About the Abnormal Platform

Video Transcript

Evan Resier, CEO and Co-Founder

Socially engineered email attacks are the #1 security threat facing companies today, accounting for more than 44% of all cybercrime losses. To stop these types of sophisticated email attacks, you need a fundamentally new approach to email security.

During this demo, you'll see how Abnormal Integrated Cloud Email Security, or ICES for short, precisely blocks attacks that were previously considered unstoppable. Unlike secure email gateways, its API-based architecture gives deeper visibility, combined with the behavioral AI which detects even the most subtle anomalies, to make Abnoraml extremely effective in blocking sophisticated attacks like social engineering, fraud, and internal attacks from compromised accounts.

When an employee's email account has been compromised, the attackers access sensitive information and use that trusted identity to bypass existing security controls and freely target other employees. Unlike secure eamil gateways, Abnoraml ICES builds a behavioral model of every individual employee and the entire supply chain to detect anoamlous user behavior and then scans all internal emails to stop these types of attacks.

In this example, Renee, the VP of Finance, sends an internal email to her colleagues Zach and Josh, requesting a wire transfer. The email account is trusted and the links appear safe, and the attachments are not malicious. However, Abnoraml ICES blocks this email by identityfing abnormal behaviors beyond these superficial indicators. Renee has never logged in from Hong Kong, a suspicious email rule filter was created, and Orion Limited is not a vendor they've ever worked with before. And finally, this email conveys an urgent financial request which identifies it as a high-risk communication.

By leveraging data through the API architecture, Abnormal has unique visibilty into Renee's account bheavior, which reveals a timeline of anomalous events identifying it at a compromised account. Abnormal ICES can automatically sign out of all these sessions, block access to the account, and can even trigger a password rest.

The Abnormal ICES behavioral AI enhances the threat intelligence-based solutions provided by Microsoft 365, as well as by secure email gateways. It brings together metrics across all these different solutions to dramatically simplify reporting and give you actional insights.

Abnormal protects enterprises by providing comprehensive email security to precisely block the full spectrum of attacks, not just phishing, malware, and spam, but much more targeted attacks like social engineering, account compromise, and fraud.

Abnormal only takes minutes to set up, it doesn't interupt your mailflow, and requires no additional effort to uncover attacks that are lurking in employee mailboxes. Contact us today to schedule a product demo.

Related Resources

Ciso guide ransomware cover
The debilitating Colonial Pipeline attack in 2021, which cost the organization $4.4 million to restore the data, highlights the devastating consequences of ransomware and why nearly one in three companies hit with an attack is likely to pay the fee.
Read More
Interactios threat actor cover
Ransomware is a major problem, and it’s not going away. To understand it, we must understand why threat actors turn to it—and how it can be stopped. The best way to do that is to chat with the masterminds behind these attacks.
Read More
Fireside chat katz cover
Legitimate email communications often contain links and attachments, and employees need to click on those links and attachments to do their jobs. Unfortunately, securing the enterprise often means stopping employees from doing so in an effort to stop bad actors from gaining access to systems or stealing money.
Read More
Fortune 200 wealth cover
As a leader in insurance and asset management, this Fortune 200 company recognizes that its security must protect its employees and customers from cyber attacks. Customers place their trust and their assets in the control of this company, so the security team built a robust solution reducing risk, gaining visibility, and securing user identity—the new perimeter.
Read More
Abnormal microsoft data sheet cover
Complement Microsoft’s threat intelligence-based defenses with precise, behavioral analysis-based protection against all email and account takeover attacks.
Read More
Webinar microsoft cover
The emergence and evolution of advanced socially-engineered cyber attacks, including business email compromise, supply chain fraud, and ransomware, has organizations rethinking their security strategies and tech stacks.
Read More
Human element whitepaper cover
The challenge of dealing with cybercrime is complex. Human factors and the human-computer interface are a central component of cybersecurity, and while technology alone will not prevent cybercrime, neither will people. People alone also can also not be relied upon as a last line of defense in an organization’s cybersecurity strategy.
Read More
Human element webinar cover 2
Cybersecurity is largely a behavioral concern, as cybercriminals use social engineering to trick people into transferring money, entering their credentials, or providing access to sensitive data.
Read More
Healthcare ato cover
For cybercriminals, penetrating a healthcare organization is like striking gold. Provider and payer professionals have access to some of the highest-value data in the world, including patients’ personal details, medical histories, social security numbers, insurance information, and more.
Read More
Key considerations webinar cover
Email is both a necessary communication medium, and the most vulnerable area for an attack. Year after year, adversaries find success in abusing email to gain a foothold into an organization—deploying malware, leaking valuable data, or stealing millions of dollars.
Read More
B Gartner Highlights 1
The Gartner Market Guide for Email Security explains what integrated cloud email security (ICES) solutions are and why they’re essential for modern enterprises. Download a copy now to learn why enterprises are moving away from the SEG.
Read More
Video 1
Abnormal can determine when legitimate end users have accessed accounts, or when a bad actor has accessed them, by understanding key attributes like common IP addresses, or if the device has been accessed...
Read More