Download PDF version Contact company

Abnormal Security, the platform that protects large enterprises from the most sophisticated, targeted email attacks, announces the appointment of Rami Habal to Chief Product Officer. Habal joins Abnormal following the company’s $24M Series A funding led by Greylock Partners and the general availability of its cloud email security platform.

Habal brings more than 20 years of experience solving consumer and enterprise customers’ biggest problems with applied machine learning across a variety of industries. At Amazon Alexa, he led cross-functional product and engineering teams at the intersection of voice interfaces, AI, and connected devices.

Email security solution

Habal’s ability to lead product strategy, vision and execution also helped bring Proofpoint’s cybersecurity products to market, from the company’s inception through to its IPO. “Rami embodies the combination of deep expertise in data science and experience in enterprise security that sets the world-class Abnormal Security team apart,” said Evan Reiser, CEO, Abnormal Security.

Perhaps more importantly, Rami is customer-obsessed. We couldn’t ask for a better fit for someone to lead our product and engineering teams in building a state of the art data science and behavioural analysis platform, applied to customer email security challenges.” The Abnormal Security platform provides unprecedented protection against targeted attacks by analysing more sources of data than any other email security solution, including data beyond email.

Email gateway solutions

Abnormal Security is leading this charge and solving the biggest, most expensive security issue for enterprises"

Abnormal Behaviour Technology (ABX) uses this rich set of organization-specific data to uniquely drive the Abnormal Identity Model, the Abnormal Relationship Graph, and Abnormal Content Analysis. Through this combination, ABX results in exceptional detection efficacy. More than 70% of business email compromise attacks identified through Abnormal Security platform customer deployments were not initially blocked by security email gateway solutions.

We’ve reached an exciting point in the evolution of cybersecurity technology where the application of machine learning and AI is having a real impact in how we solve problems for customers,” said Habal. “Abnormal Security is leading this charge and solving the biggest, most expensive security issue for enterprises. I’m honoured to be a part of this incredible leadership team.”

Incredible leadership team

In addition to his work at Amazon and Proofpoint, Habal led Product Marketing and Sales for Swagger (acquired), and was VP of Product at Reverb Technologies (acquired). Earlier in his career, Habal held positions at Mohr Davidow Ventures, Cisco, and Hughes Network Systems. He currently serves as an advisor to HCG Fund Management and is an investor and advisor to various Silicon Valley startups.

Habal holds a B.S. in Electrical Engineering from the University of Virginia, a Masters in Computer Science from Johns Hopkins University, an MBA from the Massachusetts Institute of Technology (MIT) Sloan School of Management, and a Master of Public Administration (MPA) from Harvard University’s John F. Kennedy School of Government.

Download PDF version Download PDF version

In case you missed it

What new and emerging threats do security professionals face?
What new and emerging threats do security professionals face?

There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to t...

Real time crime centres - policing's new hub
Real time crime centres - policing's new hub

As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centres e...

Mitigating cybersecurity risks in industrial control systems with Honeywell
Mitigating cybersecurity risks in industrial control systems with Honeywell

Cybersecurity threats targeting organisations' industrial control systems (ICS) are not always direct. Instead, the most vulnerable entries to an ICS can start with external partne...

Quick poll
Which feature is most important in a video surveillance system?