Videos

Microsoft Ignite: Bringing Next-Generation AI Innovation to the Enterprise

Evan Reiser​, CEO & Co-Founder of Abnormal Security
Jeff Ma​​, VP of Microsoft for Startups
Saam Motamedi, General Partner at Greylock Partners
Dean Perrine​, SVP, Deputy CISO of Fox

Microsoft Ignite: Why the Most Promising Startups are Choosing Azure

Evan Reiser​, CEO & Co-Founder of Abnormal Security
Jeff Ma​​, VP of Microsoft for Startups

Microsoft Ignite: Ask the Expert: Bringing Next-Generation AI Innovation to the Enterprise

Evan Reiser​, CEO & Co-Founder of Abnormal Security
Jeff Ma​​, VP of Microsoft for Startups
Saam Motamedi, General Partner at Greylock Partners

Product Demo Video

Learn more about how Abnormal Security protects enterprises from advanced targeted attacks including business email compromise.

Datasheets

Advanced Email Attack Protection

Abnormal Security Cloud Email Security Platform

Inbound Email Protection

Account Takeover Detection

SOC Platform Tools

Whitepapers

The CISO Guide to Business Email Compromise (BEC)

The CISO Guide to Vendor Email Compromise (VEC)

Augmenting Your Microsoft Office 365 EOP and ATP Email Security Infrastructure

ABX: Abnormal Behavior Technology

eBooks

Email Security Architectures From Exchange to Office 365

Case Studies

CSC Generation

Debt Collector Impersonation / Invoice Fraud Attack

Account Update / Invoice Fraud Attack

Reports

Q3 2021 Email Threat Report: Brute Force and Account Takeover Attempts Rise 671%

Abnormal Threat Research Report - May 2021

Abnormal Threat Research Report Q1 2021

Abnormal Quarterly BEC Report Q3 2020

Abnormal Quarterly BEC Report Q2 2020

Abnormal Quarterly BEC Report Q1 2020

On-Demand Webinars

Abnormal's Quarterly BEC Report: Trends in Q1 2020

Reducing Supply Chain Risk by Stopping Invoice Fraud

How AI Can Solve the Rise in BEC Attacks

Solution Briefs

Enterprise-Grade Email Security

Cloud Email Security Platform for Healthcare

Cloud Email Security Platform for Oil, Gas & Utilities

Want to learn more?

Schedule a personalized product demo to see:

  • Threat analytics, insights and reporting
  • Automated Triage, Investigation and response tools
  • Platform integrations into SIEM, SOAR
  • …and more
Threat analytics, insights and reporting

Want to learn more?

Schedule a personalized product demo to see:

  • Threat analytics, insights and reporting
  • Automated Triage, Investigation and response tools
  • Platform integrations into SIEM, SOAR
  • …and more