Contact company icon Add as a preferred source Download PDF version

Abnormal Security, a pioneer in protecting large enterprises from Business Email Compromise (BEC) attacks announced completion of the Service Organization Control (SOC 2) examination of the Abnormal Cloud Email Security Platform, earning SOC 2 Type 2 compliance. Conducted by Coalfire Controls, LLC, a fully licensed, accredited CPA firm and an affiliate of Coalfire Systems, Inc, the voluntary examination confirms Abnormal Security’s commitment to inscrutable operating effectiveness.

Cloud Security platform

Cloud Security platform protects enterprises from email attacks including BEC, which has led to more than $26B in financial loss

The Abnormal Cloud Security platform protects enterprises from the most sophisticated, targeted email attacks including BEC, which has led to more than $26B in financial loss, according to the FBI.

The platform is powered by Abnormal Behaviour Technology (ABX), which models the identity of both employees and external senders, graphs the relationships between people and organisations, and analyses email content to stop attacks that lead to financial fraud, account takeover, and organisational mistrust.

SOC 2 Type 2 compliance

SOC 2 Type 2 compliance demonstrates assurance that service commitments and system requirements about the controls in place relevant to Common Criteria/security and confidentiality of the systems used to process user data and the confidentiality of the information processed can be achieved.

Completion of the SOC 2 Type 2 examination indicates that selected Abnormal Security infrastructure, software, people, data, processes, and procedures have been formally reviewed.

Validation of security processes

The successful completion of this in-depth examination validates that the necessary security processes and controls are in place for our customers who rely on us to stop the most sophisticated business email compromise attacks,” said Evan Reiser, CEO, Abnormal Security. “We’re especially proud to have completed the examination without exceptions.”

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...