Abnormal Security vs Relativity
Side-by-side comparison to help you choose.
| Feature | Abnormal Security | Relativity |
|---|---|---|
| Type | Product | Product |
| UnfragileRank | 32/100 | 32/100 |
| Adoption | 0 | 0 |
| Quality | 1 | 1 |
| Ecosystem |
| 0 |
| 0 |
| Match Graph | 0 | 0 |
| Pricing | Paid | Paid |
| Capabilities | 11 decomposed | 13 decomposed |
| Times Matched | 0 | 0 |
Analyzes user communication patterns and sending behavior to identify when an email account has been compromised or is being used abnormally. Uses baseline behavioral profiles to detect deviations that indicate account takeover, even when the attacker uses legitimate credentials.
Identifies phishing emails designed to steal user credentials through behavioral analysis and content inspection. Detects credential harvesting attempts that bypass traditional signature-based detection by analyzing email characteristics, sender reputation, and content patterns.
Provides comprehensive reporting and analytics on detected threats, attack patterns, and security posture. Generates dashboards and reports showing phishing attempts, BEC attacks, account compromises, and trends over time for security team review and executive reporting.
Detects and blocks Business Email Compromise (BEC) attacks where attackers impersonate executives or trusted partners to manipulate employees into transferring funds or sensitive information. Uses behavioral analysis to identify spoofed communications and unusual transaction requests.
Integrates with Microsoft 365 and Google Workspace email systems using API-based connections that do not require rerouting mail flow through external servers. Enables rapid deployment and minimal infrastructure changes compared to traditional email gateway solutions.
Continuously learns and updates behavioral baselines for users and organizations based on communication patterns, sending habits, and interaction data. Improves detection accuracy over time as the system accumulates more data about normal vs. anomalous behavior.
Identifies unusual email sending patterns such as sending to new recipients, bulk emails to external addresses, or sending at unusual times. Detects compromised accounts or insider threats by recognizing deviations from established user sending behavior.
Uses behavioral AI and advanced analysis to detect phishing emails that evade traditional signature-based detection methods. Identifies zero-day phishing attempts, polymorphic attacks, and sophisticated social engineering that rule-based systems miss.
+3 more capabilities
Automatically categorizes and codes documents based on learned patterns from human-reviewed samples, using machine learning to predict relevance, privilege, and responsiveness. Reduces manual review burden by identifying documents that match specified criteria without human intervention.
Ingests and processes massive volumes of documents in native formats while preserving metadata integrity and creating searchable indices. Handles format conversion, deduplication, and metadata extraction without data loss.
Provides tools for organizing and retrieving documents during depositions and trial, including document linking, timeline creation, and quick-search capabilities. Enables attorneys to rapidly locate supporting documents during proceedings.
Manages documents subject to regulatory requirements and compliance obligations, including retention policies, audit trails, and regulatory reporting. Tracks document lifecycle and ensures compliance with legal holds and preservation requirements.
Manages multi-reviewer document review workflows with task assignment, progress tracking, and quality control mechanisms. Supports parallel review by multiple team members with conflict resolution and consistency checking.
Enables rapid searching across massive document collections using full-text indexing, Boolean operators, and field-specific queries. Supports complex search syntax for precise document retrieval and filtering.
Abnormal Security scores higher at 32/100 vs Relativity at 32/100. Abnormal Security leads on quality, while Relativity is stronger on ecosystem.
Need something different?
Search the match graph →© 2026 Unfragile. Stronger through disorder.
Identifies and flags privileged communications (attorney-client, work product) and confidential information through pattern recognition and metadata analysis. Maintains comprehensive audit trails of all access to sensitive materials.
Implements role-based access controls with fine-grained permissions at document, workspace, and field levels. Allows administrators to restrict access based on user roles, case assignments, and security clearances.
+5 more capabilities