Abnormal Security today announced that it is expanding its Account Takeover Protection product line beyond email to provide visibility into cross-platform user behavior and centralize compromised account detection and remediation across identity, collaboration, and cloud infrastructure applications. In addition, the company is launching AI Security Mailbox, which provides a new AI-powered coworker that promotes security awareness through real-time conversations between employees and an AI security analyst, while also automating the triage and remediation of user-reported emails.

Enhancing Visibility and Control with More Cloud Account Integrations
Recent research from Abnormal shows that nearly 70% of security leaders view cross-platform account takeover threats as the greatest concern to their organizations—even ahead of headlining threats like ransomware and phishing. Additionally, 83% of these organizations have been impacted by an account takeover in the last year, and nearly one-fifth have been impacted more than 10 times.
To protect against this threat, Abnormal now integrates with more cloud accounts, enabling the platform to analyze a greater volume of signals to better understand human behavior, while empowering customers with more cross-platform visibility and control. These visibility and control features are available starting today in the following applications:
- Email: Microsoft 365, Google Workspace
- Identity: Azure Active Directory, Okta, Ping
- SaaS/Collaboration: Atlassian, Box, DocuSign, Dropbox, Google Drive, Salesforce, ServiceNow, Slack, Workday, Zendesk, Zoom
- Cloud Infrastructure: Amazon Web Services, Microsoft Azure, Google Cloud Platform
Starting today, any customer can integrate their cloud applications directly via API to the Abnormal AI platform in under five minutes and at no cost. As Abnormal begins ingesting data and signals, SOC teams are provided with a consolidated view of all account activity within each connected platform. If malicious activity is found, administrators can remediate compromised accounts with a one-click “Identity Disconnect” button, which will terminate sessions, reset passwords and block access across platforms—drastically expanding the scope of protection.
Expanding Account Takeover Protection to Cloud Applications
For customers who would rather automatically detect and remediate compromised accounts through the power of AI, Abnormal is expanding its Account Takeover Protection product line beyond email. Once integrated, the Abnormal AI platform ingests a large set of signals, including sign-in events, typical geolocations and VPN details, to build a behavioral baseline for each user across all integrated applications. Autonomous AI models then analyze risky events based on deviations from this baseline, which are correlated across other platforms accessed by that user. Compromised account detections deemed to be high-risk are automatically remediated—adding superhuman capabilities to the SOC team and providing automated cross-platform security for organizations.
General availability for unified Account Takeover Protection will be announced later this year and Abnormal will also provide this cross-platform capability across other product lines. In 2025, customers can expect an expansion of Security Posture Management, which enables customers to discover and fix key security configuration risks across cloud email, to multiple cloud platforms.
Increasing Customers’ AI Capabilities with AI Security Mailbox
In addition to expanding visibility and control, Abnormal is also enabling customers to succeed in today’s AI-focused security landscape.
To enable security teams to use more autonomous AI solutions, Abnormal is also launching AI Security Mailbox—an AI coworker for every security team. Now when an employee reports an attack, the Abnormal platform will serve as their personal AI cyber assistant by providing a personalized response explaining if the email was deemed malicious, safe, or spam and how a determination was made. Users can then converse directly with the AI security analyst, which delights them with real-time feedback as it teaches them better security practices.
With intrinsic autopilot capabilities, AI Security Mailbox comes pre-trained with enterprise security best practices automatically tailored for each customer environment. To enable further customization, each organization can give the conversational AI agent a name and choose its tone of voice, ranging from formal to humorous to empathic to pirate mode. This capability is available for free to all customers in AI Security Mailbox, formerly known as Abuse Mailbox Automation.
Resources
- Learn more about Abnormal’s new products in this blog from CEO Evan Reiser.
- Discover more about unified Account Takeover Protection or AI Security Mailbox.
- See a demo here or by visiting Booth #860 at RSA Conference 2024.

Action1 Unveils Free Vulnerability Assessment at RSAC 2024
Posted in Commentary with tags Action1 on May 7, 2024 by itnerdAction1 Corporation, a provider of the integrated real-time vulnerability discovery and patch management automation solution, today at RSAC 2024™ introduced free vulnerability assessment. This service allows enterprise-wide free one-time assessment of software vulnerabilities, enabling organizations to assess their susceptibility to known vulnerabilities and make informed decisions on their security posture.
According to the Action1 2023 State of Vulnerability Remediation Report, 47% of breaches resulted from known security vulnerabilities. The issue lies in most enterprises being unaware of vulnerabilities within their IT infrastructure, which prevents them from maintaining an effective patch management strategy. The Action1 free vulnerability assessment service provides organizations with comprehensive insights into vulnerabilities on their endpoints, including identifying CVEs persisting in applications and operating systems, missing updates, and outdated software. This service offers actionable insights to mitigate risks and improve an organization’s vulnerability management strategy by leveraging data from the National Vulnerability Database (NVD) and CISA’s Known Exploited Vulnerabilities (KEV) catalog.
To access the free vulnerability assessment service, organizations can create an Action1 account and install the agents on their endpoints. Organizations can deploy Action1 simultaneously or in stages across all endpoints, with unlimited time flexibility. Vulnerability analysis begins immediately upon installation. Vulnerability assessment on each endpoint is performed once, and the data is presented in the aggregated view on the Action1 console indefinitely.
Resources
Leave a comment »