Threat Protection

The Challenges

Traditional email security controls or relying on your cloud email provider won’t protect you from today’s more targeted and sophisticated threats. You must continuously work to improve security protections to defend against known threats such as spear‐phishing, ransomware, impersonation attacks, malware, as well as threats moving laterally in your organization.  Organizations also suffer from an inability to address data leaks that are caused by careless or malicious insiders who are sending sensitive data and other intellectual property where they shouldn’t.

Mimecast Solution

Before an inbound email ever makes it to your organization’s email system, whether it is on‐premises or in the cloud, Mimecast provides a deep inspection system to detect the ways phishers and spammers try to access and fool your email security system and your users.

 As part of a cyber resilience for email strategy, the Mimecast Targeted Threat Protection service provides:

  • DNS Authentication
  • IP & Domain reputation checks
  • Spam scanning
  • Impersonation protection
  • Attachment protection
  • URL protection
  • Internal threat protection

The analytics and threat intelligence that make up these services are constantly evaluated and updated by the Mimecast Security Operations Center (MSOC). The MSOC is a team of globally distributed analysts and security researchers that manage the Mimecast security service on a 24/7 basis.

Mimecast Cyber Resilience for Email Explained

Cyber-attackers are continually evolving and adapting, and the risks increase every day. Organizations can no longer rely on a defense-only strategy to keep them safe. They need a plan to keep email flowing in the event of an attack and the ability to recover lost or locked data quickly after an attack.

Watch this video to learn about a new approach – Cyber Resilience for Email.


Blog Post

Cyber Resilience News June 5, 2018

Catch up on the past week’s news in cybersecurity. News this week reminded us that phishing and whaling are not going away, they’re actually on the rise.  Just ask Goliath and Goliath who suffered a phishing attack last week. GDPR continues to …


Ebook

Checklist: How to Keep Cyberattacks in Check

Users are susceptible to all manner of email threats: ransomware, spear-phishing and impersonation attacks …


Case Study

HIPAA Compliance Requires Highest Email Security Standards

Comprehensive email service replaces three point products, vastly improving performance and reducing administrative burden


Blog Post

Trust Matters at Mimecast

Mimecast recently announced it has completed two important security tests: the Health Insurance Portability and Accountability Act (HIPAA) Security Compliance Assessment and Service Organization Control 2 Type 1 (SOC 2 Type 1) Independent Servic…