About the Abnormal Platform

Socially engineered email attacks are the #1 security threat facing companies today, accounting for more than 44% of all cybercrime losses. To stop these types of sophisticated email attacks, you need a fundamentally new approach to email security.

Video Transcript

Evan Reiser, CEO and Co-Founder

Socially engineered email attacks are the #1 security threat facing companies today, accounting for more than 44% of all cybercrime losses. To stop these types of sophisticated email attacks, you need a fundamentally new approach to email security.

During this demo, you'll see how Abnormal Integrated Cloud Email Security, or ICES for short, precisely blocks attacks that were previously considered unstoppable. Unlike secure email gateways, its API-based architecture gives deeper visibility, combined with the behavioral AI which detects even the most subtle anomalies, to make Abnormal extremely effective in blocking sophisticated attacks like social engineering, fraud, and internal attacks from compromised accounts.

When an employee's email account has been compromised, the attackers access sensitive information and use that trusted identity to bypass existing security controls and freely target other employees. Unlike secure email gateways, Abnormal ICES builds a behavioral model of every individual employee and the entire supply chain to detect anomalous user behavior and then scans all internal emails to stop these types of attacks.

In this example, Renee, the VP of Finance, sends an internal email to her colleagues Zach and Josh, requesting a wire transfer. The email account is trusted and the links appear safe, and the attachments are not malicious. However, Abnormal ICES blocks this email by identifying abnormal behaviors beyond these superficial indicators. Renee has never logged in from Hong Kong, a suspicious email rule filter was created, and Orion Limited is not a vendor they've ever worked with before. And finally, this email conveys an urgent financial request which identifies it as a high-risk communication.

By leveraging data through the API architecture, Abnormal has unique visibility into Renee's account behavior, which reveals a timeline of anomalous events identifying it as a compromised account. Abnormal ICES can automatically sign out of all these sessions, block access to the account, and can even trigger a password reset.

The Abnormal behavioral AI enhances the threat intelligence-based solutions provided by Microsoft 365, as well as by secure email gateways. It brings together metrics across all these different solutions to dramatically simplify reporting and give you actionable insights.

Abnormal protects enterprises by providing comprehensive email security to precisely block the full spectrum of attacks, not just phishing, malware, and spam, but much more targeted attacks like social engineering, account compromise, and fraud.

Abnormal only takes minutes to set up, it doesn't interrupt your mailflow, and requires no additional effort to uncover attacks that are lurking in employee mailboxes. Contact us today to schedule a product demo.

About the Abnormal Platform

See Abnormal in Action

Schedule a Demo
 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
 
Integrates Insights Reporting 09 08 22

Related Resources

Abnormal Landscape
See how Abnormal is working to make the cloud a safer place for business by protecting against all types of attacks across all types of cloud applications.
Watch Now
B TAG Cyber
Download the white paper to discover how to better secure your cloud email environment and choose the right security solutions provider.
Read More
B ESG
New survey reveals the latest trends shaping communication and collaboration application security.
Read More
B 1500x1500 Choice Hotels Bright Talk Demo Day L1 R1
Discover how Choice Hotels is simplifying their email security, streamlining their operations, and preventing email attacks with the highest efficacy.
Watch Now
B 05 01 23 MKT279 New Slack Data Sheet
Secure your messages and keep Slack from becoming an entry point for attackers.
Read More
B 05 02 23 MKT283 New Zoom Solution Brief
Protect your Zoom collaboration and prevent attackers from using the application to breach your business.
Read More
B Email Like SPM
Monitor high-impact changes to user privileges across collaboration apps with Email-Like Security Posture Management.
Read More
B Email Like Messaging Security
Detect malicious message content across collaboration apps with Email-Like Messaging Security.
Read More
B Email Like ATO
Detect compromised user accounts across your critical communication channels with Email-Like Account Takeover Protection.
Read More