or
Continue with LinkedIn
Recover my Password
Submit your Tekpon Account E-mail address and you will receive an email with instructions to reset your password.

Abnormal Security

Tekpon Score
8.9

Abnormal Security Reviews

& Product Details

What is Abnormal Security?

Abnormal Security is a comprehensive cloud email security platform designed to protect organizations from a wide range of email and email-like attacks. It stands out for its ability to prevent, detect, predict, and respond to various threats, including credential phishing, business email compromise, supply chain fraud, and email account takeovers.

A key feature of Abnormal Security is its Behavioral AI Engine, which powers the platform’s capabilities. This engine blocks targeted inbound email attacks that often bypass traditional security tools, offering a more robust defense against modern threats. It also stops attacks via third-party applications and alerts on high-risk configuration changes, enhancing overall email security posture.

Abnormal Security’s approach to cloud email security is unique, as it fully automates the triage and remediation of user-reported emails, significantly reducing the workload on security teams. This automation, combined with the platform’s ability to eliminate redundant secure email gateway costs, optimizes resources and reduces overall security spend.

Best For

Better Cloud Email Protection, Lower Email Security Spend.
  • StartUps
  • Freelancers
  • Small Business
  • Medium Business
  • Large Enterprise
  • Non-profit Organization
  • Personal
  • Cloud, SaaS, Web-Based
  • Mobile - Android
  • Mobile - iPhone
  • Mobile - iPad
  • Desktop - Mac
  • Desktop - Windows
  • Desktop - Linux
  • Desktop - Chromebook
  • On-Premise - Windows
  • On-Premise - Linux
  • Company Name

    abnormal security

  • Located In

    United States

  • Website

    abnormalsecurity.com

Starting from:

Custom

Pricing Model: Subscription

  • Free Trial
  • Free Version

Pricing Details:

This tool has no public price available.

  • Fraud Detection
  • Reporting/Analytics
  • Spam Blocker

Additional Features

  • Email Filtering
  • Reporting & Statistics
  • Event Tracking
  • Incident Management
  • Risk Analysis
  • AI/Machine Learning
  • Threat Response
  • Tagging
  • Monitoring
  • Anomaly/Malware Detection
  • Microsoft Outlook Integration
  • Secure Login
  • Access Controls/Permissions
  • Activity Monitoring
  • Inbox Management
  • Behavioral Analytics
  • Filtering
  • Data Security
  • Email Attachment Protection
  • Email Tracking
  • Email Management
  • Threat Protection
  • Phishing Protection
  • Audit Trail
  • Third Party Integrations
  • Risk Alerts
  • Spam Analysis
  • Search
  • Anti Virus
  • Security Auditing
  • Greylisting
  • For MSPs
  • Prioritization
  • Spam Detection
  • Behavior Tracking
  • API
  • Data Import/Export
  • Event Logs
  • Activity Tracking
  • SSL Security
  • Real Time Data
  • Anti Spam
  • Data Visualization
  • Alerts/Escalation
  • Search/Filter
  • Activity Dashboard
  • Alerts/Notifications

ContentCatcher

Tekpon Score
COMPARE

Proofpoint Email Protection

Tekpon Score
COMPARE

Tell us your opinion about Abnormal Security and help others.

Avast Business

Tekpon Score

ESET Antivirus

Tekpon Score

ProtonMail

Tekpon Score

cTemplar

Tekpon Score

Avanan

Tekpon Score

Virtru

Tekpon Score

SpamTitan

Tekpon Score

DMARCOFF

Tekpon Score

Graphus

Tekpon Score

SpamHero

Tekpon Score

NeoCertified

Tekpon Score

Cypherdog

Tekpon Score

Libraesva

Tekpon Score

RMail

Tekpon Score

Kiteworks

Tekpon Score

PreVeil

Tekpon Score

DMARC Advisor

Tekpon Score

ServerMX

Tekpon Score

This website uses cookies

Cookies are small text files that can be used by websites to make a user’s experience more efficient.

The law states that we can store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies we need your permission. This means that cookies which are categorized as necessary, are processed based on GDPR Art. 6 (1) (f). All other cookies, meaning those from the categories preferences and marketing, are processed based on GDPR Art. 6 (1) (a) GDPR.

You can at any time change or withdraw your consent from the Cookie Declaration on our website.

You can read more about all this at the following links.

Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.

Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in.

These trackers help us to measure traffic and analyze your behavior to improve our service.

These trackers help us to deliver personalized ads or marketing content to you, and to measure their performance.