Application Security

10/2/2018
04:45 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Mimecast Announces Web Security

75% Of Organizations Lack Complete Confidence That Their Security Defenses Will Stop Targeted Spear-Phishing With Malicious Web Links

IP Expo, London – Mimecast Limited today announced the general availability its new web security service. The cloud-based service is designed to guard against malicious activity initiated by user action or malware while blocking access to websites deemed unsafe or inappropriate based on each organization’s policies.

Mimecast Web Security is engineered to be managed with the same administration console that customers use to manage Mimecast's existing email services. This offers an easy-to-deploy and manage defense against advanced phishing and malware attacks being delivered to employees by both email, web, instant messaging systems, social network sites, and ad networks.

During the early adopter program, customers around the world tested the service which is now immediately available globally.

Jamie Fernandes, director of product management for web security at Mimecast, said: "Commonalities between email and web threat intelligence and detective analytics help improve the security defenses against both vectors whether used by attackers separately or together. The new web security service is designed to allow customers to broaden and improve their protection from attacks occurring via email and the web, using a single integrated service. We're excited about our ability to significantly expand our customers’ defense systems by extending the power of our Mime|OS threat detection technologies and the global grid powered by 30,000+ customers we’re protecting around the globe."

Vanson Bourne research* found 32% of organizations were not confident that their employees could spot and defend against malware or ransomware attacks via direct web downloads. Only 25% were completely confident their security defenses would stop targeted spear-phishing with malicious links.

Ascend Learning, a network of K-12 public charter schools serving 4,800 students in 12 schools across Brooklyn, were a member of the customer early adopter program. Emeka Ibekweh, managing director of technology at Ascend, commented: "It’s critical to our primary educational objectives that our staff and students are protected from malicious email attacks and web sites or inappropriate web content."

Scott Crawford, research director of Information Security, 451 Research, commented: "Organizations often struggle to enforce security for two of the most common attack vectors: email and the web. Many security professionals seek to consolidate and use integrated cloud services that make management and operation simpler and more effective. Mimecast's move to expand outside of its core email focus mirrors the growing need for a more integrated defense to combat advanced attacks."

The combined cyber resilience offering is also supported by the Mimecast Security Operations Center (MSOC) team and is enriched with all the global threat intelligence, analytics, and infrastructure that supports Mimecast’s current services.   

Mimecast's CEO, Peter Bauer, added: "We can now protect our customers with a more complete threat detection offering that will work the way organizations do—anytime and anywhere, doing business through the email and web at global scale. Our homegrown research and development into the high-growth web security market is designed to apply our recent acquisitions of Solebit for advanced malware detection and Ataata for a new approach to employee risk scoring, training and awareness. Together, these strategic investments are helping us move toward our vision of providing an integrated super-category of cyber resilience solutions from a global, cloud-based service."

The service is available for a free 30-day trial for existing Mimecast customers.

*Research was conducted in March 2018 by Vanson Bourne on behalf of Mimecast. Respondents were IT decision makers at 800 organizations around the world with more than 250 employees.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
6 Reasons Why Employees Violate Security Policies
Ericka Chickowski, Contributing Writer, Dark Reading,  10/16/2018
Getting Up to Speed with "Always-On SSL"
Tim Callan, Senior Fellow, Comodo CA,  10/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: Too funny!
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.