Our Mission to Protect the Internet

March 17, 2021

Our mission at Abnormal Security is to protect the internet. We will protect knowledge workers across the cloud, wherever they work.

We are starting by eradicating advanced social engineering attacks through email. These attacks bypass traditional email security solutions and are a major problem for customers. Business email compromise (BEC) is the most dangerous cybercrime, accounting for almost half of all cybercrime losses. In fact, data from the IC3 Internet Crime Reports show the losses from BEC have totaled over $26B in the past five years.

Using this method, attackers can gain access to money, sensitive data, and entire systems. Customers are harmed through sensitive data loss, such as stolen usernames and passwords, credit card numbers, and phone numbers. Corporations can lose business information related to their competitive advantage. Hackers can wreak havoc by compromising systems, and then shut down hospitals or water treatment equipment as part of a follow-on ransomware attack.

We see an emerging world of cloud office products that extend beyond email. These platforms are similar to email in that they contain sensitive data and are used for communication, collaboration, and business. In the future, we will protect those platforms as well.

We are creating a product that is fast, modern, and smart. Customers can integrate in minutes thanks to our API-based integrations and cloud-native architecture. This is in stark contrast to legacy vendors, which often require standing up on-premises infrastructure in the mail flow. We leverage artificial intelligence (AI) to understand people, organizations, and supply chains and detect attacks using behavioral anomaly detection. Legacy solutions typically look for known-bad attacks or have rules-based approaches that are unable to catch novel attacks and are cumbersome to set up.

Our products are easy to use and require minimal configuration and supervision from customers. They are the next generation of email security, built with APIs, cloud infrastructure, and AI. These techniques help us more accurately detect attacks.

If this mission of preventing cyberattacks excites you, check out our Careers page and join us here at Abnormal Security. We'd love to have you!


Prevent the Attacks That Matter Most

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Demo 2x 1

See the Abnormal Solution to the Email Security Problem

Protect your organization from the attacks that matter most with Abnormal Integrated Cloud Email Security.

Related Posts

B 09 29 22 CISO Cybersecurity Awareness Month
October is here, which means Cybersecurity Awareness Month is officially in full swing! These five tips can help security leaders take full advantage of the month.
Read More
B Email Security Challenges Blog 09 26 22
Understanding common email security challenges caused by your legacy technology will help you determine the best solution to improve your security posture.
Read More
B 5 Crucial Tips
Retailers are a popular target for threat actors due to their wealth of customer data and availability of funds. Here are 5 cybersecurity tips to help retailers reduce their risk of attack.
Read More
B 3 Essential Elements
Legacy approaches to managing unwanted mail are neither practical nor scalable. Learn the 3 essential elements of modern, effective graymail management.
Read More
B Back to School
Discover how threat group Chiffon Herring leverages impersonation and spoofed email addresses to divert paychecks to mule accounts.
Read More
B 09 06 22 Rearchitecting a System Blog
We recently shared a look at how the Abnormal engineering team overhauled our Unwanted Mail service architecture to accommodate our rapid growth. Today, we’re diving into how the team migrated traffic to the new architecture—with zero downtime.
Read More
B Industry Leading CIS Os
Stay up to date on the latest cybersecurity trends, industry news, and best practices by following these 12 innovative and influential thought leaders on social media.
Read More
B Podcast Engineering 11 08 24 22
In episode 11 of Abnormal Engineering Stories, David Hagar, Director of Engineering and Abnormal Head of UK Engineering, continues his conversation with Zehan Wang, co-founder of Magic Pony.
Read More
B Overhauled Architecture Blog 08 29 22
As our customer base has expanded, so has the volume of emails our system processes. Here’s how we overcame scaling challenges with one service in particular.
Read More