chat
expand_more

Abnormal Customers Enjoy an Innovative, Intelligent Email Security Solution

The Abnormal Security team is committed to providing the best possible solution and support experience to every customer. Here’s what a few of our customers have to say about us.
August 4, 2022

At Abnormal, we recognize that an organization simply can’t exist without its customers. Every decision we make starts with the customer and works backward, ensuring we focus only on doing what yields the greatest benefits for them.

We are committed to going above and beyond to drive customer impact and have a proven track record of customer satisfaction. Our leaders regularly reevaluate how their teams spend time so that we can be confident we’re investing our resources in providing the most value to our customers.

Gartner Peer Insights Abnormal Security Ratings Overview

We feel our dedication to our customers is just one of the reasons we have a 4.9/5.0 rating on Gartner® Peer Insights™ and a 100% recommendation rate as of July 29, 2022. Here are a few of our recent reviews.

"Super Intelligent Email Phishing Protection That's Not Based on Rules or Signatures"

Currently using Abnormal Security for email protection. They catch the emails everybody else misses, with the fewest false positives. An amazing last layer of defense!
—Senior Vice President of IT (Industry: Securities and Investment)

Read the full review →

"Excellent Email Security Platform That Catches More Than Traditional SEGs"

We had a great evaluation process with the sales team, and the MSA and pricing negotiations were very easy. The team understood we were in a long sales cycle, but wanted to make sure we didn't lose any of the ML training that had already occurred so they left us running in monitor mode until we could get the PO cut. Really great service so far with the deployment as well.
—CISO (Industry: Provider)

Read the full review →

"Abnormal is the Best Platform to Protect Company From BEC and Invoice Fraud"

Abnormal's capabilities to prevent invoice fraud, and detect BEC, pay for itself after just a few months.
—VP of Cybersecurity Operations (Industry: Media and Publishing)

Read the full review →

"Needed a Sophisticated Anti-Phishing Solution—Abnormal Was It"

We had a very good experience integrating and deploying Abnormal. We used it to churn out another product.
—CISO (Industry: Insurance)

Read the full review →

"Innovative and Capable E-mail Security Solution"

The Abnormal Security offering has proven to be easy to use and tangibly improves our e-mail security posture. The solution is innovative and modern, and a marked improvement over our older approach. The company is also very responsive both with communication and addressing questions or requests. This is great to see in light of their recent growth. We have been customers for over one year and still see great customer service.
—Director of IT (Industry: Carriers)

Read the full review →

"Modern Email Security That Pays for Itself With Invoice Fraud Savings"

Great tool - pays for itself in the amount of Invoice Fraud / BEC it prevents - highly recommended.
—Security Operations Associate (Industry: Media and Publishing)

Read the full review →

"True Set and Forget Email Security"

Every interaction with Abnormal has been amazing, POC/POV, legal, Deployment, and support. I genuinely cannot say enough good things about them.
—Security Engineer (Industry: Provider)

Read the full review →

Dedicated to Providing an Abnormal Customer Experience

We’re committed to providing the best possible solution and support experience to every customer. That’s why we actively engage with and listen to our customers to identify opportunities to support them better and learn how we can improve our product.

If you’re an Abnormal customer and would like to submit a Gartner® Peer Insights™ review, we would love to hear what you have to say. Your feedback helps other security professionals make informed decisions and gives us even more insight into your experience. You can leave a review here.



If you’re not already an Abnormal customer, see for yourself why so many people love our cloud email security platform. Request a demo today.

GARTNER is a registered trademark and service mark, and PEER INSIGHTS is a trademark and service mark, of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

Abnormal Customers Enjoy an Innovative, Intelligent Email Security Solution

See Abnormal in Action

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Discover How It All Works

See How Abnormal AI Protects Humans

Related Posts

B X Files Fileless Malware
Learn how XFiles uses fileless malware, Cloudflare Turnstile widgets, and phishing emails to steal login details, cryptocurrency wallets, and access to corporate systems.
Read More
B Email Metrics
Understand essential email security metrics that reveal the strength of your protection and highlight areas for improvement in your security program.
Read More
B 1500x1500 MKT579z 3 Images for Proofpoint Customer Story Blog 15
A global industrial manufacturer blocked 3,232 missed attacks and saved 336 SOC hours per month by adding Abnormal to address gaps left by Proofpoint.
Read More
B RFI
Abnormal urges adoption of AI-native cybersecurity in response to OSTP’s RFI, highlighting the need for public-private collaboration to counter AI-powered threats.
Read More
B MKT793r Open Graphs Convergence Announcement Blog
Join this virtual event series to get the insights you need to make security decisions in the age of AI.
Read More
B Atlantis AIO Blog
Discover how cybercriminals use Atlantis AIO to automate credential stuffing attacks—and how AI-driven security can stop them before accounts are compromised.
Read More