Our Mission to Protect the Internet

March 17, 2021

Our mission at Abnormal Security is to protect the internet. We will protect knowledge workers across the cloud, wherever they work.

We are starting by eradicating advanced social engineering attacks through email. These attacks bypass traditional email security solutions and are a major problem for customers. Business email compromise (BEC) is the most dangerous cybercrime, accounting for almost half of all cybercrime losses. In fact, data from the IC3 Internet Crime Reports show the losses from BEC have totaled over $26B in the past five years.

Using this method, attackers can gain access to money, sensitive data, and entire systems. Customers are harmed through sensitive data loss, such as stolen usernames and passwords, credit card numbers, and phone numbers. Corporations can lose business information related to their competitive advantage. Hackers can wreak havoc by compromising systems, and then shut down hospitals or water treatment equipment as part of a follow-on ransomware attack.

We see an emerging world of cloud office products that extend beyond email. These platforms are similar to email in that they contain sensitive data and are used for communication, collaboration, and business. In the future, we will protect those platforms as well.

We are creating a product that is fast, modern, and smart. Customers can integrate in minutes thanks to our API-based integrations and cloud-native architecture. This is in stark contrast to legacy vendors, which often require standing up on-premises infrastructure in the mail flow. We leverage artificial intelligence (AI) to understand people, organizations, and supply chains and detect attacks using behavioral anomaly detection. Legacy solutions typically look for known-bad attacks or have rules-based approaches that are unable to catch novel attacks and are cumbersome to set up.

Our products are easy to use and require minimal configuration and supervision from customers. They are the next generation of email security, built with APIs, cloud infrastructure, and AI. These techniques help us more accurately detect attacks.

If this mission of preventing cyberattacks excites you, check out our Careers page and join us here at Abnormal Security. We'd love to have you!


Prevent the Attacks That Matter Most

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Demo 2x 1

See the Abnormal Solution to the Email Security Problem

Protect your organization from the attacks that matter most with Abnormal Integrated Cloud Email Security.

Related Posts

B 05 13 22 Spring Product Release
This quarter, the team at Abnormal launched new features to improve lateral attack detection, role-based access control (RBAC), and explainable AI. Take a deep dive into all of the latest product enhancements.
Read More
B 05 11 22 Champion Finalist
Abnormal has been selected as a Security Customer Champion finalist in the Microsoft Security Excellence Awards! Here’s a look at why.
Read More
Blog series c cover
When we raised our Series B funding 18 months ago, I promised our customers greater value, more capabilities, and better customer support. We’ve delivered on each of those promises and as we receive an even larger investment, I’m excited about how we can continue to further deliver on each of them.
Read More
B 05 09 22 Partner Community
It’s an honor to be named one of CRN’s 2022 Women of the Channel. Here’s why I appreciate the award and what I love about being a Channel Account Manager at Abnormal.
Read More
B 05 05 22 Fast Facts
Watch this short video to learn current trends and key issues in cloud email security, including how to protect your organization against modern threats.
Read More
B 05 03 22
Like all threats in the cyber threat landscape, ransomware will continue to evolve over time. This post builds on our prior research and looks at the changes we observed in the ransomware threat landscape in the first quarter of 2022.
Read More
B 04 28 22 8 Key Differences
At Abnormal, we pride ourselves on our excellent machine learning engineering team. Here are some patterns we use to distinguish between effective and ineffective ML engineers.
Read More
B 04 26 22 Webinar Re Replacing Your SEG
Learn how Microsoft 365 and Abnormal work together to provide comprehensive defense-in-depth protection in part two of our webinar recap.
Read More
Blog mitigate threats cover
Learn about the most common socially-engineered attacks and why these tactics are still so successful—despite a growing awareness from employees.
Read More
B Podcast Engineering8
In episode 8 of Abnormal Engineering Stories, Kevin interviews Saminda Wijegunawardena, an engineering leader who is no stranger to fast-growing enterprise startups.
Read More
B 04 04 22 Webinar Recap Krebs
High-impact emails are on the rise and secure email gateways (SEGs) don’t have the functionality to mitigate them. Learn how your SEG is letting you down.
Read More
B 04 19 22 Facebook Phishing
While phishing emails have long been a popular way to steal Facebook login credentials, we’ve recently seen an increase in more sophisticated phishing attacks.
Read More