chat
expand_more

Secure New Tenants Faster with Multi-Tenant Management

Multi-Tenant Management onboards tenants efficiently so they can adhere to their service level agreements and keep their customers happy.
December 13, 2022

Abnormal Security’s mission is to make the cloud a safer place for business by protecting employees wherever they work. With the release of the Multi-Tenant Management feature, we are one step closer to fulfilling that goal by allowing security teams to protect their distributed workforce and onboard new tenants more quickly.

Previously, if a customer wanted to protect an additional M365 or Google Workspace instance with Abnormal, it was a manual, multi-day process involving numerous exchanges and potential delays. The process included multiple steps including:

  1. Customer reaches out to their Abnormal Customer Success Manager (CSM).
  2. Customer provides the necessary information to onboard the workspace.
  3. CSM gives a new link for the workspace to integrate.
  4. Customer uses the link to grant Abnormal permission to their workspace.
  5. Abnormal begins building out a baseline behavior for the new tenant.

Now, with Multi-Tenant Management, adding a new child tenant only requires three steps:

  1. Navigate to settings.
  2. Name the new tenant.
  3. Grant access to the workspace.

This new enhancement allows Abnormal to be better equipped to support two of the most critical cybersecurity risk management use cases: Mergers and Acquisitions (M&A) and Managed Security Partners (MSPs).

Protecting Mergers and Acquisitions

The mergers and acquisitions process is quite chaotic: both companies see large financial transactions, new people, and changing processes. As a result, most companies face spikes in cyberattacks around the time that acquisitions are announced (FBI).

Moreover, during this time, both organizations’ stock prices are highly sensitive, and breaches of sensitive information could harm or even jeopardize the acquisition. The timely protection of company data during mergers and acquisitions is extremely important to ensure a successful transaction.

Fortunately, the strength of security and the speed needed for onboarding is no longer at odds. With the release of multi-tenant management, an Abnormal-protected customer can onboard a new tenant with a few clicks. Previously, if an admin needed to onboard a new tenant, it could take up to a week with multiple back-and-forth conversations with the Abnormal support team.

Tenant management

Get Started with Multi-Tenant Management Today

Multi-Tenant Management is available to customers using the Abnormal Inbound Email Security product on either Microsoft 365 or Google Workspace.

Ready to learn more about Multi-Tenant Management? Schedule a demo today.

Secure New Tenants Faster with Multi-Tenant Management

See Abnormal in Action

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Discover How It All Works

See How Abnormal AI Protects Humans

Related Posts

B 1500x1500 MKT579z 3 Images for Proofpoint Customer Story Blog 15
A global industrial manufacturer blocked 3,232 missed attacks and saved 336 SOC hours per month by adding Abnormal to address gaps left by Proofpoint.
Read More
B RFI
Abnormal urges adoption of AI-native cybersecurity in response to OSTP’s RFI, highlighting the need for public-private collaboration to counter AI-powered threats.
Read More
B MKT793r Open Graphs Convergence Announcement Blog
Join this virtual event series to get the insights you need to make security decisions in the age of AI.
Read More
B Atlantis AIO Blog
Discover how cybercriminals use Atlantis AIO to automate credential stuffing attacks—and how AI-driven security can stop them before accounts are compromised.
Read More
B Black Basta
Black Basta is a highly active ransomware-as-a-service (RaaS) group that has been linked to dozens of high-profile attacks against organizations worldwide. See how they utilize generative AI to support their campaigns.
Read More
B AI Generated Zoom Impersonation Phishing Attack
Threat actors impersonated Zoom using an AI-generated phishing page to deliver a remote monitoring and management tool.
Read More