chat
expand_more

Operating with Confidence: Why a Leading Healthcare Solutions Provider Trusted Abnormal to Catch What Proofpoint Missed

With Abnormal’s behavioral AI, a top healthcare solutions provider addressed gaps left by Proofpoint, automated workflows, and saved 335 SOC hours monthly.
April 11, 2025

About the Customer

  • Industry: Healthcare

  • Mailboxes: 15,600

  • Email Infrastructure: Microsoft 365 E5 + Proofpoint Secure Email Gateway + Abnormal Human Behavior AI Platform

Customer Challenges: Concerns with Proofpoint's Secure Email Gateway

Abnormal transformed this global medical equipment and services provider’s overall security stack, offering more comprehensive protection and detecting advanced attacks that its Proofpoint SEG was failing to catch.

Positioned downstream in the mail flow, Abnormal detects only threats that bypass the gateway, capturing data that demonstrates the SEG’s shortcomings, including:

  • Detection Efficacy:

    • During a three-month period, Abnormal detected 5,438 malicious messages that Proofpoint missed, including 4,824 credential phishing attacks and 117 invoice fraud attacks. Abnormal also detected 75 potential account takeover cases where email accounts had been successfully compromised.

  • SOC Productivity Impact:

    • Within this timeframe, employees reported 5,026 emails for review. Since each email takes an average of 15 minutes to manually review, the SOC faced a potential loss of up to 418 hours of productivity each month without AI-powered automatic remediation.

Abnormal’s Solution: Better Protection for Defense in Depth

With Abnormal’s AI fortifying its security framework, this leading healthcare solutions provider has reduced its risk and boosted SOC productivity. Abnormal’s behavioral AI analyzes thousands of signals to baseline normal employee and vendor behavior and identifies high-risk anomalies with precision—protecting the organization from sophisticated attacks that traditional defenses like Proofpoint can miss.

  • Risk Avoidance:

    • Based on the number of attacks identified for remediation, the average compromise rate Abnormal has observed for the customer’s industry segment*, and the average cost per incident**, the malicious emails missed by Proofpoint during the three-month period could have resulted in estimated potential annual losses of more than $3,200,000 if similar undetected attacks had continued at this pace.

  • Improved SOC Productivity:

    • Abnormal’s AI Security Mailbox fully automated the handling of user-reported emails. Because each email previously required an average of 15 minutes of SOC analyst time to review, this freed up an average of 335 SOC hours per month during the one-quarter observation period—freeing up the capacity of approximately two additional full-time employees.

Because of Abnormal, this global healthcare manufacturer can now feel more confident in its defense-in-depth security stack. Implementing the Abnormal Human Behavior AI Platform ensures additional attacks are stopped and the SOC team is freed to focus on higher-priority tasks.

Find out why enterprises across industries are moving from Proofpoint to Abnormal. Get started with a demo today, and we’ll show you the proof of the Abnormal value.

Schedule a Demo

* Source: Abnormal Internal Operations Data

** Source: Average cost figures taken from the following third-party studies: NetDiligence Cyber Claims Study 2023 Report, 2023 Unit 42 Ransomware and Extortion Report, IBM Cost of a Data Breach, The Parallax View

Operating with Confidence: Why a Leading Healthcare Solutions Provider Trusted Abnormal to Catch What Proofpoint Missed

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Discover How It All Works

See How Abnormal AI Protects Humans

Related Posts

Innovate Summer Update Announcement Blog Cover
Join Abnormal Innovate: Summer Update on July 17 to explore the future of AI-powered email security with bite-sized sessions, expert insights, and exclusive product reveals.
Read More
High Scale Aggregation Cover
At Abnormal AI, detecting malicious behavior at scale means aggregating vast volumes of signals in realtime and batch. This post breaks down how we implemented the Signals DAG across both systems to achieve consistency, speed, and detection accuracy at scale.
Read More
B CISO SAT
Discover how modern CISOs are evolving security awareness training from a compliance checkbox into a strategic, AI-powered program that drives behavior change and builds a security-first culture.
Read More
B Regional VEC BEC Trends Blog
Regional analysis of 1,400+ organizations reveals how geography shapes email security risks. See which regions are most vulnerable to VEC vs BEC.
Read More
B HTML and Java Script Phishing
Explore real phishing attacks that use HTML and JavaScript to bypass defenses and learn what makes these emails so hard to detect.
Read More
B Custom Phishing Kits Blog
Brand-specific phishing kits are replacing generic templates. Learn how these custom phishing kits enable sophisticated impersonation attacks.
Read More