IN FOCUS
11
MIMECAST UNVEILS EMAIL SECURITY 3.0 STRATEGY New Technology capabilities and integrations strengthen Mimecast’s cloud-based platform Mimecast has added new capabilities to its cloud-based platform comprised of integrated service components that organizations’ need to combat the latest cybersecurity challenges. These capabilities further enable customers to embrace a new approach to defending email. Mimecast’s Email Security 3.0 strategy helps organizations address threats at three distinct zones: the email perimeter, inside the organization or network and beyond the perimeter. Mimecast has incorporated new major platform innovations helping to increase efficacy with technology integrations and product capabilities, including web browser isolation, security awareness training integrations and brand exploitation protection solutions. “The email threat landscape has changed and requires organizations to evolve from a perimeter-based discipline to a more pervasive one. For instance, tactics, like impersonation attempts, are becoming increasingly more difficult to identify as they’re happening both in email and ‘in the wild’, but organizations still need to cover off on their basic protection needs at the same time. This requires organizations to consider a new strategy when it comes to defending email,” said Peter Bauer, chief executive officer at Mimecast. “As our customers’ needs evolve, Mimecast is committed to continuing to developnew innovations into our platform to help them build a stronger cybersecurity and resilience posture.” New enhancements to Mimecast’s cloud-based platform include:
Zone 1 – At the Email Perimeter: Now Includes Browser Isolation and Custom Security Block for Added Protection Mimecast Browser Isolation for Email is designed to provide organizations an additional layer of protection from new phishing sites, appearing as recently as the last few hours. Mimecast Browser Isolation is engineered to mitigate the risk of emails containing links to spoofed sites by preventing a direct connection between the user’s browser on his or her device and the target web page. Users are now further protected from any potentially malicious action like the challenge of credential harvesting or malicious downloads as the browsing session is executed and contained within the Mimecast cloud rather than on the user’s device. Browser Isolation policies can be enforced for all employees or customized to target higher risk employees as desired.
Peter Bauer
Chief Executive Officer, Mimecast
The service also is built to provide a safe environment for security analysts and messaging administrators to investigate incidents, helping reduce time to respond, contain and remediate threats.
Zone 2 – Inside the Perimeter: Security Awareness Training is Integrated into the Mimecast Platform to Reduce Costs and Complexity Recent research reveals that 98 percent of organizations deploy security awareness training to their employees, yet 71 percent of organizations have been hit by an attack where malicious activity was spread from one user to another.* To help organizations more effectively manage security awareness training, Mimecast Awareness Training is now fully integrated into Mimecast’s cloud-based platform. This integration is designed to enable customers to more easily administer awareness training into their Mimecast and broader security ecosystem. Customers can now reduce the cost and complexity by having all their Mimecast solutions fully-integrated, making it easy for organizations to deploy, manage and maintain their security awareness training investments from a single administration console.
Zone 3 – Beyond the Email Perimeter: Brand and Domain Protection with Machine Learning Advances Phishing Protection from Known and Unknown Attacks Mimecast Brand Exploit Protect is engineered to deliver an innovative solution covering more than 99 percent of phishing use cases across the web. Using machine learning, it is designed to run targeted scans that identify even unknown attack patterns, blocking compromised assets before they become live attacks at the earliest preparation stages. April 2020 / SMARTSMB