Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


10:30 AM
Dark Reading
Dark Reading
Products and Releases

Mimecast's Email Security 3.0 Strategy Advances the Way Organizations Combat Email-Based Cyberattacks

SAN FRANCISCO, Feb. 25, 2020 (GLOBE NEWSWIRE) -- RSA Conference -- Mimecast Limited (NASDAQ: MIME), a leading email and data security company, today announced it has added new capabilities to its cloud-based platform comprised of integrated service components that organizations’ need to combat the latest cybersecurity challenges. These capabilities further enable customers to embrace a new approach to defending email. Mimecast’s Email Security 3.0 strategy helps organizations address threats at three distinct zones: the email perimeter, inside the organization or network and beyond the perimeter. Mimecast has incorporated new major platform innovations helping to increase efficacy with technology integrations and product capabilities, including web browser isolation, security awareness training integrations and brand exploitation protection solutions.

“The email threat landscape has changed and requires organizations to evolve from a perimeter-based discipline to a more pervasive one. For instance, tactics, like impersonation attempts, are becoming increasingly more difficult to identify as they’re happening both in email and ‘in the wild’, but organizations still need to cover off on their basic protection needs at the same time. This requires organizations to consider a new strategy when it comes to defending email,” said Peter Bauer, chief executive officer. “As our customers’ needs evolve, Mimecast is committed to continuing to develop new innovations into our platform to help them build a stronger cybersecurity and resilience posture.”

New enhancements to Mimecast’s cloud-based platform include:

Zone 1 – At the Email Perimeter: Now Includes Browser Isolation and Custom Security Block for Added Protection

Mimecast® Browser Isolation for Email is designed to provide organizations an additional layer of protection from new phishing sites, appearing as recently as the last few hours. Mimecast Browser Isolation is engineered to mitigate the risk of emails containing links to spoofed sites by preventing a direct connection between the user’s browser on his or her device and the target web page. Users are now further protected from any potentially malicious action like the challenge of credential harvesting or malicious downloads as the browsing session is executed and contained within the Mimecast cloud rather than on the user’s device.

Browser Isolation policies can be enforced for all employees or customized to target higher risk employees as desired. The service also is built to provide a safe environment for security analysts and messaging administrators to investigate incidents, helping reduce time to respond, contain and remediate threats.

The new Custom Security Block capability is designed to enable customers to ingest security data from other sources into Mimecast’s platform to enhance efficacy further for their organization. Often security-mature organizations face the challenge where they have large amounts of security data from point solutions across their cyber ecosystems and third-party feeds. Unfortunately, much of that data is not actionable if not properly utilized to improve detection in other parts of their environment. Mimecast’s cloud-native, multi-tenant platform with API connectors to a host of third-party cybersecurity vendor solutions addresses this problem by helping organizations maximize the return on their current investments in threat intelligence sources by utilizing them in Mimecast.

Zone 2 – Inside the Perimeter: Security Awareness Training is Integrated into the Mimecast Platform to Reduce Costs and Complexity

Recent research reveals that 98 percent of organizations deploy security awareness training to their employees, yet 71 percent of organizations have been hit by an attack where malicious activity was spread from one user to another.* To help organizations more effectively manage security awareness training, Mimecast® Awareness Training is now fully integrated into Mimecast’s cloud-based platform. This integration is designed to enable customers to more easily administer awareness training into their Mimecast and broader security ecosystem.

Customers can now reduce the cost and complexity by having all their Mimecast solutions fully-integrated, making it easy for organizations to deploy, manage and maintain their security awareness training investments from a single administration console.

Zone 3 – Beyond the Email Perimeter: Brand and Domain Protection with Machine Learning Advances Phishing Protection from Known and Unknown Attacks

Cybercriminals consistently exploit human weaknesses by impersonating an organization to dupe their customers, supply chain and even their own employees. Spoofed websites and domains, where an attacker forges a website or email to make it look as though their communication has come from a trusted source, is a common tactic used in phishing campaigns and business email compromise, the use of which grew by 54% and 67% respectively.*

Mimecast® Brand Exploit Protect is engineered to deliver an innovative solution covering more than 99 percent of phishing use cases across the web. Using machine learning, it is designed to run targeted scans that identify even unknown attack patterns, blocking compromised assets before they become live attacks at the earliest preparation stages.

Additionally, Mimecast now enables customers to stop spoofing attacks faster with a self-service email channel analysis and DMARC reporting. To further strengthen brand efficacy, Mimecast DMARC Analyzer is built to extend protection from impersonation attacks by helping to detect and block attackers using domains an organization owns that are being used to spoof customers and other external parties, as well as employees.

See Peter Bauer present ‘The Cyber Resilience Imperative & The Role of Pervasive Email Security 3.0’ at RSA Conference 2020 in San Francisco on Wednesday, February 26, 2020 at 9:20 am PT at Moscone South 207.

Learn more about Mimecast’s Cyber Resilience Platform and how you can help plan for the future of email security at Mimecast’s booth 5771 in Moscone North.

*Research from 2019 State of Email Security report

About Mimecast:
Mimecast is a cybersecurity and compliance provider that helps thousands of organizations worldwide make email safer, restore trust and strengthen cyber resilience. Mimecast’s expanded cloud suite enables organizations to implement a comprehensive cyber resilience strategy. From email and web security, archive and data protection, to awareness training, uptime assurance and more, Mimecast helps organizations stand strong in the face of cyberattacks, compliance risk, human error and technical failure. www.mimecast.com

Mimecast is either a registered trademark or trademark of Mimecast Services Limited in the United States and/or other countries. All other trademarks are the property of their respective owners.

Mimecast Social Media Resources
LinkedIn: Mimecast
Facebook: Mimecast
Twitter: @Mimecast
Blog: Cyber Resilience Insights

Press Contact
Alison Raymond Walsh
[email protected]

Investor Contact
Robert Sanders
[email protected]


Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How SolarWinds Busted Up Our Assumptions About Code Signing
Dr. Jethro Beekman, Technical Director,  3/3/2021
'ObliqueRAT' Now Hides Behind Images on Compromised Websites
Jai Vijayan, Contributing Writer,  3/2/2021
Attackers Turn Struggling Software Projects Into Trojan Horses
Robert Lemos, Contributing Writer,  2/26/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: George has not accepted that the technology age has come to an end.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-03-07
This affects all versions of package github.com/nats-io/nats-server/server. Untrusted accounts are able to crash the server using configs that represent a service export/import cycles. Disclaimer from the maintainers: Running a NATS service which is exposed to untrusted users presents a heightened r...
PUBLISHED: 2021-03-07
An issue was discovered in the Linux kernel through 5.11.3. drivers/scsi/scsi_transport_iscsi.c is adversely affected by the ability of an unprivileged user to craft Netlink messages.
PUBLISHED: 2021-03-07
An issue was discovered in the Linux kernel through 5.11.3. Certain iSCSI data structures do not have appropriate length constraints or checks, and can exceed the PAGE_SIZE value. An unprivileged user can send a Netlink message that is associated with iSCSI, and has a length up to the maximum length...
PUBLISHED: 2021-03-07
An issue was discovered in the Linux kernel through 5.11.3. A kernel pointer leak can be used to determine the address of the iscsi_transport structure. When an iSCSI transport is registered with the iSCSI subsystem, the transport's handle is available to unprivileged users via the sysfs file system...
PUBLISHED: 2021-03-07
An issue was discovered in AfterLogic Aurora through 7.7.9 and WebMail Pro through 7.7.9. They allow directory traversal to read files (such as a data/settings/settings.xml file containing admin panel credentials), as demonstrated by dav/server.php/files/personal/%2e%2e when using the caldav_public_...