Security is a Team Sport: Abnormal Joins Microsoft as a MISA Partner

August 24, 2021

Security is now a $10 billion business for Microsoft, and the company is a leader in five Gartner Magic Quadrants—access management, endpoint management tools, cloud access security brokers, enterprise information archiving, and endpoint protection platforms. This validation proves that their customers, and those analysts who advise Microsoft customers, have bought into Microsoft’s strategy to build the Trusted Cloud on four key principles: security, privacy, compliance, and transparency.

‘Streamline and strengthen’ is a central theme in Microsoft’s approach to security and it is based on two observable facts. One, conventional security tools have not kept pace with the rapidly evolving threat landscape and two, a complex mashup of siloed tools leaves vulnerabilities for cybercriminals to exploit.

Given that Microsoft tells customers that they can replace up to forty third-party security tools with a fully integrated portfolio of first-party solutions, while also enhancing their security postures, saving money through license consolidation, reducing administrative overhead, and allowing for process improvements… where does that leave the Microsoft partner ecosystem?

Microsoft Expands First-Party Capabilities with Partners

Enter the Microsoft Intelligent Security Association, known as MISA. This partner ecosystem is comprised of independent software vendors and managed security service providers that have integrated their solutions to better defend against a world of increasing threats. The elite group of approximately 230 partners has been vetted by Microsoft, and then invited to join MISA.

Collectively, MISA partners make up the top experts from across the cybersecurity industry and share the common goal of protecting Microsoft customers against all forms of cyberattacks and cybercrime. And today, we’re excited to announce that Abnormal Security is now a member of MISA.

This association exists because ‘streamline and strengthen’ does not mean that Microsoft aspires to be a customer’s sole security vendor. In fact, Microsoft believes strongly that our shared customers need multiple partners working together to keep them safe. This is achieved by eliminating the old security landscape, comprised of dozens of disparate endpoint agents and siloed tools, and replacing it with a collaboration of MISA members that leverage Microsoft’s APIs and platforms to build integrated apps that streamline security management, improve threat protection, and increase response speed.

Abnormal Joins the Microsoft Intelligent Security Association

Our acceptance into MISA means Microsoft sees us as a key player in this new world where security is a team sport. We’re thrilled to become a MISA member, and we look forward to continuing to provide our Microsoft Office 365 customers with the best possible security experience—complementing the native Microsoft security controls to block the most dangerous threats.

For our customers, our integration with Azure Active Directory enables our platform to model the identity of both internal and external senders to create relationship graphs that can detect compromised employee and vendor email accounts with precision. Our ability to analyze email content allows us to understand the normal in order to find and prevent the abnormal—protecting organizations from business email compromise, vendor email compromise, and the vast array of other advanced email threats.

And our API integration with Azure Sentinel accelerates and simplifies customer response to the advanced, socially engineered attacks that our behavioral data science engine detects. This enables customers to automate their security responses, consolidate dashboards for reporting, and enhance the efficacy of their own machine learning models for threat detection.

For Abnormal, MISA membership comes with a rich array of benefits including early access to new features, access to Microsoft technical experts, and architectural support for our API and platform integrations. Taken collectively, these resources will serve to make us an even stronger security partner for our customers and extend our edge over the bad guys to block even the never-before-seen attacks.

Microsoft kicked off its FY22 by announcing a 400% increase in MISA and partner program funding, thereby reiterating with dramatic emphasis the essential role key partners play in delivering the Trusted Cloud. We’re thrilled to be one of those partners.

By working with Microsoft experts, we’re able to build demand and accelerate our customers’ security transformations, providing strategic augmentations to Microsoft’s native security services and integrating at the API level for optimal cost efficiency and maximum protection against the rapidly evolving threat landscape. We look forward to continued collaboration with Microsoft, and to providing best-in-class email security to our combined customers.

To learn more about how Abnormal Security works with Microsoft in your environment, request a demo today.


Prevent the Attacks That Matter Most

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Demo 2x 1

See the Abnormal Solution to the Email Security Problem

Protect your organization from the attacks that matter most with Abnormal Integrated Cloud Email Security.

Related Posts

B 10 3 22 Cobalt Terrapin Blog
Threat group Cobalt Terrapin uses sophisticated impersonation techniques with multiple steps to commit invoice fraud.
Read More
B 09 29 22 CISO Cybersecurity Awareness Month
October is here, which means Cybersecurity Awareness Month is officially in full swing! These five tips can help security leaders take full advantage of the month.
Read More
B Email Security Challenges Blog 09 26 22
Understanding common email security challenges caused by your legacy technology will help you determine the best solution to improve your security posture.
Read More
B 5 Crucial Tips
Retailers are a popular target for threat actors due to their wealth of customer data and availability of funds. Here are 5 cybersecurity tips to help retailers reduce their risk of attack.
Read More
B 3 Essential Elements
Legacy approaches to managing unwanted mail are neither practical nor scalable. Learn the 3 essential elements of modern, effective graymail management.
Read More
B Back to School
Discover how threat group Chiffon Herring leverages impersonation and spoofed email addresses to divert paychecks to mule accounts.
Read More
B 09 06 22 Rearchitecting a System Blog
We recently shared a look at how the Abnormal engineering team overhauled our Unwanted Mail service architecture to accommodate our rapid growth. Today, we’re diving into how the team migrated traffic to the new architecture—with zero downtime.
Read More
B Industry Leading CIS Os
Stay up to date on the latest cybersecurity trends, industry news, and best practices by following these 12 innovative and influential thought leaders on social media.
Read More
B Podcast Engineering 11 08 24 22
In episode 11 of Abnormal Engineering Stories, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, continues his conversation with Zehan Wang, co-founder of Magic Pony.
Read More