Application Security

10/2/2018
04:45 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Mimecast Announces Web Security

75% Of Organizations Lack Complete Confidence That Their Security Defenses Will Stop Targeted Spear-Phishing With Malicious Web Links

IP Expo, London – Mimecast Limited today announced the general availability its new web security service. The cloud-based service is designed to guard against malicious activity initiated by user action or malware while blocking access to websites deemed unsafe or inappropriate based on each organization’s policies.

Mimecast Web Security is engineered to be managed with the same administration console that customers use to manage Mimecast's existing email services. This offers an easy-to-deploy and manage defense against advanced phishing and malware attacks being delivered to employees by both email, web, instant messaging systems, social network sites, and ad networks.

During the early adopter program, customers around the world tested the service which is now immediately available globally.

Jamie Fernandes, director of product management for web security at Mimecast, said: "Commonalities between email and web threat intelligence and detective analytics help improve the security defenses against both vectors whether used by attackers separately or together. The new web security service is designed to allow customers to broaden and improve their protection from attacks occurring via email and the web, using a single integrated service. We're excited about our ability to significantly expand our customers’ defense systems by extending the power of our Mime|OS threat detection technologies and the global grid powered by 30,000+ customers we’re protecting around the globe."

Vanson Bourne research* found 32% of organizations were not confident that their employees could spot and defend against malware or ransomware attacks via direct web downloads. Only 25% were completely confident their security defenses would stop targeted spear-phishing with malicious links.

Ascend Learning, a network of K-12 public charter schools serving 4,800 students in 12 schools across Brooklyn, were a member of the customer early adopter program. Emeka Ibekweh, managing director of technology at Ascend, commented: "It’s critical to our primary educational objectives that our staff and students are protected from malicious email attacks and web sites or inappropriate web content."

Scott Crawford, research director of Information Security, 451 Research, commented: "Organizations often struggle to enforce security for two of the most common attack vectors: email and the web. Many security professionals seek to consolidate and use integrated cloud services that make management and operation simpler and more effective. Mimecast's move to expand outside of its core email focus mirrors the growing need for a more integrated defense to combat advanced attacks."

The combined cyber resilience offering is also supported by the Mimecast Security Operations Center (MSOC) team and is enriched with all the global threat intelligence, analytics, and infrastructure that supports Mimecast’s current services.   

Mimecast's CEO, Peter Bauer, added: "We can now protect our customers with a more complete threat detection offering that will work the way organizations do—anytime and anywhere, doing business through the email and web at global scale. Our homegrown research and development into the high-growth web security market is designed to apply our recent acquisitions of Solebit for advanced malware detection and Ataata for a new approach to employee risk scoring, training and awareness. Together, these strategic investments are helping us move toward our vision of providing an integrated super-category of cyber resilience solutions from a global, cloud-based service."

The service is available for a free 30-day trial for existing Mimecast customers.

*Research was conducted in March 2018 by Vanson Bourne on behalf of Mimecast. Respondents were IT decision makers at 800 organizations around the world with more than 250 employees.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
Worst Password Blunders of 2018 Hit Organizations East and West
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
2019 Attacker Playbook
Ericka Chickowski, Contributing Writer, Dark Reading,  12/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
The Year in Security 2018
This Dark Reading Tech Digest explores the biggest news stories of 2018 that shaped the cybersecurity landscape.
Flash Poll
[Sponsored Content] The State of Encryption and How to Improve It
[Sponsored Content] The State of Encryption and How to Improve It
Encryption and access controls are considered to be the ultimate safeguards to ensure the security and confidentiality of data, which is why they're mandated in so many compliance and regulatory standards. While the cybersecurity market boasts a wide variety of encryption technologies, many data breaches reveal that sensitive and personal data has often been left unencrypted and, therefore, vulnerable.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19790
PUBLISHED: 2018-12-18
An open redirect was discovered in Symfony 2.7.x before 2.7.50, 2.8.x before 2.8.49, 3.x before 3.4.20, 4.0.x before 4.0.15, 4.1.x before 4.1.9 and 4.2.x before 4.2.1. By using backslashes in the `_failure_path` input field of login forms, an attacker can work around the redirection target restricti...
CVE-2018-19829
PUBLISHED: 2018-12-18
Artica Integria IMS 5.0.83 has CSRF in godmode/usuarios/lista_usuarios, resulting in the ability to delete an arbitrary user when the ID number is known.
CVE-2018-16884
PUBLISHED: 2018-12-18
A flaw was found in the Linux kernel in the NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel id and cause a use-after-free. Thus a malicious container user can cause a host kernel memory corruption and a system ...
CVE-2018-17777
PUBLISHED: 2018-12-18
An issue was discovered on D-Link DVA-5592 A1_WI_20180823 devices. If the PIN of the page "/ui/cbpc/login" is the default Parental Control PIN (0000), it is possible to bypass the login form by editing the path of the cookie "sid" generated by the page. The attacker will have acc...
CVE-2018-18921
PUBLISHED: 2018-12-18
PHP Server Monitor before 3.3.2 has CSRF, as demonstrated by a Delete action.