Macnica announced that it has entered into a domestic distributorship agreement with Abnormal AI, Inc. and will begin handling Abnormal AI, a product that uses AI to strengthen the overall security of cloud applications such as email and communication tools and ID management.
In recent years, Japan has seen an increase in sophisticated email-based attacks such as phishing attacks and business email compromise (BEC). Until a few years ago, there were not many email-based attacks in Japan compared to other countries due to language issues such as attackers not being able to use Japanese well and the fact that Japanese support would not scale. However, as the accuracy of AI has improved and attackers can now use Japanese more easily, attacks in natural Japanese have increased, and attacks that hijack legitimate domains and fileless attacks without attachments are actually landing on companies.
In addition, as more and more people are using communication tools other than email, such as chat, to communicate with external parties, these tools are also becoming targets of attacks, making it necessary for companies to consider security measures for all cloud applications.
Also Read: HENNGE One Partners with Cloud System “MENTENA”
Abnormal AI is a security platform that focuses on human behavior. It uses machine learning to detect sophisticated phishing, spoofing, and account infringement in cloud applications that have been difficult to detect until now, thereby preventing sophisticated attacks.
For example, while conventional Secure Email Gateways (SEGs) mainly rely on threat intelligence for detection, Abnormal AI’s anomaly detection engine accurately understands human behavior based on personal characteristics, such as “Did this email really come from the sender?” and background information, such as “What circumstances and interactions were involved in sending the email?” This allows it to determine the risk lurking in each email and detect and block sophisticated fraudulent emails.
In addition, the platform contributes to more efficient security operations by automating operational tasks such as post-deployment policy adjustments and responding to false positives reported by users.
SOURCE: Macnica