founded 2018
Companies referencing Abnormal Security
Abnormal Security is a cloud email security platform that uses behavioral AI to protect organizations from advanced email attacks including business email compromise, phishing, and account takeover. The platform provides compliance reporting and integrates with GRC workflows to demonstrate email security posture.
Abnormal Security is highly regarded for its behavioral AI approach to email security, which users report catches threats that traditional secure email gateways miss. The compliance reporting features help organizations demonstrate email security controls for SOC 2 and HIPAA audits, though the platform is focused on email security rather than broad compliance management.
4 documented outcomes from Abnormal Security customers. Showing 1 of 4 — the rest are locked.
Restaurant/QSR
Domino's deployed Abnormal behavioral AI
Outcome
Deployed stronger communications security with behavioral AI
Valvoline Inc.
Energy · Locked
ADT
Security Services · Locked
Boohoo
Retail/Fashion · Locked
3 more case studies locked
Abnormal Security is on the Verified tier. Upgrade to Premium to unlock every customer case study for prospects to see.
3 plans available.
Be the first to write a community review of Abnormal Security.
Write a review
Share your experience with Abnormal Security and help others make informed decisions.
Compliance automation for cloud-first companies
79 customer references
Enterprise password and secrets management with compliance
26 customer references
Continuous compliance automation with 85+ integrations
119 customer references
Cloud security platform with compliance capabilities
1 customer reference
Compliance operating system for modern enterprises
21 customer references
Automated compliance for SOC 2, HIPAA, ISO 27001 & more
70 customer references
What Is SOC 2? A Complete Guide to SOC 2 Compliance
SOC 2 is a security framework developed by the AICPA that defines criteria for managing customer data based on five Trust Services Criteria: security, availability, processing integrity, confidentiality, and privacy.
SOC 2 Type I vs Type II: Key Differences Explained
SOC 2 Type I evaluates whether your security controls are properly designed at a single point in time, while Type II tests whether those controls actually operated effectively over a period of 3-12 months.
What Is HIPAA? A Complete Guide to HIPAA Compliance
HIPAA (Health Insurance Portability and Accountability Act) is a US federal law that sets national standards for protecting sensitive patient health information (PHI) from being disclosed without the patient's consent or knowledge.
HIPAA Compliance Checklist for 2025
A comprehensive HIPAA compliance checklist covers risk assessments, administrative/physical/technical safeguards, Business Associate Agreements, workforce training, breach notification procedures, and ongoing documentation requirements.