Abstract White Joint

Abnormal Overview

Abnormal provides a fundamentally-different approach to email security that precisely blocks all email attacks.

An Exponential Increase in Modern Email Attacks
Modern attacks, including business email compromise, supply chain fraud, and ransomware, are on the rise. According to the FBI, business email compromise alone accounted for nearly 35% of all cybercrime losses in 2021, and that number is only growing as threat actors become more effective.

Modern Attacks Evade Secure Email Gateways
Traditional defenses rely on conventional threat intelligence and known-bad indicators to block email threats. Modern attacks bypass secure email gateways because they come from trusted sources and do not contain malicious links or attachments.

You Need a Modern Approach to Email Security
Abnormal provides a fundamentally-different approach that precisely blocks all email attacks. Our modern, cloud-native API architecture continuously baselines known-good behavior by leveraging identity, behavior, and content to detect and remediate anomalies.

Abnormal Overview

About abnormal

Key Differentiators

Key differentiators

Why Should You Care?

Why care abnormal

We Protect Organizations From the Attacks That Matter Most

Supply Chain Compromise

There’s a 25% chance of your organization being targeted by a supply chain attack this week. These attacks evade secure email gateways because they come from trusted senders whose accounts have been compromised.

How Abnormal Stops It:

  • Automatically knows your vendors. Abnormal’s VendorBase auto-identifies suppliers, vendors, and partners based on past email communications and other signals gathered across the entire enterprise ecosystem.
  • Continuously assesses vendor risk and reputation. We assign a risk score for each vendor based on domains spoofed, accounts compromised, and suspicious business.
  • Inspects content, tone, and attachments. Abnormal inspects emails and attachments for suspicious information and identifies when a vendor has been compromised.

Executive Impersonation

29% of all socially-engineered attacks are a result of impersonation. These emails slip by secure email gateways because they are often text-based and rarely contain links or attachments.

How Abnormal Stops It:

  • Inspects email headers to expose impersonations. By analyzing header information, Abnormal can determine when an email domain has been spoofed.
  • Detects suspicious language, tone, and style. Even when messages contain no links or attachments, Abnormal recognizes language that is typical of phishing attacks.
  • Understands communication patterns. Abnormal uses natural language processing to understand individual behaviors, communication patterns, typical tones, and usual message content.

Account Takeover

26% of companies are targeted by account takeover attacks each week. When successful, threat actors receive access to sensitive information and can use these compromised accounts to launch further attacks.

How Abnormal Stops It:

  • Detects compromised accounts. By understanding and baselining normal login frequency, locations, devices, browsers, and IP addresses, Abnormal can determine when an account has been compromised.
  • Disarms takeovers automatically. Logs users out of active sessions, requires password resets, and helps affected users regain access.
  • Provides incident management and reporting. Allows teams to streamline remediation via integrations with IAM, SIEM, and SOAR tools.


76% of ransomware is delivered via email. Secure email gateways often miss these attacks when attackers combine social engineering with their ransomware schemes.

How Abnormal Stops It:

  • Detects suspicious correspondence patterns and credential phishing attempts. Abnormal uses identity detection and natural language processing to detect phishing attempts and other
    suspicious emails.
  • Blocks malicious attachments and links. The platform reviews all attachments and links to ensure they are safe, even if those links redirect upon click.
  • Provides explainable insights and malware forensics to security teams. Abnormal automatically prepares a detailed analysis of ransomware attempts, allowing teams to preview the content of attachments and link targets.

To learn more about how Abnormal can stop these attacks for you, request a demo of the platform today.

Related Resources

B Demo Days Webinar01
In this on-demand recording of our first “Abnormal Demo Day”, we explore key platform features and capabilities designed to address today’s toughest security challenges.
Watch Now
B 08 08 22 Graymail Datasheet
Improve employee productivity and measure your time savings with adaptive graymail protection.
Read More
B 05 03 22 Using Modern Email Security Webinar
Secure email gateways (SEGs) focus on searching for known bad domains, attachments, and links. But threat actors have changed their tactics—opting to deceive humans instead of technology. It’s time for a modern solution to the email security problem, one that detects and prevents these attacks.
Watch Now
Resource 05 Webinar
With the rise of modern attacks such as supply chain compromise, executive impersonation, and account takeover, it's become obvious: the SEG no longer works. Learn what you need for complete defense in depth protection.
Watch Now
Abnormal microsoft data sheet cover
Complement native Microsoft defenses with precise, behavioral analysis-based protection against email and account takeover attacks.
Read More
Video 1
Abnormal can determine when legitimate end users have accessed accounts, or when a bad actor has accessed them, by understanding key attributes like common IP addresses, or if the device has been accessed...
Watch Now
Video 2
Socially engineered email attacks are the #1 security threat facing companies today, accounting for more than 44% of all cybercrime losses. To stop these types of sophisticated email attacks, you need a fundamentally new approach to email security.
Watch Now
Video 1
With Abnormal, security teams can now eliminate redundant email gateways and enhance Microsoft's built-in security capabilities. Once integrated via one-click API, Abnormal automatically profiles your VIPs and employees, their behavior, relationships, communication patterns...
Watch Now