Discover the latest research and new insights from Abnormal.

Featured Resources

B 02 14 23 Gartner report 2024
Abnormal’s fundamentally different approach to cloud email security provides the best protection against existing and emerging attack techniques.
Read More
B 02 08 23 1500x1500 H12023 Threat Report
Abnormal’s latest report on business email compromise trends and statistics finds that employees open 28% of attacks and reply to 15% of them.
Download Now
B 12 05 22 1500x1500 Resource Center Analyst L1 R1
Learn how investing in Abnormal Security can yield a 278% ROI within 3 years and help your organization avoid $4 million in losses from BEC.
Read More
B 02 14 23 Gartner report 2024

2023 Gartner® Market Guide for Email Security

B 02 15 23 ROI Calculator

ROI Calculator: Discover Your Abnormal Return on Investment

B 02 08 23 1500x1500 H12023 Threat Report

H1 2023: “Read” Alert: Data Shows 28% of BEC Attacks Opened by Employees

B 12 05 22 1500x1500 Resource Center Analyst L1 R1

Forrester Total Economic Impact™ Study of Abnormal Security

Analyst Research

See All Analyst Research
B 3 9 23 TEI
This infographic depicts the highlights of Forrester's report on the three-year financial impact of Abnormal Security.
Read More
B 02 14 23 Gartner report 2024
Abnormal’s fundamentally different approach to cloud email security provides the best protection against existing and emerging attack techniques.
Read More
B 01 12 23 ESG Tech Validation
This technical validation report details ESG's analysis of the Abnormal Cloud Email Security platform.
Read More
B 12 05 22 1500x1500 Resource Center Analyst L1 R1
Learn how investing in Abnormal Security can yield a 278% ROI within 3 years and help your organization avoid $4 million in losses from BEC.
Read More
B 07 19 22 2022 Email Security Trends
We surveyed 300 security leaders to discover what matters most to them when it comes to email security in the current threat landscape.
Read More
B 07 06 22 SANS Whitepaper
This SANS Protects white paper explores some of the most common threats to enterprise email and shares a few ways organizations can block malicious emails from entering their environment.
Read More
B 02 08 23 1500x1500 H12023 Threat Report
Abnormal’s latest report on business email compromise trends and statistics finds that employees open 28% of attacks and reply to 15% of them.
Read More
B 08 08 22 H2 Threat Report com
From January-June 2022, Abnormal found a 48% increase in email attacks, and 68.5% of the attacks included a credential phishing link.
Read More
Report fscc cover
For years, executives were the go-to impersonated party in business email compromise attacks. Now, threat actors are opting to impersonate vendors and suppliers instead.
Read More
H1 threat report cover
From June-December 2021, Abnormal Security discovered that nearly all types of advanced email attacks grew in frequency, with a new trend of phone fraud using email as the first contact.
Read More
Resource 04 Threat Report
Our threat report on ransomware shares insight on attack methods, locations, payouts, and more across 4,200 victims.
Read More
Threat report 3
Read the Q1 2021 threat report to learn the latest on vendor email compromise, including which scams are most successful and why the volume of attacks has grown so significantly.
Read More
B Abnormal for Google Workspace
Increase your protection against advanced email threats and complement the built-in Gmail protection.
Read More
B 05 23 22 ICES Solution Brief
Abnormal Security leverages advanced behavioral data science to stop the full spectrum of email attacks.
Read More
B 1500x1500 Email Security Datasheet L1 R1 1
Stop the email attacks that bypass other solutions when you pair behavioral data science with risk-adaptive detection.
Read More
Abnormal microsoft data sheet cover
Complement native Microsoft defenses with precise, behavioral analysis-based protection against email and account takeover attacks.
Read More
B 1500x1500 Email Security Datasheet L2 R1
Prevent costly data breaches by detecting and mitigating email account takeovers in real time.
Read More
B 1500x1500 Abuse Mailbox Automation L2 R1
Automatically triage and remediate user-reported phishing emails.
Read More

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

B 03 15 23 ABX White Paper
Abnormal Behavior Technology (ABX) leverages innovative techniques to provide a revolutionary approach to detecting and mitigating targeted email attacks.
Read More
B 01 10 23 CISO Guide Email Platform Attacks
Preventing new threats like email platform attacks requires a proactive approach to cloud email security and increased visibility across the cloud platform environment.
Read More
B Essential Guide
Discover common email security challenges, critical capabilities for cloud email security, and 10 considerations to shape your cloud email security strategy.
Read More
B Account Takeover 08 22 22
Even one successful compromised account can start a cascade of other internal and external attacks, making it possibly the most dangerous email threat organizations face.
Read More
B 04 14 22 CISCO Guide to Phishing
Because phishing emails target human behavior, create a sense of urgency, and appear to come from trusted senders, they can be incredibly difficult to detect. Stopping them before they reach employee inboxes is the key to staying safe.
Read More
Ciso guide ransomware cover
The debilitating Colonial Pipeline attack in 2021, which cost the organization $4.4 million to restore the data, highlights the devastating consequences of ransomware and why nearly one in three companies hit with an attack is likely to pay the fee.
Read More

Customer Stories

B 1 05 22 VBCPS
With a small team, complex challenges, & limited resources, Virginia Beach City Public Schools needed better security tools. Learn why they chose Abnormal.
Read More
B 01 12 23 ADT video 1
With Abnormal, ADT has a robust security solution that protects its employees from advanced email attacks.
Read More
B 1500x1500 Green Hill Case Study 12 09 22
With Abnormal protecting inboxes & enhancing incident response, investment banking firm Greenhill can focus on guiding clients through complex events.
Read More
B 11 30 22 EAB vid
With thousands of threats stopped, Abnormal has freed up EAB’s security team to focus on improving access to education rather than investigating and remediating email threats.
Read More
B 10 19 22 AC Transit Vid 1
Together, Abnormal and Microsoft provide AC Transit with a robust, efficient security solution that blocks advanced threats from reaching inboxes.
Read More
B 10 05 22 Sentara
With Abnormal, not-for-profit healthcare organization Sentara enjoys reduced inbox threats, better employee email experiences, and more time to cultivate cybersecurity talent.
Read More
B Abnormal Demo Day SPM Cloud Email
Learn about the cyber risks associated with more robust, complex cloud email platforms and how security posture management can reduce your vulnerabilities.
Read More
B Demo Day Ways Abnormal Secures Email Environment
Get an in-depth look at the Abnormal platform and see the top 5 features our customers have adopted to successfully mitigate advanced email attacks.
Read More
B Myth of Cybersecurity OD Webinar
Cybersecurity expert Dr. Eric Cole discusses how the threat landscape is changing and steps you can take to make sure you’re as protected as possible.
Read More
B 5 Email Attacks Webinar
In this interview with SecureWorld, Crane Hassold, Abnormal's Director of Threat Intelligence, shares real-world examples of advanced email attacks.
Read More
B 1 23 23 Demo D Ay
Tas Jalali, Head of Cybersecurity at AC Transit speaks with Abnormal about his security strategy for the new year.
Read More
B 12 09 22 December Demo Day
A recap of the key updates and releases Abnormal delivered in 2022, from technical enhancements to entirely new solutions and partnerships.
Read More

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

B 10 19 22 Product Demo Platform
Socially engineered email attacks are the #1 security threat facing companies today, accounting for more than 44% of all cybercrime losses. To stop these types of sophisticated email attacks, you need a fundamentally new approach to email security.
Read More
B 10 19 22 Product Demo Inbound
With Abnormal, security teams can now eliminate redundant email gateways and enhance Microsoft's built-in security capabilities. Once integrated via one-click API, Abnormal automatically profiles your VIPs and employees, their behavior, relationships, communication patterns...
Read More
B 1500x1500 Email Account Takeover Protection L1 R2 2x
Abnormal can determine when legitimate end users have accessed accounts, or when a bad actor has accessed them, by understanding key attributes like common IP addresses, or if the device has been accessed...
Read More
B 1500x1500 Abuse Mailbox Automation L1 R2 2x
Completely automate your user-reported email workflow and free up analyst time with the Abuse Mailbox Automation add-on to Abnormal Inbound Email Security.
Read More
B 11 14 22 Security Posture Management Demo on Resources Page
Abnormal's New Security Posture Management add-on module proactively improves the posture of Cloud Email environments by helping security teams increase their risk visibility.
Read More
B 1500x1500 Email Productivity L1 R2 2x
Abnormal email productivity for Microsoft 365 utilizes advanced behavioral AI and natural language processing models to identify time-wasting graymail messages and automatically send them to a promotions folder.
Read More
B Abnormal for K 12 Education
Schools are increasingly popular targets for advanced email attacks. See how Abnormal blocks these threats.
Read More
B 1500x1500 Hospitality L1 R1
Threat actors target hospitality businesses to steal troves of personally identifiable information. Learn how Abnormal stops these attacks.
Read More
B 1500x1500 Transportation Industry L1 R1
Cybercriminals target the transportation industry to worsen supply chain strains or put the public at risk. Learn how Abnormal prevents these attacks.
Read More
B 1500x1500 Energy Industry L2 R1
Threat actors routinely target energy and infrastructure providers to disrupt critical operational technologies. Learn how Abnormal blocks these attacks.
Read More
B 10 18 22 Abnormal for Manufacturing
Attackers go after manufacturers to steal data, engage in corporate or nation-state espionage, and commit financial fraud. Learn how Abnormal protects manufacturers.
Read More
B NHS
The NHS is a magnet for cybercriminals, with 81% of organisations across the UK suffering a ransomware attack in the past year. Learn how Abnormal protects the NHS.
Read More
B Abnormal Security Integrates with Microsoft Sentinel
Learn about the integration between Abnormal Security and Microsoft Sentinel.
Read More
B Video Redefining Cloud Email Security
Abnormal's Head of Marketing, Arun Singh, explores the new solutions and strategies needed for the detection of and defense against advanced email attacks.
Read More
B Securing Cloud Email Video
Abnormal Security's CISO, Mike Britton, shares how enterprises can protect their cloud email environments from inbound attacks and email platform attacks.
Read More
B Email as a Threat Vector Video
Abnormal's Director of Threat Intelligence, Crane Hassold, discusses the inherent weaknesses of email and how organizations can defend against attacks.
Read More
B TAG Cyber Interview Mike
Abnormal's CISO Mike Britton discusses new and emerging email attacks and why organizations should rethink cloud email security with Ed Amoroso of TAG Cyber.
Read More
B 1 19 23 Arch Capital OPT2
See why the Arch Insurance team considers Abnormal’s platform to be a highly effective, easy-to-use risk reduction solution.
Read More

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

B 02 15 23 ROI Calculator
Discover the ROI you can experience with Abnormal Security.
Read More
B 10 05 22 Cloud Email Security Strategy Checklist
Determine what you need from a cloud email security platform and ensure you ask the right questions when evaluating potential solutions.
Read More
Blog cybersecurity awareness month
It's important to take time to evaluate your email security practices, both for your employees and across your organization. These resources can help.
Read More
 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
 
Integrates Insights Reporting 09 08 22