Abnormal - Cloud Email Security screenshot

What is Abnormal - Cloud Email Security?

Abnormal Security provides email protection designed to catch threats that traditional security tools miss. The platform uses behavioural analysis to identify phishing attempts, credential theft, and account takeover attacks by examining communication patterns rather than relying solely on signature-based detection. It's built for organisations of any size that need to protect employees from sophisticated email-based attacks. The tool integrates with cloud email services and works alongside existing security infrastructure to add an extra layer of defence without requiring significant changes to your email setup.

Key Features

Behavioural analysis

examines communication patterns to spot unusual activity and potential threats

Phishing detection

identifies credential phishing and social engineering attacks targeting employees

Account takeover prevention

detects compromised accounts showing abnormal sending or forwarding behaviour

Integration with cloud email

works with major email platforms like Microsoft 365 and Google Workspace

Post-breach investigation

helps identify which employees may have been affected by successful attacks

Reporting and analytics

provides visibility into threat patterns and security metrics across your organisation

Pros & Cons

Advantages

  • Catches phishing and account compromise that signature-based filters often miss
  • Freemium model lets you evaluate the tool before committing to a paid plan
  • Integrates directly with existing cloud email services, reducing friction during deployment
  • Focuses on behaviour rather than just file reputation, making it effective against new attack types

Limitations

  • Effectiveness depends on having enough historical data to establish normal communication patterns, which takes time in new deployments
  • May require tuning to avoid false positives in organisations with highly variable communication patterns

Use Cases

Protecting employees from targeted phishing campaigns aimed at stealing login credentials

Detecting compromised email accounts showing unusual forwarding rules or sending patterns

Reducing reliance on user security awareness alone by catching attacks before they succeed

Investigating email-based security incidents to understand which accounts and data may be at risk

Meeting compliance requirements that mandate email security controls beyond basic spam filtering