Integrated Cloud Email Security

Protect your end users from the full spectrum of targeted email threats: phishing, ransomware, fraud, social engineering, supply chain attacks, executive impersonation, spam, and graymail. Detect and remediate compromised accounts. Integrate with Microsoft 365 and Google Workspace via a one-click API without disrupting mail flow. No MX record changes, configuration, or custom policies are needed.

Highest-Precision Protection Against All Attacks

Secure email gateways struggle to block socially-engineered attacks that pass reputation checks, have no links or attachments, and appear to come from trusted sources. The Abnormal Integrated Cloud Email Security (ICES) platform profiles known good behavior and analyzes over 45,000 signals to detect anomalies that deviate from these baselines, and then precisely blocks all socially-engineered and unwanted emails—both internal and external—and detects and remediates compromised accounts.

Ices highest precision

Remove Your Secure Email Gateway

Organizations that require comprehensive inbound email protection are stuck with multiple products, incompatible architectures, unnecessary expense, and management overhead. With ICES, you can simplify your stack by eliminating the redundant email gateway layer and re-enabling and enhancing Microsoft’s cloud gateway capabilities.

Ices defense in depth

Enhance Microsoft, Google, and Email Gateway Security with Behavioral AI

By deeply understanding entities—users and vendors, their behavior, relationships, and tone and content shared—Abnormal ICES precisely detects anomalies and blocks attacks that regularly evade Microsoft, Google, and secure email gateways.

Ices identity analysis

Profiles All Your Vendors For Potential Threats

Your organization’s security posture is only as strong as the security posture of your vendors. Soon after integration, ICES reviews all your emails to extract your vendor relationships. It monitors your vendors for security risks observed across the entire enterprise ecosystem, automatically identifies when vendor accounts have been compromised, and protects your end users from them.

Ices profiles vendors

Automate Your Abuse Mailbox

Abnormal ICES centralizes user-reported phishing attacks, and automatically investigates, remediates, and notifies reporters on the results. Approximately 90% of submissions are known to be safe emails, and this automation saves security teams many hours each week.

Fully Automate SOC Operations

Fully automate triage, investigation, remediation, and reporting, for both auto-detected and user-reported email threats. Abnormal natively integrates with SIEM and SOAR tools to enrich insights and to orchestrate workflows.

Use Search and Respond to rapidly contain missed attacks or misdirect emails with sensitive information. Detection 360° provides an opportunity to have false negatives or false positives reviewed and remediated promptly, by the Abnormal team.

Ices automate soc

Improved End User Experience and Productivity

Abnormal learns end-user preferences by observing how they move messages between folders, allowing it to automatically create and manage individualized safe and blocklists, as well as deliver spam and graymail to junk and promotional folders respectively. End users no longer have to rely on spam and quarantine digests to salvage missed messages.

Integrates Insights and Reporting

Centralize metrics, insights, and actions across email security solutions, and the management of global blocklists across hundreds of tenants, from a single pane of glass.

Deploys in Minutes and Proven to Save You Time

The Abnormal cloud-native API architecture simplifies deployment and improves response times. Get started today.

Related Resources

Video 1
Abnormal can determine when legitimate end users have accessed accounts, or when a bad actor has accessed them, by understanding key attributes like common IP addresses, or if the device has been accessed...
Read More
Webinar cover 4
CISOs deal with a multitude of threats that can have significant financial and reputational impacts. Of those threats, business email compromise is the #1 attack type, costing businesses almost as much as all other cybersecurity incidents combined.
Read More
Video 2
Socially engineered email attacks are the #1 security threat facing companies today, accounting for more than 44% of all cybercrime losses. To stop these types of sophisticated email attacks, you need a fundamentally new approach to email security.
Read More
Video 1
With Abnormal, security teams can now eliminate redundant email gateways and enhance Microsoft's built-in security capabilities. Once integrated via one-click API, Abnormal automatically profiles your VIPs and employees, their behavior, relationships, communication patterns...
Read More
Data sheet 1
Protect your end users from the full spectrum of targeted email threats: phishing, ransomware, fraud, social engineering, supply chain attacks, executive impersonation, spam, and graymail. Integrate with Microsoft 365 and Google Workspace via a one-click API without disrupting mail flow. No MX record changes, configuration, or custom policies are needed.
Read More
Data sheet 4
Supercharge your SOC workflows and save time with AI-assisted investigation, auto-remediation, follow-up, and reporting. Abnormal provides a frictionless method for user-reported phishing attacks to be submitted, triaged, and reviewed.
Read More
Data sheet 3
By understanding normal behavior, Abnormal can detect any deviations in these baselines to uncover potentially compromised accounts and then immediately remediate them. When left undetected, attackers can use compromised accounts to exfiltrate sensitive data or send lateral phishing emails.
Read More
Data sheet 2
Secure email gateways struggle to block socially-engineered attacks that pass reputation checks, have no links or attachments, and appear to come from trusted sources. The Abnormal Integrated Cloud Email Security (ICES) platform profiles known good behavior and analyzes over 45,000 signals to detect anomalies.
Read More
Webinar cover 2
Ransomware is a major problem, and it’s not going away. To understand it, we must understand why threat actors turn to it—and how it can be stopped. The best way to do that is to chat with the masterminds behind these attacks.
Read More
Webinar cover 1
Traditional cybersecurity infrastructure can’t stop new and emerging threats, particularly in the email channel, and cybercriminals are constantly changing their methods to stay one step ahead. Hear how Theresa Payton, first female White House CIO, thinks about these attacks.
Read More
Webinar cover 3
While you may be confident in your own email security, the truth is that your security is only as good as the security of your partners and vendors. Discover why vendor email compromise is such an important part of your security strategy.
Read More
Threat report 3
Read the Q1 2021 threat report to learn the latest on vendor email compromise, including which scams are most successful and why the volume of attacks has grown so significantly.
Read More