Security is a Team Sport: Abnormal Joins Microsoft as a MISA Partner

August 24, 2021

Security is now a $10 billion business for Microsoft, and the company is a leader in five Gartner Magic Quadrants—access management, endpoint management tools, cloud access security brokers, enterprise information archiving, and endpoint protection platforms. This validation proves that their customers, and those analysts who advise Microsoft customers, have bought into Microsoft’s strategy to build the Trusted Cloud on four key principles: security, privacy, compliance, and transparency.

‘Streamline and strengthen’ is a central theme in Microsoft’s approach to security and it is based on two observable facts. One, conventional security tools have not kept pace with the rapidly evolving threat landscape and two, a complex mashup of siloed tools leaves vulnerabilities for cybercriminals to exploit.

Given that Microsoft tells customers that they can replace up to forty third-party security tools with a fully integrated portfolio of first-party solutions, while also enhancing their security postures, saving money through license consolidation, reducing administrative overhead, and allowing for process improvements… where does that leave the Microsoft partner ecosystem?

Microsoft Expands First-Party Capabilities with Partners

Enter the Microsoft Intelligent Security Association, known as MISA. This partner ecosystem is comprised of independent software vendors and managed security service providers that have integrated their solutions to better defend against a world of increasing threats. The elite group of approximately 230 partners has been vetted by Microsoft, and then invited to join MISA.

Collectively, MISA partners make up the top experts from across the cybersecurity industry and share the common goal of protecting Microsoft customers against all forms of cyberattacks and cybercrime. And today, we’re excited to announce that Abnormal Security is now a member of MISA.

This association exists because ‘streamline and strengthen’ does not mean that Microsoft aspires to be a customer’s sole security vendor. In fact, Microsoft believes strongly that our shared customers need multiple partners working together to keep them safe. This is achieved by eliminating the old security landscape, comprised of dozens of disparate endpoint agents and siloed tools, and replacing it with a collaboration of MISA members that leverage Microsoft’s APIs and platforms to build integrated apps that streamline security management, improve threat protection, and increase response speed.

Abnormal Joins the Microsoft Intelligent Security Association

Our acceptance into MISA means Microsoft sees us as a key player in this new world where security is a team sport. We’re thrilled to become a MISA member, and we look forward to continuing to provide our Microsoft Office 365 customers with the best possible security experience—complementing the native Microsoft security controls to block the most dangerous threats.

For our customers, our integration with Azure Active Directory enables our platform to model the identity of both internal and external senders to create relationship graphs that can detect compromised employee and vendor email accounts with precision. Our ability to analyze email content allows us to understand the normal in order to find and prevent the abnormal—protecting organizations from business email compromise, vendor email compromise, and the vast array of other advanced email threats.

And our API integration with Azure Sentinel accelerates and simplifies customer response to the advanced, socially engineered attacks that our behavioral data science engine detects. This enables customers to automate their security responses, consolidate dashboards for reporting, and enhance the efficacy of their own machine learning models for threat detection.

For Abnormal, MISA membership comes with a rich array of benefits including early access to new features, access to Microsoft technical experts, and architectural support for our API and platform integrations. Taken collectively, these resources will serve to make us an even stronger security partner for our customers and extend our edge over the bad guys to block even the never-before-seen attacks.

Microsoft kicked off its FY22 by announcing a 400% increase in MISA and partner program funding, thereby reiterating with dramatic emphasis the essential role key partners play in delivering the Trusted Cloud. We’re thrilled to be one of those partners.

By working with Microsoft experts, we’re able to build demand and accelerate our customers’ security transformations, providing strategic augmentations to Microsoft’s native security services and integrating at the API level for optimal cost efficiency and maximum protection against the rapidly evolving threat landscape. We look forward to continued collaboration with Microsoft, and to providing best-in-class email security to our combined customers.

To learn more about how Abnormal Security works with Microsoft in your environment, request a demo today.

Related Posts

Blog customer communications leads to product innovation
Learn how customers have influenced the latest round of product enhancements to better protect your organization from email-borne threats.
Read More
Blog attack detection efficacy cover
Abnormal’s relentless pursuit of innovation significantly improves the detection efficacy of hidden payloads in emails by an additional 5%.
Read More
Blog mnru cover
Estimating both the time and cost to complete a task has been a continual challenge for engineering teams as long as I’ve been working in industry. Coordinating the complex interactions and execution task sequencing across multiple tasks and people is a complex, ever-evolving challenge, and one that most teams struggle with daily.
Read More
Blog what do phishing emails cover
Phishing attacks are on the rise; the FBI reports that such attacks cost $54 billion in 2020, and phishing complaints increased by a whopping 110% from 2019 to 2020. If you're one of the many people targeted by a phishing email, you're not alone.
Read More
Blog holiday scams cover
We've arrived at that time of year—a time for reflection and celebration and spending time with family, and also that time of year where the cyber grinches hope to spoil the holiday fun.
Read More
Log4j email blog cover
Over the last few days, Abnormal has successfully blocked multiple attempts by attackers to deliver emails similar to these to our customers’ unsuspecting end users.
Read More
Blog securitry privacy cover
Customers place tremendous trust in Abnormal to protect them from the full spectrum of attacks when they provide us access to the email stored in Microsoft 365 or Google Workspace. To that end, we’re focused on protecting your data and building your trust.
Read More
Blog podcast role cto
Tim Tully, Partner at Menlo Ventures, grew up in Silicon Valley, where a love for coding was kindled in him. Tim is a technologist to the core, which innately led him to become an elite technical leader at companies like Splunk and Yahoo.
Read More
Blog canadian visa cover
Abnormal Security recently identified a scam aimed at the Canadian electronic travel authorization (eTA) program, which bears a striking resemblance to a long-standing fraud scheme described in our post from several weeks ago targeting TSA travel program applicants.
Read More
Automate abuse mailbox cover
Managing and monitoring an Abuse Mailbox can be a significant pain point for IT security teams, particularly large organizations with thousands of employees.
Read More
Blog calendar invite attack cover
Meeting invites are one of the most common types of emails sent today, so it should come as no surprise that attackers have found a way to manipulate them. Scores of recipients that utilize Abnormal Security recently received emails that contained a .ics attachment—an invitation file commonly used to populate online calendar applications with meeting and event information.
Read More
Blog saving memory python cover
At a hyper-growth startup, a solution from six months ago will unfortunately no longer scale. The business is growing rapidly, and this traffic to this service in particular was growing at an unprecedented rate. We hit a point where it needed re-architecting to support 10x the current scale.
Read More