Product overview hero

Additional Platform Features

Get actionable insights across all email security controls provided by Microsoft, Google, and Abnormal from a single pane of glass.

Provide fine-grained access to members of your team.

Integrated Dashboards For Actionable Insights

A 04 UI Screen trends 2x

Attack Trends Categorized By Type

Learn about the various attack strategies and which vectors bad actors are using to breach your organization, along with their counts, over any specified time period.

Use these insights to better arm your organization against specific threats using training, tools, and best practices.

A 05 UI Screen end user 2x

Identifies Most-Impersonated and Attacked End Users

See which employees are most commonly impersonated in mail attacks, and those who receive the most attacks.

These insights can help you prepare your organization, and these targeted employees, for the typical types of attacks they receive.

A 06 UI Screen dept 2x

Identifies Most-Attacked Departments

See which departments were most attacked within a specified time period.

Use this information to create targeted programs that train and equip teams to recognize and report malicious threats.

Data Privacy and Fine-Grained Access

A 07 UI Screen access 2x

Set Role-Based Access Controls

Set access for analysts at the sub-tenant level, and select precisely what they have access to. Options include:

  • No Access
  • Read-Only Access
  • Read and Write Access

To protect end-users’ email content, you may also toggle access to email content. When turned off, analysts will only be able to see email headers.

A 09 trust center 2x

Comprehensive Security and Privacy Practices

We are committed to providing secure products that support compliance and build trust.

Fully Automate Your SOC Workflows

Integrate with SIEM, SOAR, ITSM, and IAM solutions to enrich security insights and orchestrate workflows.


Augment your SIEM with metadata and risk scores for better attack correlation.


Trigger playbooks when users engage with bad email or compromised accounts.


Create tickets for compromised accounts or when users engage with bad emails.

Secure Email Gateways

Trigger automated post-delivery protection when gateways send alerts on missed attacks.

Phishing Training

Allow emails for training to pass inspections, and present reports on user engagement.

Identity Access Management

Log in to Abnormal via SSO, and to provide data to better detect account takeover attempts.


Our bi-directional architecture helps you set up your own custom integrations quickly and simply.

Trusted by Global Enterprises


See an Abnormal Product Demo

Related Resources

Video 2
Socially engineered email attacks are the #1 security threat facing companies today, accounting for more than 44% of all cybercrime losses. To stop these types of sophisticated email attacks, you need a fundamentally new approach to email security.
Read More
Webinar cover 1
Traditional cybersecurity infrastructure can’t stop new and emerging threats, particularly in the email channel, and cybercriminals are constantly changing their methods to stay one step ahead. Hear how Theresa Payton, first female White House CIO, thinks about these attacks.
Read More
Threat report 1
Cybercriminals upped their game over the last quarter—increasing the number of credential phishing attacks and account takeover attempts. In our quarterly threat report, Abnormal Security discovered significant increases in the number of brute force attacks and impersonation attempts.
Read More
Webinar cover 2
Ransomware is a major problem, and it’s not going away. To understand it, we must understand why threat actors turn to it—and how it can be stopped. The best way to do that is to chat with the masterminds behind these attacks.
Read More
Whitepaper cover 4
There's a problem with secure email gateways and other traditional email security systems—they don't stop the most dangerous attacks. Discover how Abnormal can detect and block them.
Read More