chat
expand_more

Secure New Tenants Faster with Multi-Tenant Management

Multi-Tenant Management onboards tenants efficiently so they can adhere to their service level agreements and keep their customers happy.
December 13, 2022

Abnormal Security’s mission is to make the cloud a safer place for business by protecting employees wherever they work. With the release of the Multi-Tenant Management feature, we are one step closer to fulfilling that goal by allowing security teams to protect their distributed workforce and onboard new tenants more quickly.

Previously, if a customer wanted to protect an additional M365 or Google Workspace instance with Abnormal, it was a manual, multi-day process involving numerous exchanges and potential delays. The process included multiple steps including:

  1. Customer reaches out to their Abnormal Customer Success Manager (CSM).
  2. Customer provides the necessary information to onboard the workspace.
  3. CSM gives a new link for the workspace to integrate.
  4. Customer uses the link to grant Abnormal permission to their workspace.
  5. Abnormal begins building out a baseline behavior for the new tenant.

Now, with Multi-Tenant Management, adding a new child tenant only requires three steps:

  1. Navigate to settings.
  2. Name the new tenant.
  3. Grant access to the workspace.

This new enhancement allows Abnormal to be better equipped to support two of the most critical cybersecurity risk management use cases: Mergers and Acquisitions (M&A) and Managed Security Partners (MSPs).

Protecting Mergers and Acquisitions

The mergers and acquisitions process is quite chaotic: both companies see large financial transactions, new people, and changing processes. As a result, most companies face spikes in cyberattacks around the time that acquisitions are announced (FBI).

Moreover, during this time, both organizations’ stock prices are highly sensitive, and breaches of sensitive information could harm or even jeopardize the acquisition. The timely protection of company data during mergers and acquisitions is extremely important to ensure a successful transaction.

Fortunately, the strength of security and the speed needed for onboarding is no longer at odds. With the release of multi-tenant management, an Abnormal-protected customer can onboard a new tenant with a few clicks. Previously, if an admin needed to onboard a new tenant, it could take up to a week with multiple back-and-forth conversations with the Abnormal support team.

Tenant management

Get Started with Multi-Tenant Management Today

Multi-Tenant Management is available to customers using the Abnormal Inbound Email Security product on either Microsoft 365 or Google Workspace.

Ready to learn more about Multi-Tenant Management? Schedule a demo today.

Secure New Tenants Faster with Multi-Tenant Management

See Abnormal in Action

Get a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

Discover How It All Works

See How Abnormal AI Protects Humans

Related Posts

B DKIM Replay Google Phishing Attack
Threat actors used DKIM replay to send Google-branded phishing emails that passed authentication checks. Here’s how the attack worked and why it’s hard to catch.
Read More
B 1500x1500 MKT834 Abnormal AI Blog
Discover why Abnormal Security is rebranding to Abnormal AI as the company continues its mission to protect humans from cybercrime.
Read More
B Pig Butchering
Learn about pig butchering fraud, a new threat to organizational security. Explore operational tactics, warning signs, and strategies to safeguard your business.
Read More
B Gamma Attack Story Blog
Attackers exploit Gamma in a multi-stage phishing attack using Cloudflare Turnstile and AiTM tactics to evade detection and steal Microsoft credentials.
Read More
B Proofpoint Customer Story 16
With Abnormal’s behavioral AI, a top healthcare solutions provider addressed gaps left by Proofpoint, automated workflows, and saved 335 SOC hours monthly.
Read More
B Phishing Australia
Attackers rely on the trust currency of corporate email to launch highly personalised phishing attacks. Luckily, a revolution in email security means humans are no longer the last line of defence.
Read More