Abnormal Security uses several metrics to monitor in realtime to ensure service uptime and availability. Every statistic is published from each instance through Prometheus and to Cloudwatch reporting and logging purposes. All these aggregated metrics are monitored in realtime to ensure uptime, SLA monitoring, health and the 99.9th percentile latencies.
Abnormal Security’s technology stack is based on a horizontally scalable architecture to seamlessly support the highest throughput and high scale deployments of up to millions of mailboxes. The architecture follows a Service Oriented Architecture pattern. The services are auto-scaled by using AWS and instances are automatically and seamlessly added to keep up with requests and throughput.
An OS upgrade is done by creating Amazon Machine Images. These are containerized using Docker, tested on local environments and then on staging environments before being pushed to production. We use sample and debug queries to verify the compatibility before upgrades. After pushing to production, alerts on success rates and overall business metrics determine the health of an upgrade. Systems are rolled back if the performance after upgrade is lower than before the upgrade.
We use RDS for MySQL with auto minor version upgrades. Major version upgrades will be a carefully planned operation with customized test suite generation, testing, deployment and rollback plans.
We have continuous monitoring services in place within our AWS infrastructure and we use Rippling endpoint security for device management. Similar to our product, we observe and report on anomalous behavior and have a dedicated team responsible for reviewing and addressing threat alerts. More details can be provided upon request.
Our uptime SLA is 99.9%
Several metrics are monitored in realtime to ensure service uptime and availability. Every interesting statistic is published from each instance through Prometheus and to Cloudwatch. All these aggregated metrics are monitored in realtime to ensure uptime, SLA monitoring, health and the 99th percentile latencies.
Real time.
Whenever there is any sort of activity within a user’s mailbox then our system will receive the notification and is reflected within our portal in real-time because of our connectivity to your mail storage tenant (M365 or G-Suite).
Global Admin access is required to approve the API integration. In addition to the Exchange APIs, Abnormal Security also uses the ActiveDirectory APIs, and security events APIs in order to ingest, canonicalize, and alert holistically on risky employees.
Schedule a personalized product demo to see:
Schedule a personalized product demo to see:
Abnormal is the email security company that stands for trust.
© 2021 Abnormal Security Corporation.
All rights reserved.