Introducing CrowdStrike Falcon® Next-Gen Identity Security: The future is here. Learn more

Abnormal Security Data Connector

Prevent costly Business Email Compromise with extended detection and response

Email is a primary entry point for modern threats. Seamlessly ingest Abnormal‘s advanced email attack detections into the CrowdStrike Falcon® platform to improve cross-domain visibility of email-based attacks. This integration ingests key indicators about Abnormal‘s attack detections from Threat Log, alerts of new, potentially compromised vendors (Vendor Cases), and user-reported phishing emails (Abuse Mailbox Automation).

  • Detect costly and sophisticated threats with email insights
    Easily ingest Abnormal Security Email Security detections into Falcon Insight XDR to unify threat visibility across multiple domains, improving detection of the full spectrum of email attacks
  • Accelerate investigations with Falcon Insight XDR
    Cut investigation and triage time down through CrowdStrike‘s unified, threat-centric command console

Get Started

Enhance threat detection with Abnormal Security attack detections in Falcon Insight XDR

  • Detect costly and sophisticated threats with email insights
  • Accelerate investigations with Falcon Insight XDR
Configure Contact Partner

Not A CrowdStrike Customer?

Try CrowdStrike

More from Abnormal Security

Abnormal Cloud Email Security

Stop the full spectrum of email attacks with advanced behavioral data science

Abnormal Security SOAR Actions

Streamline email security workflows for enhanced operational security

Marketplace resources

Our partners

Our partners

CrowdStrike partners with the leaders in cybersecurity to deliver best-in-class protection.

CrowdStrike Shopping Bag icon

Buying on Marketplace

Buying on Marketplace

Explore all the listings that are available to purchase from CrowdStrike — some even qualify for CrowdCredits.

Become a partner

Become a partner

Join our open cybersecurity ecosystem of best-of-breed solutions to drive innovation and stop breaches.