Our Mission to Protect the Internet

March 17, 2021

Our mission at Abnormal Security is to protect the internet. We will protect knowledge workers across the cloud, wherever they work.

We are starting by eradicating advanced social engineering attacks through email. These attacks bypass traditional email security solutions and are a major problem for customers. Business email compromise (BEC) is the most dangerous cybercrime, accounting for almost half of all cybercrime losses. In fact, data from the IC3 Internet Crime Reports show the losses from BEC have totaled over $26B in the past five years.

Using this method, attackers can gain access to money, sensitive data, and entire systems. Customers are harmed through sensitive data loss, such as stolen usernames and passwords, credit card numbers, and phone numbers. Corporations can lose business information related to their competitive advantage. Hackers can wreak havoc by compromising systems, and then shut down hospitals or water treatment equipment as part of a follow-on ransomware attack.

We see an emerging world of cloud office products that extend beyond email. These platforms are similar to email in that they contain sensitive data and are used for communication, collaboration, and business. In the future, we will protect those platforms as well.

We are creating a product that is fast, modern, and smart. Customers can integrate in minutes thanks to our API-based integrations and cloud-native architecture. This is in stark contrast to legacy vendors, which often require standing up on-premises infrastructure in the mail flow. We leverage artificial intelligence (AI) to understand people, organizations, and supply chains and detect attacks using behavioral anomaly detection. Legacy solutions typically look for known-bad attacks or have rules-based approaches that are unable to catch novel attacks and are cumbersome to set up.

Our products are easy to use and require minimal configuration and supervision from customers. They are the next generation of email security, built with APIs, cloud infrastructure, and AI. These techniques help us more accurately detect attacks.

If this mission of preventing cyberattacks excites you, check out our Careers page and join us here at Abnormal Security. We'd love to have you!

Blog manufacturing scaling
In a recent post, our Head of Platform & Infrastructure Michael Kralka discussed how Abnormal’s rapid growth has forced us to make our core services horizontally scalable. In-memory datasets that start off small become huge memory...
Read More
Blog solar panels
Abnormal Security has a data-driven culture that permeates the entire organization, from the engineering team to product, sales, and beyond. We make decisions by analyzing data monitoring relevant metrics. For online analytics, we use a great tool called Grafana...
Read More

Related Posts

B 10 15 21
With Detection 360, submission to threat containment just got 94% faster, making it incredibly easy for customers to submit false positives or missed attacks, and get real-time updates from Abnormal on investigation, conclusion, and remediation.
Read More
Extortion blog cover
Unfortunately, physically threatening extortion attempts sent via email continue to impact companies and public institutions when received—disrupting business, intimidating employees, and occasioning costly responses from public safety.
Read More
Blog engineering cybersecurity careers
Cybersecurity Careers Awareness Week is a great opportunity to explore key careers in information security, particularly as there are an estimated 3.1 million unfilled cybersecurity jobs. This disparity means that cybercriminals are taking advantage of the situation, sending more targeted attacks and seeing greater success each year.
Read More
Blog hiring cybersecurity leaders
As with every equation, there are always two sides and while it can be easy to blame users when they fall victim to scams and attacks, we also need to examine how we build and staff security teams.
Read More
Cover automated ato
With an increase in threat actor attention toward compromising accounts, Abnormal is focused on protecting our customers from this potentially high-profile threat. We are pleased to announce that our new Automated Account Takeover (ATO) Remediation functionality is available.
Read More
Email spoofing cover
Email spoofing is a common form of phishing attack designed to make the recipient believe that the message originates from a trusted source. A spoofed email is more than just a nuisance—it’s a malicious communication that poses a significant security threat.
Read More
Cover cybersecurity month kickoff
It’s time to turn the page on the calendar, and we are finally in October—the one month of the year when the spooky becomes reality. October is a unique juncture in the year as most companies are making the mad dash to year-end...
Read More
Ices announcement cover
Abnormal ICES offers all-in-one email security, delivering a precise approach to combat the full spectrum of email-borne threats. Powered by behavioral AI technology and deeply integrated with Microsoft 365...
Read More
Account takeover cover
Account takeovers are one of the biggest threats facing organizations of all sizes. They happen when cybercriminals gain legitimate login credentials and then use those credentials to send more attacks, acting like the person...
Read More
Blog podcast green cover
Many companies aspire to be customer-centric, but few find a way to operationalize customer-centricity into their team’s culture. As a 3x SaaS startup founder, most recently at Orum, and a veteran of Facebook and Palantir, Ayush Sood...
Read More
Blog attack atlassian cover
Credential phishing links are most commonly sent by email, and they typically lead to a website that is designed to look like common applications—most notably Microsoft Office 365, Google, Amazon, or other well-known...
Read More
Blog podcast purple cover
Working at hyper-growth startups usually means that unreasonable expectations will be thrust on individuals and teams. Demanding timelines, goals, and expectations can lead to high pressure, stress, accountability, and ultimately, extraordinary growth and achievements.
Read More