chat
expand_more

1,246 Missed Threats Detected: Fortune 500 Packaging Solutions Provider Switches from Proofpoint to Abnormal

A Fortune 500 packaging leader boosted threat detection and saved 6,500+ hours annually by replacing its Proofpoint SEG with Abnormal’s AI-powered solution.
October 14, 2024

About the Customer

  • Industry: F500 Packaging Materials Manufacturing

  • Mailboxes: 11,000

  • Previous Email Security: Proofpoint Secure Email Gateway inline with Microsoft 365 E5

Customer Challenges: Concerns with Proofpoint's Secure Email Gateway

  • Detection Efficacy:

    • In a 30-day read-only mode evaluation period, Abnormal detected 1,246 malicious messages that Proofpoint missed. Additionally, over the same 30-day period, the Proofpoint SEG post-remediated only 4.8% of the attacks detected by Abnormal, with a median time to action of 5.25 hours per attack.

  • Workforce Productivity Loss:

    • During the 30-day evaluation period, the company’s employees received an estimated 106,000 graymail messages, cluttering inboxes and requiring significant time for manual graymail deletion.

  • Redundant Software Costs:

    • The company was poised to spend $315,000 on renewing Proofpoint for features that significantly overlapped with functionality included in the native SEG capabilities of the Microsoft 365 platform.

  • Risk of Vendor Fraud:

    • Upon integration for the 30-day evaluation period, Abnormal’s VendorBase evaluated the security posture of every vendor in the company’s ecosystem, identifying 335 high-risk accounts that could be potentially abused by bad actors.

  • High Attack Engagement Rate:

    • While monitoring inboxes in passive mode during the 30-day evaluation period, Abnormal detected 391 unsafe user engagements with attacks, requiring the security team to complete more intensive investigation and remediation actions.

Abnormal’s Solution: Better Protection, Greater Savings

Recognizing that Proofpoint was failing to meet their needs in terms of security, costs, and productivity, the packaging materials manufacturer initiated a proof of value (POV) with Abnormal.

  • Fast Integration:

    • Abnormal integrated with the Microsoft 365 platform via API in under 60 seconds, with virtually no professional services required.

  • Risk Avoidance:

    • Based on the number of attacks identified for remediation, the average compromise rate for the customer’s industry*, and the average cost per incident, the malicious emails missed by Proofpoint during the 30-day POV could have resulted in an estimated $1,445,200 in annual losses, if similar undetected attacks had continued at this pace.

  • Increased Inbox Efficiency:

    • During the 30-day POV, Abnormal automatically learned user preferences and decluttered employee inboxes; this functionality potentially saved employees up to 278 hours per month.

Moving to Better Email Security: The Transition to Abnormal

Within 90 days of deploying Abnormal, the Fortune 500 manufacturer decided to migrate off Proofpoint. Abnormal’s seamless Proofpoint migration service enabled the customer to easily decommission Proofpoint with minimal effort.

  • Migration Time:

    • Abnormal’s experts managed the majority of the transition tasks at no cost to the customer, completing the full migration in just 10 hours.

  • Employee Productivity Gains:

    • By using AI to filter time-wasting graymail and eliminate opportunities for end users to engage with malicious emails, Abnormal saved the company’s employee base 544 hours during the 30-day period. Assuming the same attack and graymail rates, this could result in an estimated 6,526 hours annually for the company.

Find out why enterprises across industries are moving from Proofpoint to Abnormal. Get started with a demo today and we’ll show you the proof of the Abnormal value.

Schedule a Demo
1,246 Missed Threats Detected: Fortune 500 Packaging Solutions Provider Switches from Proofpoint to Abnormal

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Discover How It All Works

See How Abnormal AI Protects Humans

Related Posts

B DKIM Replay Google Phishing Attack
Threat actors used DKIM replay to send Google-branded phishing emails that passed authentication checks. Here’s how the attack worked and why it’s hard to catch.
Read More
B 1500x1500 MKT834 Abnormal AI Blog
Discover why Abnormal Security is rebranding to Abnormal AI as the company continues its mission to protect humans from cybercrime.
Read More
B Pig Butchering
Learn about pig butchering fraud, a new threat to organizational security. Explore operational tactics, warning signs, and strategies to safeguard your business.
Read More
B Gamma Attack Story Blog
Attackers exploit Gamma in a multi-stage phishing attack using Cloudflare Turnstile and AiTM tactics to evade detection and steal Microsoft credentials.
Read More
B Proofpoint Customer Story 16
With Abnormal’s behavioral AI, a top healthcare solutions provider addressed gaps left by Proofpoint, automated workflows, and saved 335 SOC hours monthly.
Read More
B Phishing Australia
Attackers rely on the trust currency of corporate email to launch highly personalised phishing attacks. Luckily, a revolution in email security means humans are no longer the last line of defence.
Read More