Contact company icon Add as a preferred source Download PDF version

Abnormal Security, a pioneer in protecting large enterprises from business email compromise (BEC) attacks announced it has been included in the list of Cool Vendors in Cloud Office Security by Gartner. The report recognizes vendors with “innovative approaches to cloud office security, email, and collaboration.”

Business email compromise

Business email compromise continues to plague organizations, leading to $26B in losses according to the FBI

As the primary communication channel for business, email continues to be the biggest attack vector for threat actors. Despite extensive investment into email security, business email compromise (BEC) continues to plague organizations, leading to $26B in losses according to the FBI.

According to Gartner, “With the rise of business email compromise, buyers often look for a single product that can protect against all advanced cloud office threats.”

Modern approach

Abnormal Security offers a complete platform that delivers a modern approach to Office 365 and Google G Suite security through three core capabilities:

  • Protection: Abnormal Security stops the full spectrum of email attacks that slip past Microsoft Exchange Online Protection (EOP), with a unique focus on targeted, socially engineered business email compromise (BEC) attacks.
  • Detection: Abnormal Security identifies Email Account Compromise (EAC) by analyzing both email and user event data through Abnormal Behaviour Technology (ABX).
  • Response: The Abnormal platform includes automated response actions to drive security team efficiency, including the ability to triage end-user reported messages via Abuse Mailbox integration and automatically trigger password resets or revoke login sessions for accounts that have been compromised.

In addition, the Abnormal Security platform APIs enable seamless integration to an enterprise’s existing security tools, whether performing remediation based on other detection systems or connecting to downstream systems, such as SIEM and SOAR tools.

Transitioning to cloud

Business email compromise continues to be the costliest security issue for large enterprises today,” said Evan Reiser, CEO, and co-founder of Abnormal Security.

The most sophisticated attacks bypass even the most premium-priced secure email gateways, requiring a fundamentally different platform architecture. We believe our inclusion in the 2020 Gartner Cool Vendors in Cloud Office Security report is reflective of the changing priority and rethinking around email security for companies shifting to the cloud.”

Discover how AI, biometrics, and analytics are transforming casino security

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...