Secure New Tenants Faster with Multi-Tenant Management

Multi-Tenant Management onboards tenants efficiently so they can adhere to their service level agreements and keep their customers happy.
December 13, 2022

Abnormal Security’s mission is to make the cloud a safer place for business by protecting employees wherever they work. With the release of the Multi-Tenant Management feature, we are one step closer to fulfilling that goal by allowing security teams to protect their distributed workforce and onboard new tenants more quickly.

Previously, if a customer wanted to protect an additional M365 or Google Workspace instance with Abnormal, it was a manual, multi-day process involving numerous exchanges and potential delays. The process included multiple steps including:

  1. Customer reaches out to their Abnormal Customer Success Manager (CSM).
  2. Customer provides the necessary information to onboard the workspace.
  3. CSM gives a new link for the workspace to integrate.
  4. Customer uses the link to grant Abnormal permission to their workspace.
  5. Abnormal begins building out a baseline behavior for the new tenant.

Now, with Multi-Tenant Management, adding a new child tenant only requires three steps:

  1. Navigate to settings.
  2. Name the new tenant.
  3. Grant access to the workspace.

This new enhancement allows Abnormal to be better equipped to support two of the most critical cybersecurity risk management use cases: Mergers and Acquisitions (M&A) and Managed Security Partners (MSPs).

Protecting Mergers and Acquisitions

The mergers and acquisitions process is quite chaotic: both companies see large financial transactions, new people, and changing processes. As a result, most companies face spikes in cyberattacks around the time that acquisitions are announced (FBI).

Moreover, during this time, both organizations’ stock prices are highly sensitive, and breaches of sensitive information could harm or even jeopardize the acquisition. The timely protection of company data during mergers and acquisitions is extremely important to ensure a successful transaction.

Fortunately, the strength of security and the speed needed for onboarding is no longer at odds. With the release of multi-tenant management, an Abnormal-protected customer can onboard a new tenant with a few clicks. Previously, if an admin needed to onboard a new tenant, it could take up to a week with multiple back-and-forth conversations with the Abnormal support team.

Tenant management

Get Started with Multi-Tenant Management Today

Multi-Tenant Management is available to customers using the Abnormal Inbound Email Security product on either Microsoft 365 or Google Workspace.

Ready to learn more about Multi-Tenant Management? Schedule a demo today.

Secure New Tenants Faster with Multi-Tenant Management

See Abnormal in Action

Schedule a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
 
Integrates Insights Reporting 09 08 22

Related Posts

Zoom BC
Discover how Abnormal protects your Zoom messages and prevents attackers from using the application to breach your business.
Read More
B 5 22 23 SOC
Discover how Abnormal simplifies detection, enhances investigation, and automates remediation, increasing threat investigation efficacy at the SOC level.
Read More
B Phishing
Knowing what to do after receiving a phishing attack is essential for preventing costly consequences. Learn how to respond to Phishing attacks.
Read More
B 5 15 23 Israel BEC
Abnormal research into an advanced Israel-based threat group puts a spotlight on the continuing rise of BEC attacks.
Read More
B Slack
Discover how Abnormal secures your Slack and keeps collaborative apps from becoming entry points for attackers.
Read More
Copy of Blog Cover Template DO NOT EDIT OR DELETE
Discover key security risks present across collaborative cloud applications and how cybersecurity experts are responding based on ESG survey results.
Read More