Impersonation

The Challenge

Every organization is a target from sophisticated, social‐engineering heavy, email impersonation attacks designed to steal money, intellectual property or other sensitive data. Not all email‐based attacks use malicious URLs or have malware attachments. In fact, billions of dollars have reportedly been lost because of fairly simple emails which impersonate your C‐suite and ask for wire‐transfers or credibly request that other sensitive data be sent back to the impersonator.

Mimecast Solution

The Mimecast email security service helps you defend against email impersonation attacks that seek to spoof a trusted sender and cause a costly data or monetary leak. By deep scanning all inbound emails and inspecting for header anomalies, domain similarity, sender spoofing, and the existence of keywords, suspicious impersonation emails can either be blocked, quarantined, or delivered as flagged to alert the receiver.

Mimecast Impersonation Protect provides:

  • Protection against malware-less email attacks seeking to impersonate trusted senders.
  • Real-time scanning of all inbound emails to detect header anomalies, domain similarity, sender spoofing and suspect email body content.
  • Clearly marked alerts on delivered emails providing awareness to the recipient of potential risk.
  • Centralized policy management and reporting to assist in the early detection of attack campaigns targeting your organization.

The Mimecast cloud-based security service provides always-on, always up-to-date protection without the complexity and cost of traditional email security systems.

 

Spear-phishing and Targeted Threats

91% of attacks by sophisticated cybercriminals start through email.

Most gateway solutions stop spam and viruses, but fail to address one of the biggest threats facing your company.

Analyst Report

SE Labs Report: Intelligence-Led Testing for Email Security Services 2018

SE Labs tested a range of email hosted protection services from a variety of well-known vendors in an effort …


Ebook

E-Book: HIMSS Survey Reveals the Cure for Outdated Email Security

Is your healthcare organization part of the 90% that conducts annual cybersecurity assessments?* Do you wonder …


Blog Post

Stop Email Threats in Healthcare IT

Breaches in Healthcare: Lessons Learned From HIMSS18 It’s hard to believe that Health IT Conference, HIMSS18, has already come and gone. I feel like my ears are still ringing from the constant dinging of the Venetian slot machines! The conference is…