Avanan is praised for its advanced threat protection, ease of integration, competitive pricing, and valuable customer support. Users appreciate the machine learning capabilities and real-time alerts Avanan provides. On the other hand, Abnormal Security stands out for its behavioral AI engine, advanced threat protection and easy integration with email platforms.
The summary above is based on 30 interviews we conducted recently with Avanan and Abnormal Security users. To access the review's full transcripts, download our report.
"Does a thorough job of examining email and URLs for malicious content."
"Microsoft Defender for Office 365 has improved my organization's security. It makes it easier to manage the infrastructure without the help of third-party applications."
"Microsoft Defender has a feature to protect each and every attachment. Even if it's an encrypted attachment, it will check for any potential threats."
"Microsoft Defender for Office 365's most valuable feature is its performance."
"The risk level notifications are most valuable. We get to know what kind of intrusion or attack is there, and we can fix a problem on time."
"Threat Explorer is an invaluable tool for me, and it plays a crucial role in helping me discern the origins of various email campaigns, pinpointing where they emanate from, and identifying the individuals within our organization who are affected."
"The initial setup is straightforward. You just add the license, click it, and then you can set up the rules. It is quite simple."
"Threat Explorer is one of the features that I very much like because it is a real-time report that allows you to identify, analyze, and trace security attacks."
"The features that appeal to me most are the combination of auto-remediation and Detection 360."
"One of the things that I love about them is that the setup and installation are super easy. All you do is give them access to your Microsoft 365 tenant, and through APIs, they are able to do their work. They are doing all this through APIs, so you do not have to install the software and take a month to get it all set up to even see the value of the solution. You could be up and running in less than an hour."
"I have never encountered any stability issues with Abnormal."
"Initial auto-remediation allows us to auto-remediate before the email lands in the end user's inbox for a split second."
"What I like about Abnormal Security is that it notifies me if any of my partners or suppliers are experiencing a security breach by analyzing their database and identifying potential cyber threats."
"Their ability to take things out of the mailbox and catch things much faster than users is excellent."
"It does some really cool stuff that other tools aren't doing. We found it to be really effective, and the AI/ML functionality is really what differentiates them."
"Ease of use is undoubtedly one of the most valuable features of Abnormal Security."
"I highly recommend this solution to any prospective buyer."
"The customizable rules allow you to change aspects."
"The integration with all our existing and new applications is great."
"Spam protection is the most valuable feature."
"The threat detection tools enable us to ascertain malware and phishing messages across the email network infrastructure."
"This technology is one of Check Point's acquisitions, and it is currently a powerful tool that provides all the protection that is not found in other tools."
"If we look at four to five years ago, we had close to six or eight people click a link in an email per month. Now, we are probably down to about five or six clicks a year, if not less."
"Easy to use for non-technical users."
"In one of the reports I can get the exact place where a vulnerable file resides. But for that, I need to explicitly go into the device and check. If they could include that file part in the report, without my having to go to the device itself, that would help."
"It would be better if it were more scalable. It depends on the architecture, but we would like to make it more scalable for both data centers."
"They can improve their security in a way where a customer can know if all their attachments are safe or not to open through a report. The solution does its job perfectly, but it never reports to the customer whether those attachments have been stopped before or not."
"The product must provide better malware detection."
"There is room for improvement with the UI."
"There is room for improvement in terms of reporting."
"The company should focus on adding threats that the solution is currently unable to detect."
"They have moved features from one console to another. Things have been moved around in the interface and it takes me time to find where certain features are."
"When we're working on something as engineers, and we find an idea or a method of doing something that would be greatly improved by doing it another way, there should be an ability for me to click the ideas button, type in an idea that I have, and submit it to a product review team or developers to have them think through the process a little bit more."
"I would like to have the ability to customize the auto-remediation feature."
"There could be room for improvement in enhancing integration with other cybersecurity tools."
"The biggest pain point for us is the lack of support for on-premise email systems."
"One feature I'd love to see is outbound scanning."
"The pricing for academic institutions and student mailboxes is challenging."
"The ideal scenario would be for Abnormal Security to work in tandem with Microsoft to analyze incoming emails."
"I, as such, do not have anything that I do not like or would like to add, but you could argue that because they are doing it API-based, there is a chance that something could slip through temporarily before they are able to pull it out. In theory, it could happen just because of the nature of the system. They are not in line with the delivery of the mail. They are kind of asynchronous, which is a pro as well as a con. If it is synchronous, then I know it would always stop them, but because it is asynchronous, things could get through temporarily or because of some system issues on the Microsoft side or their side. It is the nature of the beast, but it is a little bit of a con."
"When sending bulky emails, the system slows down and takes a long time before it responds effectively to our requests."
"They should come up with a mobile application so that it can be more flexible."
"The cost can be reviewed to enable SMEs to acquire it and enjoy great security features."
"It is complicated for new users unfamiliar with the modern cloud networking infrastructure."
"There are times when we have false positives."
"It is very difficult to find the required documentation."
"The system response in a slow computing device affects performance when sending and receiving emails."
"The system could be designed to give corporate emails first priority due to demands."
More Microsoft Defender for Office 365 Pricing and Cost Advice →
Abnormal Security is ranked 12th in Email Security with 8 reviews while Avanan is ranked 6th in Email Security with 21 reviews. Abnormal Security is rated 9.6, while Avanan is rated 9.2. The top reviewer of Abnormal Security writes "Provides comprehensive email security management, effective in detecting a wide range of email threats". On the other hand, the top reviewer of Avanan writes "We've noticed a significant decline from people accidentally or intentionally clicking on things". Abnormal Security is most compared with Mimecast Email Security, Egress Intelligent Email Security, Cloudflare Area 1 Email Security, Cisco Secure Email and Microsoft Exchange Online Protection (EOP), whereas Avanan is most compared with Check Point Harmony Email & Collaboration, IRONSCALES, Perception Point Advanced Email Security, Mimecast Email Security and Fortinet FortiMail. See our Abnormal Security vs. Avanan report.
See our list of best Email Security vendors.
We monitor all Email Security reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.