chat
expand_more

Abnormal Customers Enjoy an Innovative, Intelligent Email Security Solution

The Abnormal Security team is committed to providing the best possible solution and support experience to every customer. Here’s what a few of our customers have to say about us.
August 4, 2022

At Abnormal, we recognize that an organization simply can’t exist without its customers. Every decision we make starts with the customer and works backward, ensuring we focus only on doing what yields the greatest benefits for them.

We are committed to going above and beyond to drive customer impact and have a proven track record of customer satisfaction. Our leaders regularly reevaluate how their teams spend time so that we can be confident we’re investing our resources in providing the most value to our customers.

Gartner Peer Insights Abnormal Security Ratings Overview

We feel our dedication to our customers is just one of the reasons we have a 4.9/5.0 rating on Gartner® Peer Insights™ and a 100% recommendation rate as of July 29, 2022. Here are a few of our recent reviews.

"Super Intelligent Email Phishing Protection That's Not Based on Rules or Signatures"

Currently using Abnormal Security for email protection. They catch the emails everybody else misses, with the fewest false positives. An amazing last layer of defense!
—Senior Vice President of IT (Industry: Securities and Investment)

Read the full review →

"Excellent Email Security Platform That Catches More Than Traditional SEGs"

We had a great evaluation process with the sales team, and the MSA and pricing negotiations were very easy. The team understood we were in a long sales cycle, but wanted to make sure we didn't lose any of the ML training that had already occurred so they left us running in monitor mode until we could get the PO cut. Really great service so far with the deployment as well.
—CISO (Industry: Provider)

Read the full review →

"Abnormal is the Best Platform to Protect Company From BEC and Invoice Fraud"

Abnormal's capabilities to prevent invoice fraud, and detect BEC, pay for itself after just a few months.
—VP of Cybersecurity Operations (Industry: Media and Publishing)

Read the full review →

"Needed a Sophisticated Anti-Phishing Solution—Abnormal Was It"

We had a very good experience integrating and deploying Abnormal. We used it to churn out another product.
—CISO (Industry: Insurance)

Read the full review →

"Innovative and Capable E-mail Security Solution"

The Abnormal Security offering has proven to be easy to use and tangibly improves our e-mail security posture. The solution is innovative and modern, and a marked improvement over our older approach. The company is also very responsive both with communication and addressing questions or requests. This is great to see in light of their recent growth. We have been customers for over one year and still see great customer service.
—Director of IT (Industry: Carriers)

Read the full review →

"Modern Email Security That Pays for Itself With Invoice Fraud Savings"

Great tool - pays for itself in the amount of Invoice Fraud / BEC it prevents - highly recommended.
—Security Operations Associate (Industry: Media and Publishing)

Read the full review →

"True Set and Forget Email Security"

Every interaction with Abnormal has been amazing, POC/POV, legal, Deployment, and support. I genuinely cannot say enough good things about them.
—Security Engineer (Industry: Provider)

Read the full review →

Dedicated to Providing an Abnormal Customer Experience

We’re committed to providing the best possible solution and support experience to every customer. That’s why we actively engage with and listen to our customers to identify opportunities to support them better and learn how we can improve our product.

If you’re an Abnormal customer and would like to submit a Gartner® Peer Insights™ review, we would love to hear what you have to say. Your feedback helps other security professionals make informed decisions and gives us even more insight into your experience. You can leave a review here.



If you’re not already an Abnormal customer, see for yourself why so many people love our cloud email security platform. Request a demo today.

GARTNER is a registered trademark and service mark, and PEER INSIGHTS is a trademark and service mark, of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

Abnormal Customers Enjoy an Innovative, Intelligent Email Security Solution

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Get AI Protection for Your Human Interactions

Protect your organization from socially-engineered email attacks that target human behavior.
Request a Demo
Request a Demo

Related Posts

B MKT628 Cyber Savvy Social Images
Discover key insights from seasoned cybersecurity professional Nicholas Schopperth, CISO at Dayton Children’s Hospital.
Read More
B Podcast Blog
Discover 'SOC Unlocked,' Abnormal Security's new podcast featuring host Mick Leach and cybersecurity expert guests like Jeremy Ventura, Dave Kennedy, and Mick Douglas.
Read More
B 07 22 24 MKT624 Images for Paris Olympics Blog
Threat actors are targeting French businesses ahead of the Paris 2024 Olympics. Learn how they're capitalizing on the event and how to protect your organization.
Read More
B Cross Platform ATO
Cross-platform account takeover is an attack where one compromised account is used to access other accounts. Learn about four real-world examples: compromised email passwords, hijacked GitHub accounts, stolen AWS credentials, and leaked Slack logins.
Read More
B Why MFA Alone Will No Longer Suffice
Explore why account takeover attacks pose a major threat to enterprises and why multi-factor authentication (MFA) alone isn't enough to prevent them.
Read More
B NLP
Learn how Abnormal uses natural language processing or NLP to protect organizations from phishing, account takeovers, and more.
Read More