https://store-images.s-microsoft.com/image/apps.55210.ceef6460-2a1c-4658-8b9a-8eaf8af496fa.36ccdf81-599a-47cd-813f-01ffbbf7fbdb.acb06e31-4087-445c-b3fa-9ab8ce9c0c3b

Abnormal - Cloud Email Security

Abnormal Security Corporation

(36 ratings)

Abnormal - Cloud Email Security

Abnormal Security Corporation

(36 ratings)

The Cloud-Native Email Security Platform That Protects the Modern Workforce Against All Attack Types

Abnormal augments the built-in protection of Microsoft 365 with a modern, cloud-native solution informed by innovations in behavioral data science. Its API-based architecture allows it to analyze a broad set of data with tens of thousands of signals from Microsoft 365. It leverages natural language understanding (NLU) and natural language processing (NLP) to continuously assess communications, formulating an organizational baseline of behavior based on communication patterns, sentiment analysis, cadence, tone and more.

By understanding what is normal, Abnormal can block the malicious and unwanted emails that are text-based, lack attack signatures, and originate from the inside of your company—all of which often bypass legacy SEGs and cloud email providers. By pairing Microsoft and Abnormal, organizations gain superior protection against the full spectrum of attacks including business email compromise, supply chain fraud, ransomware, malware, spam, and more. Check it out to see how your security team can gain superior detection efficacy, simplified control of email, and time back to focus on more strategic projects.


Key Features:

  • Protects the workforce against the broad spectrum of traditional and modern email attacks: spam, graymail, malware, credential phishing, ransomware, supply chain compromise, business email compromise and more.

  • Fully automates email triage, remediation, and reporting, saving time for your SOC team.

  • Eliminates the need for digests and end user quarantines and saves employees and executives time by filtering away promotional graymail with an adaptive, personalized and policy-free approach.


Top Features for Microsoft 365 Customers:

  • Automatically detects and disables access to Microsoft 365 accounts when they show anomalous behavior and appear to be compromised.

  • Identifies when third-party vendors have been compromised across all vendors to block malicious emails utilizing the industry's only federated database.

  • Automatically remediates malicious messages to a hidden folder to remove the possibility of user engagement.

  • Allows analysts to search for specific emails by sender, recipient, or subject, filter within certain time frames, and remediate emails in bulk.

https://store-images.s-microsoft.com/image/apps.18111.ceef6460-2a1c-4658-8b9a-8eaf8af496fa.2dd9031d-4e5b-4b51-bc77-09f0666a55b8.ca629eaa-4fe9-47a4-84d7-584e4c924c10
/staticstorage/ff87b12/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.18111.ceef6460-2a1c-4658-8b9a-8eaf8af496fa.2dd9031d-4e5b-4b51-bc77-09f0666a55b8.ca629eaa-4fe9-47a4-84d7-584e4c924c10
/staticstorage/ff87b12/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.35273.ceef6460-2a1c-4658-8b9a-8eaf8af496fa.2dd9031d-4e5b-4b51-bc77-09f0666a55b8.ba0047ce-21ee-45aa-9ead-c66aa6186365
/staticstorage/ff87b12/assets/videoOverlay_7299e00c2e43a32cf9fa.png
https://store-images.s-microsoft.com/image/apps.51096.ceef6460-2a1c-4658-8b9a-8eaf8af496fa.53137a99-7337-460f-a34d-f8ace3504389.68bf72a1-676a-46c8-bf91-9a2063bb682f
https://store-images.s-microsoft.com/image/apps.58987.ceef6460-2a1c-4658-8b9a-8eaf8af496fa.53137a99-7337-460f-a34d-f8ace3504389.a540eb9b-e28a-40cb-9dca-d713c9325a6b
https://store-images.s-microsoft.com/image/apps.12495.ceef6460-2a1c-4658-8b9a-8eaf8af496fa.53137a99-7337-460f-a34d-f8ace3504389.abe2c75a-a0a0-4eb4-b6d3-e10e618632a0
https://store-images.s-microsoft.com/image/apps.59018.ceef6460-2a1c-4658-8b9a-8eaf8af496fa.53137a99-7337-460f-a34d-f8ace3504389.b02c48dd-4508-46be-98c4-9628957d4f21
https://store-images.s-microsoft.com/image/apps.45363.ceef6460-2a1c-4658-8b9a-8eaf8af496fa.53137a99-7337-460f-a34d-f8ace3504389.b8f4212c-7667-4874-9597-77d8471a2eb8