Impersonation

The Challenge

Every organization is a target for sophisticated, social-engineering heavy, email impersonation attacks that are designed to steal money, intellectual property or other sensitive data. Not all email-based attacks use malicious URLs or have malware attachments. In fact billions of dollars have reportedly been lost as a result of fairly simple emails which impersonate the C-suite and ask for wire-transfers or credibly request that other sensitive data be sent to the fraudster.

Mimecast Solution

The Mimecast solution helps you defend against email impersonation attacks that seek to spoof a trusted sender and encourage costly data or monetary leakage. By deep scanning all inbound emails and inspecting for header anomalies, domain similarity, sender spoofing, and hunting for key words, suspicious emails can either be blocked or be delivered clearly marked to alert the receiver.

Mimecast Impersonation Protect provides:

  • Protection against malware-less email attacks seeking to impersonate trusted senders.
  • Real-time scanning of all inbound emails to detect header anomalies, domain similarity, sender spoofing and suspect email body content.
  • Suspicious emails that are delivered are clearly marked to alert users.
  • Centralized policy management and reporting to assist in the early detection of attack campaigns.

The Mimecast cloud-based security service provides always-on, always up-to-date protection without the complexity and cost of traditional security gateways.

Spear-phishing and Targeted Threats

91% of attacks by sophisticated cybercriminals start through email.

Most gateway solutions stop spam and viruses, but fail to address one of the biggest threats facing your company.

Infographic

Ransomware Survival: Top 10 Ways to Protect Your Organization

There isn’t one silver-bullet solution to staving off ransomware attacks. A successful approach to …


Case Study

Reminger Attorneys at Law Simplifies and Secures Office 365 Email with Mimecast

Reminger Attorneys at Law Simplifies and Secures Office 365 Email with Mimecast


Webinar

Anatomy of an Email-Borne Attack in Healthcare

Email remains the biggest entry point into your healthcare organization and with medical records at least 10X …