Secure New Tenants Faster with Multi-Tenant Management

Multi-Tenant Management onboards tenants efficiently so they can adhere to their service level agreements and keep their customers happy.
December 13, 2022

Abnormal Security’s mission is to make the cloud a safer place for business by protecting employees wherever they work. With the release of the Multi-Tenant Management feature, we are one step closer to fulfilling that goal by allowing security teams to protect their distributed workforce and onboard new tenants more quickly.

Previously, if a customer wanted to protect an additional M365 or Google Workspace instance with Abnormal, it was a manual, multi-day process involving numerous exchanges and potential delays. The process included multiple steps including:

  1. Customer reaches out to their Abnormal Customer Success Manager (CSM).
  2. Customer provides the necessary information to onboard the workspace.
  3. CSM gives a new link for the workspace to integrate.
  4. Customer uses the link to grant Abnormal permission to their workspace.
  5. Abnormal begins building out a baseline behavior for the new tenant.

Now, with Multi-Tenant Management, adding a new child tenant only requires three steps:

  1. Navigate to settings.
  2. Name the new tenant.
  3. Grant access to the workspace.

This new enhancement allows Abnormal to be better equipped to support two of the most critical cybersecurity risk management use cases: Mergers and Acquisitions (M&A) and Managed Security Partners (MSPs).

Protecting Mergers and Acquisitions

The mergers and acquisitions process is quite chaotic: both companies see large financial transactions, new people, and changing processes. As a result, most companies face spikes in cyberattacks around the time that acquisitions are announced (FBI).

Moreover, during this time, both organizations’ stock prices are highly sensitive, and breaches of sensitive information could harm or even jeopardize the acquisition. The timely protection of company data during mergers and acquisitions is extremely important to ensure a successful transaction.

Fortunately, the strength of security and the speed needed for onboarding is no longer at odds. With the release of multi-tenant management, an Abnormal-protected customer can onboard a new tenant with a few clicks. Previously, if an admin needed to onboard a new tenant, it could take up to a week with multiple back-and-forth conversations with the Abnormal support team.

Tenant management

Get Started with Multi-Tenant Management Today

Multi-Tenant Management is available to customers using the Abnormal Inbound Email Security product on either Microsoft 365 or Google Workspace.

Ready to learn more about Multi-Tenant Management? Schedule a demo today.

Secure New Tenants Faster with Multi-Tenant Management

See Abnormal in Action

Schedule a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.


See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
Integrates Insights Reporting 09 08 22

Related Posts

B 1500x1500 Knowledge Base People Base L1 R1
Discover how Abnormal uses contextual, behavioral data to uncover anomalous activity across logins and devices with PeopleBase.
Read More
ABN B 12 2 22 Expanding our partnership L1 R2
Our partnership with Microsoft has created plenty of opportunities to celebrate. Here are some of the especially exciting moments from 2022.
Read More
B 1500x1500 5 key takeaways L1 R1
Ed Amoroso discusses the biggest security risks with cloud email and how to prevent them.
Read More
B Threat Intel Phishing Attacks HR Policies
Threat actors are capitalizing on the new year, posing as human resources officials to send credential phishing attacks.
Read More
ESG Blog
ESG’s technical validation proves the risk reduction capabilities of Abnormal Cloud Email Security.
Read More
CFO Cover
Industry-leading CFO Sam Wolff discusses spending on security technology in the current macroeconomic conditions.
Read More