00 Org knowledge hub 1 POSTER FRAME copy

Your Integrated Cloud Email Security Platform

Protect users in your organization from the full spectrum of targeted email attacks: phishing, ransomware, fraud, social engineering, executive impersonation, spam, graymail, and more.

Abnormal precisely baselines good behavior to block malicious and unwanted emails that evade other security solutions.

Socially-Engineered Attacks Evade Cloud Email Security and Secure Email Gateways


of all cybercrime losses are due to socially-engineered email attacks

2020 IC3 Internet Crime Report


average loss to businesses due to business email compromise

Data Breach Investigations Report, 2020


chance of being attacked by a compromised vendor account

Threat Research Report, Q3 2021

Precisely Block All Email Attacks With Abnormal

Deploys in minutes. No configuration or custom policies needed.
Defense In Depth v6

Replace Your Secure Email Gateway

Simplify your email security stack by eliminating the redundant secure email gateway layer, and re-enabling and enhancing cloud gateway capabilities built into Microsoft and Google.

Unify your entire inbound email security defenses, from email hygiene to zero-day advanced attacks.

Highest-Precision Protection Against All Email and Account Takeover Attacks

Deeply Integrates With Cloud Security

Fully Automate Your SOC Workflows

Integrate with SIEM, SOAR, ITSM, and IAM solutions to enrich security insights and orchestrate workflows.


Augment your SIEM with metadata and risk scores for better attack correlation.


Trigger playbooks when users engage with bad email or compromised accounts.


Create tickets for compromised accounts or when users engage with bad emails.

Secure Email Gateways

Trigger automated post-delivery protection when gateways send alerts on missed attacks.

Phishing Training

Allow emails for training to pass inspections, and present reports on user engagement.

Identity Access Management

Log in to Abnormal via SSO, and to provide data to better detect account takeover attempts.


Our bi-directional architecture helps you set up your own custom integrations quickly and simply.

Trusted by Global Enterprises


See an Abnormal Product Demo

Related Resources

Webinar cover 1
Traditional cybersecurity infrastructure can’t stop new and emerging threats, particularly in the email channel, and cybercriminals are constantly changing their methods to stay one step ahead. Hear how Theresa Payton, first female White House CIO, thinks about these attacks.
Read More
Whitepaper cover 5
In today’s cloud-first approach to managing corporate infrastructure and running applications, more than 56% of organizations globally now use Microsoft Office 365. See how Abnormal can help you augment your infrastructure to block the most dangerous attacks.
Read More
Ices announcement cover
Abnormal ICES offers all-in-one email security, delivering a precise approach to combat the full spectrum of email-borne threats. Powered by behavioral AI technology and deeply integrated with Microsoft 365...
Read More
Threat report 1
Cybercriminals upped their game over the last quarter—increasing the number of credential phishing attacks and account takeover attempts. In our quarterly threat report, Abnormal Security discovered significant increases in the number of brute force attacks and impersonation attempts.
Read More
Blog gears cover
The threat actor behind the SolarWinds attack, the Russian-based Nobelium, has orchestrated another successful vendor email compromise attack, this time targeting the United States Agency for International Development (USAID). According to Microsoft’s...
Read More
Webinar cover 3
While you may be confident in your own email security, the truth is that your security is only as good as the security of your partners and vendors. Discover why vendor email compromise is such an important part of your security strategy.
Read More