About the Abnormal Platform

Video Transcript

Evan Resier, CEO and Co-Founder

Socially engineered email attacks are the #1 security threat facing companies today, accounting for more than 44% of all cybercrime losses. To stop these types of sophisticated email attacks, you need a fundamentally new approach to email security.

During this demo, you'll see how Abnormal Integrated Cloud Email Security, or ICES for short, precisely blocks attacks that were previously considered unstoppable. Unlike secure email gateways, its API-based architecture gives deeper visibility, combined with the behavioral AI which detects even the most subtle anomalies, to make Abnoraml extremely effective in blocking sophisticated attacks like social engineering, fraud, and internal attacks from compromised accounts.

When an employee's email account has been compromised, the attackers access sensitive information and use that trusted identity to bypass existing security controls and freely target other employees. Unlike secure eamil gateways, Abnoraml ICES builds a behavioral model of every individual employee and the entire supply chain to detect anoamlous user behavior and then scans all internal emails to stop these types of attacks.

In this example, Renee, the VP of Finance, sends an internal email to her colleagues Zach and Josh, requesting a wire transfer. The email account is trusted and the links appear safe, and the attachments are not malicious. However, Abnoraml ICES blocks this email by identityfing abnormal behaviors beyond these superficial indicators. Renee has never logged in from Hong Kong, a suspicious email rule filter was created, and Orion Limited is not a vendor they've ever worked with before. And finally, this email conveys an urgent financial request which identifies it as a high-risk communication.

By leveraging data through the API architecture, Abnormal has unique visibilty into Renee's account bheavior, which reveals a timeline of anomalous events identifying it at a compromised account. Abnormal ICES can automatically sign out of all these sessions, block access to the account, and can even trigger a password rest.

The Abnormal ICES behavioral AI enhances the threat intelligence-based solutions provided by Microsoft 365, as well as by secure email gateways. It brings together metrics across all these different solutions to dramatically simplify reporting and give you actional insights.

Abnormal protects enterprises by providing comprehensive email security to precisely block the full spectrum of attacks, not just phishing, malware, and spam, but much more targeted attacks like social engineering, account compromise, and fraud.

Abnormal only takes minutes to set up, it doesn't interupt your mailflow, and requires no additional effort to uncover attacks that are lurking in employee mailboxes. Contact us today to schedule a product demo.

Demo 2x 1

See the Abnormal Solution to the Email Security Problem

Protect your organization from the attacks that matter most with Abnormal Integrated Cloud Email Security.

Related Resources

B 05 03 22 Using Modern Email Security Webinar
Secure email gateways (SEGs) focus on searching for known bad domains, attachments, and links. But threat actors have changed their tactics—opting to deceive humans instead of technology. It’s time for a modern solution to the email security problem, one that detects and prevents these attacks.
Watch Now
Resource 05 Webinar
With the rise of modern attacks such as supply chain compromise, executive impersonation, and account takeover, it's become obvious: the SEG no longer works. Learn what you need for complete defense in depth protection.
Watch Now
Abonrmal overview cover
Abnormal provides a fundamentally-different approach to email security that precisely blocks all email attacks.
Read More
Abnormal microsoft data sheet cover
Complement Microsoft’s threat intelligence-based defenses with precise, behavioral analysis-based protection against all email and account takeover attacks.
Read More
Video 1
Abnormal can determine when legitimate end users have accessed accounts, or when a bad actor has accessed them, by understanding key attributes like common IP addresses, or if the device has been accessed...
Watch Now
Video 1
With Abnormal, security teams can now eliminate redundant email gateways and enhance Microsoft's built-in security capabilities. Once integrated via one-click API, Abnormal automatically profiles your VIPs and employees, their behavior, relationships, communication patterns...
Watch Now
Data sheet 1
Protect your end users from the full spectrum of targeted email threats: phishing, ransomware, fraud, social engineering, supply chain attacks, executive impersonation, spam, and graymail. Integrate with Microsoft 365 and Google Workspace via a one-click API without disrupting mail flow. No MX record changes, configuration, or custom policies are needed.
Read More
Data sheet 4
Supercharge your SOC workflows and save time with AI-assisted investigation, auto-remediation, follow-up, and reporting. Abnormal provides a frictionless method for user-reported phishing attacks to be submitted, triaged, and reviewed.
Read More
Data sheet 3
By understanding normal behavior, Abnormal can detect any deviations in these baselines to uncover potentially compromised accounts and then immediately remediate them. When left undetected, attackers can use compromised accounts to exfiltrate sensitive data or send lateral phishing emails.
Read More
Data sheet 2
Abnormal Security's Integrated Cloud Email Security (ICES) blocks socially-engineered attacks that secure email gateways miss.
Read More
Email security architectures cover
As organizations have moved their email servers from on-premise systems like Microsoft Exchange to cloud services like Microsoft 365, the range of permutations of email security solutions has also increased. See the range of security options available to organizations and how to solve for advanced threats.
Download Now
Cover ABX White Paper 04 12 22
Abnormal Behavior Technology (ABX) leverages innovative techniques to provide a revolutionary approach to detecting and mitigating targeted email attacks.
Download Now