Threat Protection

The Challenges

Traditional email security controls or relying on your cloud email provider won’t protect you from today’s more targeted and sophisticated threats. You must continuously work to improve security protections to defend against known threats such as spear‐phishing, ransomware, impersonation attacks, malware, as well as threats moving laterally in your organization.  Organizations also suffer from an inability to address data leaks that are caused by careless or malicious insiders who are sending sensitive data and other intellectual property where they shouldn’t.

Mimecast Solution

Before an inbound email ever makes it to your organization’s email system, whether it is on‐premises or in the cloud, Mimecast provides a deep inspection system to detect the ways phishers and spammers try to access and fool your email security system and your users.

 As part of a cyber resilience for email strategy, the Mimecast Targeted Threat Protection service provides:

  • DNS Authentication
  • IP & Domain reputation checks
  • Spam scanning
  • Impersonation protection
  • Attachment protection
  • URL protection
  • Internal threat protection

The analytics and threat intelligence that make up these services are constantly evaluated and updated by the Mimecast Security Operations Center (MSOC). The MSOC is a team of globally distributed analysts and security researchers that manage the Mimecast security service on a 24/7 basis.

Mimecast Cyber Resilience for Email Explained

Cyber-attackers are continually evolving and adapting, and the risks increase every day. Organizations can no longer rely on a defense-only strategy to keep them safe. They need a plan to keep email flowing in the event of an attack and the ability to recover lost or locked data quickly after an attack.

Watch this video to learn about a new approach – Cyber Resilience for Email.

Solution Brief

Mimecast Eases Notifiable Data Breaches (NDB) Compliance for Email

Introduction On the 13th February 2017, the Privacy Amendment (Notifiable Data Breaches) Act was passed in …


Ebook

Cyber Resilience Preparedness. Expert Insight, Tips and Guidance

Navigating a turbulent cybersecurity climate can be hard – especially as threats like Petya and WannaCry …


Blog Post

Three Ways to Improve the “Human Firewall” and Strengthen Email Security

When it comes to enterprises finding innovative ways to neutralize widespread email-based attacks, I’ve made the case before that it's employees – the same “weak links” who unknowingly click on malicious email URLs and attachments – who could actuall…


Analyst Report

BCI Information Security Report 2017

The importance of enterprise information security and data protection is growing rapidly. Key drivers for this …


Blog Post

3 Ways to Take Down an Organization: Technical Failures, Targeted Attacks, and Human Error

What are you doing about the threats against your organization? “My company is impenetrable and no one could ever successfully breach our system in any way.” – Literally no security professional, ever. I start off with this remark as a reminder that…