Abstract Violet Hills

Abnormal Customers Enjoy an Innovative, Intelligent Email Security Solution

The Abnormal Security team is committed to providing the best possible solution and support experience to every customer. Here’s what a few of our customers have to say about us.

August 4, 2022

At Abnormal, we recognize that an organization simply can’t exist without its customers. Every decision we make starts with the customer and works backward, ensuring we focus only on doing what yields the greatest benefits for them.

We are committed to going above and beyond to drive customer impact and have a proven track record of customer satisfaction. Our leaders regularly reevaluate how their teams spend time so that we can be confident we’re investing our resources in providing the most value to our customers.

Gartner Peer Insights Abnormal Security Ratings Overview

We feel our dedication to our customers is just one of the reasons we have a 4.9/5.0 rating on Gartner® Peer Insights™ and a 100% recommendation rate as of July 29, 2022. Here are a few of our recent reviews.

"Super Intelligent Email Phishing Protection That's Not Based on Rules or Signatures"

Currently using Abnormal Security for email protection. They catch the emails everybody else misses, with the fewest false positives. An amazing last layer of defense!
—Senior Vice President of IT (Industry: Securities and Investment)

Read the full review →

"Excellent Email Security Platform That Catches More Than Traditional SEGs"

We had a great evaluation process with the sales team, and the MSA and pricing negotiations were very easy. The team understood we were in a long sales cycle, but wanted to make sure we didn't lose any of the ML training that had already occurred so they left us running in monitor mode until we could get the PO cut. Really great service so far with the deployment as well.
—CISO (Industry: Provider)

Read the full review →

"Abnormal is the Best Platform to Protect Company From BEC and Invoice Fraud"

Abnormal's capabilities to prevent invoice fraud, and detect BEC, pay for itself after just a few months.
—VP of Cybersecurity Operations (Industry: Media and Publishing)

Read the full review →

"Needed a Sophisticated Anti-Phishing Solution—Abnormal Was It"

We had a very good experience integrating and deploying Abnormal. We used it to churn out another product.
—CISO (Industry: Insurance)

Read the full review →

"Innovative and Capable E-mail Security Solution"

The Abnormal Security offering has proven to be easy to use and tangibly improves our e-mail security posture. The solution is innovative and modern, and a marked improvement over our older approach. The company is also very responsive both with communication and addressing questions or requests. This is great to see in light of their recent growth. We have been customers for over one year and still see great customer service.
—Director of IT (Industry: Carriers)

Read the full review →

"Modern Email Security That Pays for Itself With Invoice Fraud Savings"

Great tool - pays for itself in the amount of Invoice Fraud / BEC it prevents - highly recommended.
—Security Operations Associate (Industry: Media and Publishing)

Read the full review →

"True Set and Forget Email Security"

Every interaction with Abnormal has been amazing, POC/POV, legal, Deployment, and support. I genuinely cannot say enough good things about them.
—Security Engineer (Industry: Provider)

Read the full review →

Dedicated to Providing an Abnormal Customer Experience

We’re committed to providing the best possible solution and support experience to every customer. That’s why we actively engage with and listen to our customers to identify opportunities to support them better and learn how we can improve our product.

If you’re an Abnormal customer and would like to submit a Gartner® Peer Insights™ review, we would love to hear what you have to say. Your feedback helps other security professionals make informed decisions and gives us even more insight into your experience. You can leave a review here.

If you’re not already an Abnormal customer, see for yourself why so many people love our cloud email security platform. Request a demo today.

GARTNER is a registered trademark and service mark, and PEER INSIGHTS is a trademark and service mark, of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.


Prevent the Attacks That Matter Most

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Demo 2x 1

See the Abnormal Solution to the Email Security Problem

Protect your organization from the attacks that matter most with Abnormal Integrated Cloud Email Security.

Related Posts

B 1500x1500 Gartner Peer Insights Reviews blog
The Abnormal Security team is committed to providing the best possible solution and support experience to every customer. Here’s what a few of our customers have to say about us.
Read More
B Podcast Engineering 10 07 27 22
In episode 10 of Abnormal Engineering Stories, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, sits down with Zehan Wang, co-founder of Magic Pony.
Read More
B 1500x1500 Email Attack Insights
Join us for a three-part webinar series about the most serious email-based threats, featuring some of the biggest names in cybersecurity.
Read More
B 07 22 22 Webinar Recap
Credential phishing attacks can lead to loss of revenue, loss of data, and long-term reputational damage. Learn why these attacks are successful and how to block them.
Read More
B 07 19 22 2022 Email Security Trends 1
Our new survey explores the current email threat landscape and what security leaders are doing to stay ahead of increasingly sophisticated attacks.
Read More
B 07 14 22 4types
Understanding the ways cybercriminals execute financial supply chain compromise is key to preventing your organization from falling victim to an attack.
Read More
B 07 07 22 Financial Supply Chain Compromise
Financial supply chain compromise, a subset of business email compromise (BEC), is on the rise. Learn how threat actors launch these sophisticated attacks.
Read More
B 06 15 22 Coats Webinar Recap Blog
Learn why Coats, the global leader in industrial thread manufacturing, skipped the SEG and chose Abnormal Integrated Cloud Email Security (ICES) to protect its workforce from modern email threats.
Read More
B 07 30 22 Q2 2022
We’re dedicated to keeping security professionals informed about the latest email threats. Here are a few of our favorite blog posts from Q2 2022.
Read More
B 06 21 22 Threat Intel blog
Executives are no longer the go-to impersonated party in business email compromise (BEC) attacks. Now, threat actors are opting to impersonate vendors instead.
Read More
B 06 7 22 Disentangling ML Pipelines Blog
Learn how explicitly modeling dependencies in a machine learning pipeline can vastly reduce its complexity and make it behave like a tower of Legos: easy to change, and hard to break.
Read More
B 04 07 22 SEG
As enterprises across the world struggle to stop modern email attacks, it begs the question: how are these attacks evading traditional solutions like SEGs?
Read More