Abnormal Security Logo
Abnormal Security Logo
Abnormal Security

Abnormal Security

Composite Score
8.0 /10
CX Score
8.1 /10
Category
Abnormal Security
8.0 /10

What is Abnormal Security?

The Abnormal Security platform protects enterprises from targeted email attacks. Abnormal Behavior Technology (ABX) models the identity of both employees and external senders, profiles relationships and analyzes email content to stop attacks that lead to account takeover, financial damage and organizational mistrust. Though one-click, API-based Office 365 and G Suite integration, Abnormal sets up in minutes and does not disrupt email flow.

Company Details


Need Assistance?

We're here to help you with understanding our reports and the data inside to help you make decisions.

Get Assistance

Awards & Recognition

Abnormal Security won the following awards in the Cloud Email Security category

Filter By

Abnormal Security Ratings

Real user data aggregated to summarize the product performance and customer experience.
Download the entire Product Scorecard to access more information on Abnormal Security.

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

88 Likeliness to Recommend

100 Plan to Renew

75 Satisfaction of Cost Relative to Value

2
Since last award


{y}
{name}

Emotional Footprint Overview

Product scores listed below represent current data. This may be different from data contained in reports and awards, which express data as of their publication date.

+94 Net Emotional Footprint

The emotional sentiment held by end users of the software based on their experience with the vendor. Responses are captured on an eight-point scale.

How much do users love Abnormal Security?

0% Negative
0% Neutral
100% Positive

Pros

  • Helps Innovate
  • Continually Improving Product
  • Reliable
  • Effective Service

Feature Ratings

Average 84

Phishing Protection

91

O365 integration

90

User Flagging of Suspicious Emails

87

Bulk Remediation

87

Email Account Protection

83

Anti-Spoofing Protection

83

Malware Blocking

82

Artificial Intelligence / Machine Learning

82

Administrator Dashboard and Reporting

82

Tagging

81

End-User Warnings in Email Client Software

80

Vendor Capability Ratings

Average 83

Usability and Intuitiveness

88

Ease of IT Administration

87

Ease of Data Integration

86

Product Strategy and Rate of Improvement

85

Ease of Customization

84

Ease of Implementation

83

Quality of Features

83

Availability and Quality of Training

82

Business Value Created

81

Vendor Support

77

Breadth of Features

73

Abnormal Security Reviews

Kyle D.

  • Role: Information Technology
  • Industry: Not for Profit
  • Involvement: IT Development, Integration, and Administration
Validated Review
Verified Reviewer

Submitted Jun 2023

It just works!

Likeliness to Recommend

9 /10

What differentiates Abnormal Security from other similar products?

It is super easy to set up and get running.

What is your favorite aspect of this product?

It has caught emails that have none of the normal indicators for spam or phishing.

What do you dislike most about this product?

I have no complaints

What recommendations would you give to someone considering this product?

Just set up a POC. It's super easy and you get a great idea of the scope that the product covers.

Pros

  • Continually Improving Product
  • Reliable
  • Performance Enhancing
  • Enables Productivity
  • Role: Information Technology
  • Industry: Banking
  • Involvement: IT Leader or Manager
Validated Review
Anonymous Reviewer

Submitted Jun 2023

Impressive with its user-friendly.

Likeliness to Recommend

9 /10

Pros

  • Reliable
  • Transparent
  • Helps Innovate
  • Performance Enhancing
  • Role: Information Technology
  • Industry: Technology
  • Involvement: IT Leader or Manager
Validated Review
Anonymous Reviewer

Submitted May 2023

Likeliness to Recommend

8 /10

Pros

  • Respectful
  • Helps Innovate
  • Continually Improving Product
  • Reliable

Cons

  • Less Productive

Most Popular Abnormal Security Comparisons