Security is a Team Sport: Abnormal Joins Microsoft as a MISA Partner

August 24, 2021

Security is now a $10 billion business for Microsoft, and the company is a leader in five Gartner Magic Quadrants—access management, endpoint management tools, cloud access security brokers, enterprise information archiving, and endpoint protection platforms. This validation proves that their customers, and those analysts who advise Microsoft customers, have bought into Microsoft’s strategy to build the Trusted Cloud on four key principles: security, privacy, compliance, and transparency.

‘Streamline and strengthen’ is a central theme in Microsoft’s approach to security and it is based on two observable facts. One, conventional security tools have not kept pace with the rapidly evolving threat landscape and two, a complex mashup of siloed tools leaves vulnerabilities for cybercriminals to exploit.

Given that Microsoft tells customers that they can replace up to forty third-party security tools with a fully integrated portfolio of first-party solutions, while also enhancing their security postures, saving money through license consolidation, reducing administrative overhead, and allowing for process improvements… where does that leave the Microsoft partner ecosystem?

Microsoft Expands First-Party Capabilities with Partners

Enter the Microsoft Intelligent Security Association, known as MISA. This partner ecosystem is comprised of independent software vendors and managed security service providers that have integrated their solutions to better defend against a world of increasing threats. The elite group of approximately 230 partners has been vetted by Microsoft, and then invited to join MISA.

Collectively, MISA partners make up the top experts from across the cybersecurity industry and share the common goal of protecting Microsoft customers against all forms of cyberattacks and cybercrime. And today, we’re excited to announce that Abnormal Security is now a member of MISA.

This association exists because ‘streamline and strengthen’ does not mean that Microsoft aspires to be a customer’s sole security vendor. In fact, Microsoft believes strongly that our shared customers need multiple partners working together to keep them safe. This is achieved by eliminating the old security landscape, comprised of dozens of disparate endpoint agents and siloed tools, and replacing it with a collaboration of MISA members that leverage Microsoft’s APIs and platforms to build integrated apps that streamline security management, improve threat protection, and increase response speed.

Abnormal Joins the Microsoft Intelligent Security Association

Our acceptance into MISA means Microsoft sees us as a key player in this new world where security is a team sport. We’re thrilled to become a MISA member, and we look forward to continuing to provide our Microsoft Office 365 customers with the best possible security experience—complementing the native Microsoft security controls to block the most dangerous threats.

For our customers, our integration with Azure Active Directory enables our platform to model the identity of both internal and external senders to create relationship graphs that can detect compromised employee and vendor email accounts with precision. Our ability to analyze email content allows us to understand the normal in order to find and prevent the abnormal—protecting organizations from business email compromise, vendor email compromise, and the vast array of other advanced email threats.

And our API integration with Azure Sentinel accelerates and simplifies customer response to the advanced, socially engineered attacks that our behavioral data science engine detects. This enables customers to automate their security responses, consolidate dashboards for reporting, and enhance the efficacy of their own machine learning models for threat detection.

For Abnormal, MISA membership comes with a rich array of benefits including early access to new features, access to Microsoft technical experts, and architectural support for our API and platform integrations. Taken collectively, these resources will serve to make us an even stronger security partner for our customers and extend our edge over the bad guys to block even the never-before-seen attacks.

Microsoft kicked off its FY22 by announcing a 400% increase in MISA and partner program funding, thereby reiterating with dramatic emphasis the essential role key partners play in delivering the Trusted Cloud. We’re thrilled to be one of those partners.

By working with Microsoft experts, we’re able to build demand and accelerate our customers’ security transformations, providing strategic augmentations to Microsoft’s native security services and integrating at the API level for optimal cost efficiency and maximum protection against the rapidly evolving threat landscape. We look forward to continued collaboration with Microsoft, and to providing best-in-class email security to our combined customers.

To learn more about how Abnormal Security works with Microsoft in your environment, request a demo today.

Related Posts

B 12 03 22 SIEM
Learn about Abnormal’s enhanced SIEM export schema, which provides centralized visibility into email threats
Read More
Blog phishing cover
The phishing email is one of the oldest and most successful types of cyberattacks. Attackers have long used phishing as a common attack vector to steal sensitive information or credentials from their victims. While most phishing emails are relatively simple to spot, the number of successful attacks has grown in recent years.
Read More
Blog brand cover
For those of you who have visited the Abnormal website over the last month, you’ve seen something different—a redesigned brand focused on precision. It’s new and innovative, and different from any other cybersecurity company, because it was created with one thing in mind: our customers.
Read More
B 11 22 21 AAA
At Abnormal, our customers have always been our biggest priority. Customer obsession is one of our five company values, and we live this every single day as we provide the best email security protection available for the hundreds of companies who entrust us to protect their mailboxes.
Read More
Blog microsoft abnormal cover
Before we jump into modern threats, I think it’s important to set the stage ​​since email has been around. Since email existed, threat actors targeted email users with malicious messages, general spam, and different ways to take advantage of the platform. Then of course, more dangerous attacks started to come up… things like malware and other viruses.
Read More
Blog black friday scam cover
While cybersecurity awareness is a year-round venture, it is especially important to be mindful during certain times of the year. With Thanksgiving here in the United States on Thursday, our thoughts will likely be on our family and friends and everything we have to be thankful for this holiday season.
Read More
Blog automation workflows cover
Our newest platform capabilities help customers streamline critical security workflows, like triaging phishing mailbox submissions or triggering tickets to investigate account takeovers, through automated playbooks. Doing so can decrease mean time to respond (MTTR) to incidents, further reducing any potential risk to the organization and eliminating manual workflows to save time and increase the efficiency of IT and security teams.
Read More
Blog tsa scam cover
On November 9, 2021, we identified an unusual phishing email that claimed to be from “Immigration Visa and Travel,” inviting the recipient to renew their membership in the TSA PreCheck program. The email wasn’t sent from a .gov domain, but the average consumer might not immediately reject it as a scam, particularly because it had the term “immigrationvisaforms” in the domain. The email instructed the user to renew their membership at another quasi-legitimate-looking website.
Read More
Blog pyspark cover
At Abnormal Security, we use a data science-based approach to keep our customers safe from the most advanced email attacks. This requires processing huge amounts of data to train machine learning models, build datasets, and otherwise model the typical behavior of the organizations we’re protecting.
Read More
Blog tiktok attack cover
As major social media platforms have expanded the ability of creators to monetize their content in the last few years, they and their users have increasingly found themselves the targets of malicious activity. TikTok is now no exception.
Read More
Blog ransomware guide cover
While various state agencies and the private sector keep track of ransomware attacks and related tactics worldwide, malicious actors change and evolve their ransomware strategies all the time. We’ve put together a comprehensive guide that will define ransomware, how to detect it, and what steps to take if you’ve fallen victim to a ransomware virus attack.
Read More
Blog detection efficacy cover
One of the key objectives of the Abnormal platform is to provide the highest precision detection to block all never-before-seen attacks. This ranges from socially-engineered attacks to account takeovers to everyday spam, and the platform does it without customers needing to create countless rules like with traditional secure email gateways.
Read More