Threat Protection

The Challenges

Traditional email security controls or relying on your cloud email provider won’t protect you from today’s more targeted and sophisticated threats. You must continuously work to improve security protections to defend against known threats such as spear‐phishing, ransomware, impersonation attacks, malware, as well as threats moving laterally in your organization.  Organizations also suffer from an inability to address data leaks that are caused by careless or malicious insiders who are sending sensitive data and other intellectual property where they shouldn’t.

Mimecast Solution

Before an inbound email ever makes it to your organization’s email system, whether it is on‐premises or in the cloud, Mimecast provides a deep inspection system to detect the ways phishers and spammers try to access and fool your email security system and your users.

 As part of a cyber resilience for email strategy, the Mimecast Targeted Threat Protection service provides:

  • DNS Authentication
  • IP & Domain reputation checks
  • Spam scanning
  • Impersonation protection
  • Attachment protection
  • URL protection
  • Internal threat protection

The analytics and threat intelligence that make up these services are constantly evaluated and updated by the Mimecast Security Operations Center (MSOC). The MSOC is a team of globally distributed analysts and security researchers that manage the Mimecast security service on a 24/7 basis.

Mimecast Cyber Resilience for Email Explained

Cyber-attackers are continually evolving and adapting, and the risks increase every day. Organizations can no longer rely on a defense-only strategy to keep them safe. They need a plan to keep email flowing in the event of an attack and the ability to recover lost or locked data quickly after an attack.

Watch this video to learn about a new approach – Cyber Resilience for Email.

Solution Brief

Layered Protection Against Ransomware

Many organizations mistakenly believe that their antivirus and other prevention-oriented security products …


Blog Post

Target Breach One Year On: Email Is at the Heart of Supply Chain Security

One year after the Target data breach, there’s never been a better time to consider how vital email security is to maintain the sanctity of the supply chain. Email, by its very nature, directly connects companies large and small together creating opp…


The State of Email Security 2018 Report

Every day, cyberattackers from all over the world are targeting organizations like yours, with 90% of global companies reporting they’ve seen the volume of phishing attacks increase or remain consistent over the past 12 months. You need more than a defense-only strategy to address these threats.

Read the State of Email Security 2018 report from Mimecast to learn which departments tend to be the “weak link” in your security strategy; the frequency of URLs vs attachments in email proliferating malicious attacks; and mitigation strategies you can implement today to reduce risk and ensure continuity.

Download now
Blog Post

The Road to Office 365 – It’s Not ‘If’ but ‘When’ and ‘How’

If there’s one thing we can be sure about it’s that, at some point in the future, almost nobody will manage mailboxes on premises.  The dominant players look like being Microsoft with Office 365 and Google with Google Apps, though of course othe…


Analyst Report

Email Security Uncovered: Mimecast Research Report

Whether you’ve faced an email cyber-attack before and feel prepared to take on new threats, or don’t have …