chat
expand_more

Secure New Tenants Faster with Multi-Tenant Management

Multi-Tenant Management onboards tenants efficiently so they can adhere to their service level agreements and keep their customers happy.
December 13, 2022

Abnormal Security’s mission is to make the cloud a safer place for business by protecting employees wherever they work. With the release of the Multi-Tenant Management feature, we are one step closer to fulfilling that goal by allowing security teams to protect their distributed workforce and onboard new tenants more quickly.

Previously, if a customer wanted to protect an additional M365 or Google Workspace instance with Abnormal, it was a manual, multi-day process involving numerous exchanges and potential delays. The process included multiple steps including:

  1. Customer reaches out to their Abnormal Customer Success Manager (CSM).
  2. Customer provides the necessary information to onboard the workspace.
  3. CSM gives a new link for the workspace to integrate.
  4. Customer uses the link to grant Abnormal permission to their workspace.
  5. Abnormal begins building out a baseline behavior for the new tenant.

Now, with Multi-Tenant Management, adding a new child tenant only requires three steps:

  1. Navigate to settings.
  2. Name the new tenant.
  3. Grant access to the workspace.

This new enhancement allows Abnormal to be better equipped to support two of the most critical cybersecurity risk management use cases: Mergers and Acquisitions (M&A) and Managed Security Partners (MSPs).

Protecting Mergers and Acquisitions

The mergers and acquisitions process is quite chaotic: both companies see large financial transactions, new people, and changing processes. As a result, most companies face spikes in cyberattacks around the time that acquisitions are announced (FBI).

Moreover, during this time, both organizations’ stock prices are highly sensitive, and breaches of sensitive information could harm or even jeopardize the acquisition. The timely protection of company data during mergers and acquisitions is extremely important to ensure a successful transaction.

Fortunately, the strength of security and the speed needed for onboarding is no longer at odds. With the release of multi-tenant management, an Abnormal-protected customer can onboard a new tenant with a few clicks. Previously, if an admin needed to onboard a new tenant, it could take up to a week with multiple back-and-forth conversations with the Abnormal support team.

Tenant management

Get Started with Multi-Tenant Management Today

Multi-Tenant Management is available to customers using the Abnormal Inbound Email Security product on either Microsoft 365 or Google Workspace.

Ready to learn more about Multi-Tenant Management? Schedule a demo today.

Secure New Tenants Faster with Multi-Tenant Management

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Discover How It All Works

See How Abnormal AI Protects Humans

Related Posts

Blog Cover 1500x1500 Template v3 0 DO NOT EDIT OR DELETE copy pptx
The psychology of the modern work environment has become a roadmap for attackers—and a blind spot for traditional email security.
Read More
B VEC Employee Engagement Threat Report Blog 1
New research reveals that employees engage with 44% of read vendor email compromise attacks. See which industries and roles are most vulnerable to this threat.
Read More
B 1500x1500 MKT889c Forrester Wave
Abnormal AI received the highest scores possible in the Innovation and Roadmap criteria, the top score in the Strategy category, and above-average customer feedback.
Read More
B SEG 5 27 25
Traditional secure email gateways once defined email security. Today, they’re struggling to catch the final—and most dangerous—1% of attacks.
Read More
Cover pptx
Discover how Abnormal AI leverages AI tools like Cursor and Model Context Protocol (MCP) in production to accelerate development.
Read More
B Convergence
Explore key takeaways from Season 4 of Convergence, covering how malicious AI is reshaping cybercrime, why human behavior remains a core vulnerability, and what evolving AI policy means for defenders.
Read More