Logo closeup dark green 6 FINAL

Gateway Church Focuses on Its Mission to Secure Trust with Its Congregants and Staff

Gateway chose Abnormal Security because of its uncompromising approach to prevent the email attacks that matter most. In the two years since they've deployed Abnormal, Gateway has not experienced a successful advanced email attack.

Company Overview

Industry: Religious Organization
Southlake, TX
Protected Mailboxes:


  • Targeted by regular phishing attempts, fraudulent invoices, and church member and staff impersonations
  • Many attacks bypassed Defender for Office 365
  • Security team bandwidth consumed by mitigating these email attacks

Business Impact:

  • Instant API-based integration into existing Microsoft 365 deployment
  • Immediate and automatic mitigation of email attacks
  • Comprehensive visibility into the types of attacks, key recipients, attacker strategy, and attacker origin
  • Blocked 112,000 email attacks to date
  • 3,000 mailboxes protected against ransomware, phishing, social engineering, impersonation, and spam and graymail
Gateway church environment

Securing Trust with the Congregation

Gateway Church is a Bible-based, evangelistic church founded in 2000. The church has more than 100,000 members attending each weekend across its nine campuses. It also streams services to more than 300,000 people. Gateway has established itself as one of the nation’s most celebrated faith-based institutions.

The church contends with the ever-evolving advanced email threat landscape on a global scale. As with all major organizations, threat actors attempt to disrupt its operations and communications with email attacks involving ransomware, fraud, phishing, and impersonation. In 2021, sophisticated threats increased with thousands of attacks that passed Microsoft 365 email defenses. However, with Abnormal we protected the integrity of our email communications with our continued defense-in-depth approach.

Gateway chose Abnormal Security because of its uncompromising, precision-based approach to prevent the email attacks that matter most. It augmented Defender with Abnormal’s behavioral AI and ML, which parses known good behavior to develop a deep understanding of people, relationships, and business context. Abnormal applies this to detect and stop socially-engineered email attacks before they reach individual mailboxes. Since deploying Abnormal, Gateway has not experienced a single successful advanced email attack.

Abnormal identifies and stops advanced email threats with such a high level of accuracy that we can focus on ministering to people, rather than spending our time recovering from email attacks. The solution is amazing and reduces our support workloads.
- Matt Manire, Executive Director of Information Security
Demo 2x 1

See the Abnormal Solution to the Email Security Problem

Protect your organization from the attacks that matter most with Abnormal Integrated Cloud Email Security.

Related Resources

B 05 16 22 Elara Caring
Elara Caring's CISO consistently saw employees struggle to sort authentic messages from email attacks. He knew there was a better solution to protect patient data and improve the employee experience.
Read More
B 04 08 22 Digital Everything Customer Story
Upon integration with Abnormal, a Fortune Global 500 financial services organization learned that not only had 11,000+ advanced email attacks per month been bypassing its secure email gateway but more than 70 of its vendors had compromised accounts.
Read More
B 03 21 22 CSC Customer Story
While CSC Generation has robust security measures in place, unfortunately, the same couldn't be said for their vendors. To mitigate the risk of payment fraud via compromised vendor accounts, the organization added Abnormal to their security stack and the results spoke for themselves.
Read More
B 04 14 22 CISCO Guide to Phishing
Because phishing emails target human behavior, create a sense of urgency, and appear to come from trusted senders, they can be incredibly difficult to detect. Stopping them before they reach employee inboxes is the key to staying safe.
Download Now
H1 threat report cover
From June-December 2021, Abnormal Security discovered that nearly all types of advanced email attacks grew in frequency, with a new trend of phone fraud using email as the first contact.
Download Now
Everise case study cover
By mid-2021, Everise had more than 11,000 employees to meet new demand for outsourced services. But the shift to remote work brought new email security risks. “Our people are good at what they do, but they’re not email security specialists, and attackers know that."
Read More
Resource 03 COATS
With Abnormal ICES layered over Microsoft Defender, Coats employees are free to focus on continuing the company’s 250-year tradition of innovation, rather than sorting through emails and trying to assess the risks.
Read More
Webinar phish soc cover
Most people believe that the SOC is on the front lines, defending the castles against the forces of darkness. And while that’s true, it’s never quite as heroic as we’d like it to be.
Watch Now
Fireside chat katz cover
Legitimate email communications often contain links and attachments, and employees need to click on those links and attachments to do their jobs. Unfortunately, securing the enterprise often means stopping employees from doing so in an effort to stop bad actors from gaining access to systems or stealing money.
Watch Now
Fortune 200 wealth cover
As a leader in insurance and asset management, this Fortune 200 company recognizes that its security must protect its employees and customers from cyber attacks. Customers place their trust and their assets in the control of this company, so the security team built a robust solution reducing risk, gaining visibility, and securing user identity—the new perimeter.
Read More
Human element whitepaper cover
The challenge of dealing with cybercrime is complex. Human factors and the human-computer interface are a central component of cybersecurity, and while technology alone will not prevent cybercrime, neither will people. People alone also can also not be relied upon as a last line of defense in an organization’s cybersecurity strategy.
Download Now
Human element webinar cover 2
Cybersecurity is largely a behavioral concern, as cybercriminals use social engineering to trick people into transferring money, entering their credentials, or providing access to sensitive data.
Watch Now
Key considerations webinar cover
Email is both a necessary communication medium, and the most vulnerable area for an attack. Year after year, adversaries find success in abusing email to gain a foothold into an organization—deploying malware, leaking valuable data, or stealing millions of dollars.
Watch Now
B Gartner Highlights 1
The Gartner Market Guide for Email Security explains what integrated cloud email security (ICES) solutions are and why they’re essential for modern enterprises. Download a copy now to learn why enterprises are moving away from the SEG.
Read More