abnormal security logo

Abnormal is the most precise human behaviour security engine for blocking all email attacks, including phishing, malware, ransomware, social engineering, executive impersonation, supply chain compromise, internal account compromise, spam, and graymail.

Play Video

A Fundamentally Different Approach to Email Security

Secure email gateways and built-in Microsoft and Google security struggle to block email attacks that pass reputation checks, have no URLs or attachments, and appear to come from trusted sources.

Only Abnormal uses behavioural AI to profile known good behaviour and analyses over 45,000 signals to detect anomalies that deviate from these baselines, delivering maximum protection for global enterprises.

comparison of normal email security and abnormal security

Why Choose Abnormal?

Abnormal profiles known good behaviour and analyses over 45,000 signals to detect anomalies that deviate from these baselines. Only Abnormal precisely blocks all socially-engineered and unwanted emails—both internal and external—and detects and remediates compromised accounts.

Abnormal integrates with multiple Microsoft 365 and Google Workspace tenants in minutes, with one click and no disruption to mail flow.

Simplify your email security stack by eliminating the redundant email gateway layer, and re-enabling and enhancing Microsoft’s cloud gateway capabilities. Unify your entire inbound email security defences, from email hygiene to zero-day advanced attacks.

Abnormal provides a native Microsoft email experience that puts an end to spam digests and portals. With deep integration into Microsoft and Google via APIs, Abnormal learns each end user’s preference as they move emails between inbox, spam, and promotional folders within their mailboxes.

Abnormal Security Solutions

Account Takeover

Inbound Email

Integrated Cloud Email

Contact us for a no-obligation trial

Installation takes less than five minutes!


The Essential Guide to Cloud Email Security

As organisations have moved to cloud-based infrastructure and productivity platforms like Microsoft 365 and Google Workspace, they’ve seen key benefits including easier collaboration, greater agility, and lower costs and maintenance related to infrastructure.

CISO Guide to Vendor Email Compromise (VEC)

Vendor email compromise (VEC) is a significant security threat to enterprise organizations. This form of attack occurs when a threat actor gains control of a vendor email account and then uses it to steal money from known contacts.

Q3-2021 Email Threat Report​

There is little doubt that business email compromise and other advanced email threats are causing significant damage–both financial and reputational—to organizations worldwide.

CISO Guide to Business Email Compromise​

Business email compromise (BEC) is the most significant cybersecurity threat to enterprise organizations, with $1.8 billion lost in 2020 alone.

Email Security Architectures From Exchange to Microsoft 365​

With the early market adoption of on-premise mail servers like Microsoft Exchange, organizations also implemented security measures to protect against the wide array of email threats.

©2021 Abnormal Security Corp. All rights reserved