Insightful Reviews with 99% of
Customers Recommending Abnormal

 
Peer insights r TM rgb for gartnerblue bkgrnd 1

4.8

for 150 reviews on
Gartner® Peer Insights™
as of March 25, 2023

4.8

Read Reviews
 
 
5-stars

"Great product, needs work, but getting there"

Read Review
5-stars

"FirstName, LastName - Title, Company Title"

5-stars

"Austin A - Cybersecurity Engineer, Enterprise (>1000 emp.)"

5-stars

"Tim Apple - CEO, Apple Inc."

5-stars

"Bill Gates - Former CEO, Microsoft"

5-stars

"Excellent e-mail filtering. Set it and go."

5-stars

"Catch Phishing Emails Before They Catch You"

5-stars

"Abnormal love"

5-stars

"Great Partner, Better Product"

5-stars

"Why should you not wait any more to use Abnormal Security?"

5-stars

"Nothing Abnormal about Abnormal"

5-stars

"Very clever and powerful tool"

5-stars

"Abnormal team keep up the great work!"

5-stars

"Great experience with Abnormal. They've saved us time and money."

5-stars

"Great product!"

5-stars

"Best company."

5-stars

"great job abnormal"

5-stars

"Researched Squared"

5-stars

"Save Time for Other Tasks with Abnormal Security"

5-stars

"AMAZING tool for a HIGH cost"

5-stars

"Although still new to the product, its easy to use and appreciate the sense of security"

5-stars

"Very happy customer so far."

5-stars

"Good Company and products offered"

5-stars

"Easy PoC to Easy In-Line Protection"

5-stars

"Abnormal Security is a No Brainer Must Have!"

5-stars

"Abnormal is more than capable of handling your email security and spam needs"

5-stars

"Easy to setup, and great job at stopiing phishing emails"

5-stars

"Great choice for e-mail security !"

5-stars

"Best Email Security tool !!"

5-stars

"Abnormally Amazing!"

5-stars

"The best email protection out there."

5-stars

"Best Security Product of the decade!"

5-stars

"This will meet your organizations needs"

5-stars

"Abnormal provides intuitive security to email"

5-stars

"Time and Money Saver to stop Email attacks!"

5-stars

"Set it and forget it Email Security"

5-stars

"Abnormal is Our New Normal"

5-stars

"The best intelligent and amazing Cloud Email Security"

5-stars

"10/10 Would Recommend"

5-stars

"Thoughts on Abnormal"

5-stars

"Dead simple integration. Quick results that leave competitors in the dust."

5-stars

"Great fit for purpose security vendor"

5-stars

"Get a trial and see what your current product isn't catching!"

5-stars

"Perfect at stopping account takeovers."

5-stars

"Security product can prevent BEC and Phishing Attacks"

5-stars

"Ease and great security!"

5-stars

"Great email protection platform"

5-stars

"The best solution to the worst problem."

5-stars

"Next Generation Email Protection!"

5-stars

"Abnormal Security is evolving into the next gen email security gateway."

5-stars

"Helping us keep an eye on our communications"

5-stars

"Abnormally Outstanding In Today's Crowded Marketplace"

5-stars

"A must-go corporate email security tool with a promising roadmap"

5-stars

"Abnormal, an email security app that truly delivers on what they promise."

5-stars

"Great Product!"

5-stars

"Automation with Proven Effectiveness, saving us Time and Money across the board!"

5-stars

"Easy to implement and get real value quickly."

5-stars

"Abnormal casts a wide, easily deployable net; can be layered with existing systems."

5-stars

"Strong advocate of Abnormal"

5-stars

"Abnormal Addressing a long standing Email security Issues"

5-stars

"Abnormal Security is a great partner and effortlessly helps us to stop advanced attacks"

5-stars

"Abnormal exceeds expectations"

 

The GARTNER PEER INSIGHTS Logo is a trademark and service mark of Gartner, Inc. and/or its affiliates and is used herein with permission. All rights reserved. Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

 
 

Trusted by Global Enterprises

 

Related Resources

Everise case study cover
By mid-2021, Everise had more than 11,000 employees to meet new demand for outsourced services. But the shift to remote work brought new email security risks. “Our people are good at what they do, but they’re not email security specialists, and attackers know that."
Read More
Fortune 200 wealth cover
As a leader in insurance and asset management, this Fortune 200 company recognizes that its security must protect its employees and customers from cyber attacks. Customers place their trust and their assets in the control of this company, so the security team built a robust solution reducing risk, gaining visibility, and securing user identity—the new perimeter.
Read More
B 11 22 21 AAA
At Abnormal, our customers have always been our biggest priority. Customer obsession is one of our five company values, and we live this every single day as we provide the best email security protection available for the hundreds of companies who entrust us to protect their mailboxes.
Read More
B 02 14 23 Gartner report 2024
Abnormal’s fundamentally different approach to cloud email security provides the best protection against existing and emerging attack techniques.
Read More
Webinar microsoft cover
The emergence and evolution of advanced socially-engineered cyber attacks, including business email compromise, supply chain fraud, and ransomware, has organizations rethinking their security strategies and tech stacks.
Watch Now
Human element whitepaper cover
The challenge of dealing with cybercrime is complex. Human factors and the human-computer interface are a central component of cybersecurity, and while technology alone will not prevent cybercrime, neither will people. People alone also can also not be relied upon as a last line of defense in an organization’s cybersecurity strategy.
Download Now
Key considerations webinar cover
Email is both a necessary communication medium, and the most vulnerable area for an attack. Year after year, adversaries find success in abusing email to gain a foothold into an organization—deploying malware, leaking valuable data, or stealing millions of dollars.
Watch Now
Resource 04 Threat Report
Our threat report on ransomware shares insight on attack methods, locations, payouts, and more across 4,200 victims.
Download Now