What Our $50M Series B Investment Means for Our Customers

November 18, 2020
When we founded Abnormal Security more than two and a half years ago, we met with 50 top CIOs and CISOs who told us two things: they needed a solution to stop a novel set of cyberattacks that increasingly bypassed legacy email security solutions, and they needed it to be cloud-native, easy to evaluate, and simple to operate.

With this in mind, we started the company with two key principles:
  • Customer focus. Everything we do should help solve these critical customer problems.
  • Act with urgency. Knowing that these organizations were under attack and exposed, we had to act quickly and with urgency.

Our focus has been unwavering—to help our customers by solving their biggest, costliest, and most challenging cybersecurity threats. Our platform is quick to deploy and easy to use—we integrate to Microsoft Office 365 and Google Workspace via native APIs in just one click, and our AI engine goes to work immediately to understand the normal behaviors of the organization. The entire system is self-configuring and delivers results immediately, blocking the most sophisticated, targeted email attacks.

Doubling Down for Our Customers

Our customers have told us not only about the incredible value we provide, but also how quickly they realize it. This is the primary reason for our tremendous growth in the Fortune 1000, which is further fueled by the growing importance of email security as enterprises shift to remote work and accelerate cloud deployments.

Our early customers were visionaries. They partnered with us and their feedback directly drove the product that we offer today. Collectively, we’re confident that we have a solution that can help all enterprises.

This is why we’re thrilled to welcome Venky Ganesan and Menlo Ventures, who led our $50 million Series B funding, to our team. After spending time with our customers, he recognized the opportunity to continue investing in our technology platform and scale our teams so we could protect and support every enterprise around the world. As he said in his blog post on Menlo’s investment today, “every CISO should set their sights on Abnormal as an essential investment to complete their cloud office security strategy.”

What This Means for Our Customers

I’m even more excited about the number of benefits this investment provides our customers, including:

  • Greater value. We're extending our value as the most effective threat detection solution for enterprise email security by growing our machine learning and data science teams.
  • Greater capabilities. We're extending our platform to more broadly protect cloud office environments and supply chains.
  • Greater customer support. We're expanding our enterprise customer success team to ensure our customers get more value from our platform.

Being a cloud-native platform that integrates via APIs provides us with access to 10x more data than any email security solution on the market. This data set is diverse, including information about people and identity, relationships, and business context to understand the baseline behaviors of people inside companies. This makes our AI threat detection engine the most effective at recognizing abnormal behavior, which is more important than memorizing threat intelligence for stopping social engineering attacks such as impersonation or vendor compromise.

It also allows us to expand the value we provide beyond email security to more deeply protect the collaboration environments that remote workers rely upon, as well as help with data loss prevention and supply chain security in the future. We’re excited to continue growing our team and building on our success for the benefit of our customers.

For more details on today’s news, I invite you to check out this article by Kenrick Cai of Forbes. If you’d like to learn more about how Abnormal can help you today, we’d love to connect for a demo. Evaluating the platform could not be easier because of our one-click integration. In fact, our customers have called it “the best five minutes of integration effort that you’ve ever had to return on investment.”

While today is an important milestone, we know the job of satisfying our customers and prospects never stops. With more resources behind us, they can count on us to do it with even greater urgency. We look forward to continuing to iterate, improve, and provide value to you.

Previous
Blog white circular sky
At Abnormal Security, one of our key objectives is to build a detection engine that can continuously adapt to a changing attack landscape. As such, we want to ensure that our systems can rapidly adjust to recent and high-value messages—even with...
Read More
Next
Blog earth lights
Sophisticated social engineering email attacks are on the rise and getting more advanced every day. They prey on the trust we put in our business tools and social networks, especially when a message appears to be from someone on our contact list, or even...
Read More

Related Posts

Blog engineering cybersecurity careers
Cybersecurity Careers Awareness Week is a great opportunity to explore key careers in information security, particularly as there are an estimated 3.1 million unfilled cybersecurity jobs. This disparity means that cybercriminals are taking advantage of the situation, sending more targeted attacks and seeing greater success each year.
Read More
Blog hiring cybersecurity leaders
As with every equation, there are always two sides and while it can be easy to blame users when they fall victim to scams and attacks, we also need to examine how we build and staff security teams.
Read More
Cover automated ato
With an increase in threat actor attention toward compromising accounts, Abnormal is focused on protecting our customers from this potentially high-profile threat. We are pleased to announce that our new Automated Account Takeover (ATO) Remediation functionality is available.
Read More
Email spoofing cover
Email spoofing is a common form of phishing attack designed to make the recipient believe that the message originates from a trusted source. A spoofed email is more than just a nuisance—it’s a malicious communication that poses a significant security threat.
Read More
Cover cybersecurity month kickoff
It’s time to turn the page on the calendar, and we are finally in October—the one month of the year when the spooky becomes reality. October is a unique juncture in the year as most companies are making the mad dash to year-end...
Read More
Ices announcement cover
Abnormal ICES offers all-in-one email security, delivering a precise approach to combat the full spectrum of email-borne threats. Powered by behavioral AI technology and deeply integrated with Microsoft 365...
Read More
Account takeover cover
Account takeovers are one of the biggest threats facing organizations of all sizes. They happen when cybercriminals gain legitimate login credentials and then use those credentials to send more attacks, acting like the person...
Read More
Blog podcast green cover
Many companies aspire to be customer-centric, but few find a way to operationalize customer-centricity into their team’s culture. As a 3x SaaS startup founder, most recently at Orum, and a veteran of Facebook and Palantir, Ayush Sood...
Read More
Blog attack atlassian cover
Credential phishing links are most commonly sent by email, and they typically lead to a website that is designed to look like common applications—most notably Microsoft Office 365, Google, Amazon, or other well-known...
Read More
Blog podcast purple cover
Working at hyper-growth startups usually means that unreasonable expectations will be thrust on individuals and teams. Demanding timelines, goals, and expectations can lead to high pressure, stress, accountability, and ultimately, extraordinary growth and achievements.
Read More
Blog yellow skyline
No one wants to receive an email from human resources that they aren’t expecting. After all, that usually means bad news. And when we think there may be bad news, cybersecurity training tends to fall by the wayside. Threat actors know this, and they’re taking advantage of human emotions.
Read More
Blog rising building
There is little doubt that business email compromise and other advanced email threats are causing significant damage–both financial and reputational—to organizations worldwide. Because these never-before-seen attacks contain few indicators of compromise, they evade secure email gateways and other traditional email infrastructure...
Read More