Abnormal Overview

Abnormal provides a fundamentally-different approach to email security that precisely blocks all email attacks.

An Exponential Increase in Modern Email Attacks
Modern attacks, including business email compromise, supply chain fraud, and ransomware, are on the rise. According to the FBI, business email compromise alone accounted for nearly 35% of all cybercrime losses in 2021, and that number is only growing as threat actors become more effective.

Modern Attacks Evade Secure Email Gateways
Traditional defenses rely on conventional threat intelligence and known-bad indicators to block email threats. Modern attacks bypass secure email gateways because they come from trusted sources and do not contain malicious links or attachments.

You Need a Modern Approach to Email Security
Abnormal provides a fundamentally-different approach that precisely blocks all email attacks. Our modern, cloud-native API architecture continuously baselines known-good behavior by leveraging identity, behavior, and content to detect and remediate anomalies.

Abnormal Overview

About abnormal

Key Differentiators

Key differentiators

Why Should You Care?

Why care abnormal

We Protect Organizations From the Attacks That Matter Most

Supply Chain Compromise

There’s a 25% chance of your organization being targeted by a supply chain attack this week. These attacks evade secure email gateways because they come from trusted senders whose accounts have been compromised.

How Abnormal Stops It:

  • Automatically knows your vendors. Abnormal’s VendorBase auto-identifies suppliers, vendors, and partners based on past email communications and other signals gathered across the entire enterprise ecosystem.
  • Continuously assesses vendor risk and reputation. We assign a risk score for each vendor based on domains spoofed, accounts compromised, and suspicious business.
  • Inspects content, tone, and attachments. Abnormal inspects emails and attachments for suspicious information and identifies when a vendor has been compromised.

Executive Impersonation

29% of all socially-engineered attacks are a result of impersonation. These emails slip by secure email gateways because they are often text-based and rarely contain links or attachments.

How Abnormal Stops It:

  • Inspects email headers to expose impersonations. By analyzing header information, Abnormal can determine when an email domain has been spoofed.
  • Detects suspicious language, tone, and style. Even when messages contain no links or attachments, Abnormal recognizes language that is typical of phishing attacks.
  • Understands communication patterns. Abnormal uses natural language processing to understand individual behaviors, communication patterns, typical tones, and usual message content.

Account Takeover

26% of companies are targeted by account takeover attacks each week. When successful, threat actors receive access to sensitive information and can use these compromised accounts to launch further attacks.

How Abnormal Stops It:

  • Detects compromised accounts. By understanding and baselining normal login frequency, locations, devices, browsers, and IP addresses, Abnormal can determine when an account has been compromised.
  • Disarms takeovers automatically. Logs users out of active sessions, requires password resets, and helps affected users regain access.
  • Provides incident management and reporting. Allows teams to streamline remediation via integrations with IAM, SIEM, and SOAR tools.


76% of ransomware is delivered via email. Secure email gateways often miss these attacks when attackers combine social engineering with their ransomware schemes.

How Abnormal Stops It:

  • Detects suspicious correspondence patterns and credential phishing attempts. Abnormal uses identity detection and natural language processing to detect phishing attempts and other
    suspicious emails.
  • Blocks malicious attachments and links. The platform reviews all attachments and links to ensure they are safe, even if those links redirect upon click.
  • Provides explainable insights and malware forensics to security teams. Abnormal automatically prepares a detailed analysis of ransomware attempts, allowing teams to preview the content of attachments and link targets.

To learn more about how Abnormal can stop these attacks for you, request a demo of the platform today.

Abnormal Overview

See Abnormal in Action

Schedule a Demo

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
Integrates Insights Reporting 09 08 22

Related Resources

B 01 12 23 ESG Tech Validation
This technical validation report details ESG's analysis of the Abnormal Cloud Email Security platform.
Read More
B 01 12 23 ADT video 1
With Abnormal, ADT has a robust security solution that protects its employees from advanced email attacks.
Read More
B 12 09 22 December Demo Day
A recap of the key updates and releases Abnormal delivered in 2022, from technical enhancements to entirely new solutions and partnerships.
Watch Now
B 1500x1500 Progress Residential demo L1 R1
Noah Wallace, Director of InfoSec at Progress Residential, shares the success and time-savings he's achieved since partnering with Abnormal.
Watch Now
B 12 05 22 1500x1500 Resource Center Analyst L1 R1
Learn how investing in Abnormal Security can yield a 278% ROI within 3 years and help your organization avoid $4 million in losses from BEC.
Read More
B 11 14 22 Security Posture Management Demo on Resources Page
Abnormal's New Security Posture Management add-on module proactively improves the posture of Cloud Email environments by helping security teams increase their risk visibility.
Read More
B 1500x1500 Security Posture Management Datasheet L2 R1 2x
Discover and mitigate misconfiguration risks across your cloud email environment.
Read More
B Demo Days Air Canada 1500x1500
Discover how Abnormal provides better intelligence on blocked attacks, freeing time for Air Canada analysts to focus on other threats.
Watch Now
B 1500x1500 Threat Log L2 R2 2x
Understanding and analyzing the hundreds of email or texts organization sees a day consumes hours of time. To help, Abnormal Security offers Threat Log, a record of every malicious email flagged by our AI-based detection engine.
Read More