced email attacks. View and download the full report here to discover why ESG believes that you should consider the risk reduction capabilities of Abnormal Cloud Email Security.

Interested in learning more about how Abnormal can protect your organization? Schedule a demo below.

Schedule a Demo
ESG Technical Validation of Abnormal Security: Key Takeaways

See Abnormal in Action

Schedule a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
 
Integrates Insights Reporting 09 08 22

Related Posts

BC 5 31 23 Vendor Risks
Learn the biggest risks associated with your vendor relationships and how to protect your organization from Vendor Email Compromise (VEC) attacks.
Read More
B 5 30 23 Teams
See how Abnormal's advanced security solutions protect Microsoft Teams workspace from malicious attacks and account takeovers.
Read More
Zoom BC
Discover how Abnormal protects your Zoom messages and prevents attackers from using the application to breach your business.
Read More
B 5 22 23 SOC
Discover how Abnormal simplifies detection, enhances investigation, and automates remediation, increasing threat investigation efficacy at the SOC level.
Read More
B Phishing
Knowing what to do after receiving a phishing attack is essential for preventing costly consequences. Learn how to respond to Phishing attacks.
Read More
B 5 15 23 Israel BEC
Abnormal research into an advanced Israel-based threat group puts a spotlight on the continuing rise of BEC attacks.
Read More