Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

2/25/2020
10:30 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Mimecast's Email Security 3.0 Strategy Advances the Way Organizations Combat Email-Based Cyberattacks

SAN FRANCISCO, Feb. 25, 2020 (GLOBE NEWSWIRE) -- RSA Conference -- Mimecast Limited (NASDAQ: MIME), a leading email and data security company, today announced it has added new capabilities to its cloud-based platform comprised of integrated service components that organizations’ need to combat the latest cybersecurity challenges. These capabilities further enable customers to embrace a new approach to defending email. Mimecast’s Email Security 3.0 strategy helps organizations address threats at three distinct zones: the email perimeter, inside the organization or network and beyond the perimeter. Mimecast has incorporated new major platform innovations helping to increase efficacy with technology integrations and product capabilities, including web browser isolation, security awareness training integrations and brand exploitation protection solutions.

“The email threat landscape has changed and requires organizations to evolve from a perimeter-based discipline to a more pervasive one. For instance, tactics, like impersonation attempts, are becoming increasingly more difficult to identify as they’re happening both in email and ‘in the wild’, but organizations still need to cover off on their basic protection needs at the same time. This requires organizations to consider a new strategy when it comes to defending email,” said Peter Bauer, chief executive officer. “As our customers’ needs evolve, Mimecast is committed to continuing to develop new innovations into our platform to help them build a stronger cybersecurity and resilience posture.”

New enhancements to Mimecast’s cloud-based platform include:

Zone 1 – At the Email Perimeter: Now Includes Browser Isolation and Custom Security Block for Added Protection

Mimecast® Browser Isolation for Email is designed to provide organizations an additional layer of protection from new phishing sites, appearing as recently as the last few hours. Mimecast Browser Isolation is engineered to mitigate the risk of emails containing links to spoofed sites by preventing a direct connection between the user’s browser on his or her device and the target web page. Users are now further protected from any potentially malicious action like the challenge of credential harvesting or malicious downloads as the browsing session is executed and contained within the Mimecast cloud rather than on the user’s device.

Browser Isolation policies can be enforced for all employees or customized to target higher risk employees as desired. The service also is built to provide a safe environment for security analysts and messaging administrators to investigate incidents, helping reduce time to respond, contain and remediate threats.

The new Custom Security Block capability is designed to enable customers to ingest security data from other sources into Mimecast’s platform to enhance efficacy further for their organization. Often security-mature organizations face the challenge where they have large amounts of security data from point solutions across their cyber ecosystems and third-party feeds. Unfortunately, much of that data is not actionable if not properly utilized to improve detection in other parts of their environment. Mimecast’s cloud-native, multi-tenant platform with API connectors to a host of third-party cybersecurity vendor solutions addresses this problem by helping organizations maximize the return on their current investments in threat intelligence sources by utilizing them in Mimecast.

Zone 2 – Inside the Perimeter: Security Awareness Training is Integrated into the Mimecast Platform to Reduce Costs and Complexity

Recent research reveals that 98 percent of organizations deploy security awareness training to their employees, yet 71 percent of organizations have been hit by an attack where malicious activity was spread from one user to another.* To help organizations more effectively manage security awareness training, Mimecast® Awareness Training is now fully integrated into Mimecast’s cloud-based platform. This integration is designed to enable customers to more easily administer awareness training into their Mimecast and broader security ecosystem.

Customers can now reduce the cost and complexity by having all their Mimecast solutions fully-integrated, making it easy for organizations to deploy, manage and maintain their security awareness training investments from a single administration console.

Zone 3 – Beyond the Email Perimeter: Brand and Domain Protection with Machine Learning Advances Phishing Protection from Known and Unknown Attacks

Cybercriminals consistently exploit human weaknesses by impersonating an organization to dupe their customers, supply chain and even their own employees. Spoofed websites and domains, where an attacker forges a website or email to make it look as though their communication has come from a trusted source, is a common tactic used in phishing campaigns and business email compromise, the use of which grew by 54% and 67% respectively.*

Mimecast® Brand Exploit Protect is engineered to deliver an innovative solution covering more than 99 percent of phishing use cases across the web. Using machine learning, it is designed to run targeted scans that identify even unknown attack patterns, blocking compromised assets before they become live attacks at the earliest preparation stages.

Additionally, Mimecast now enables customers to stop spoofing attacks faster with a self-service email channel analysis and DMARC reporting. To further strengthen brand efficacy, Mimecast DMARC Analyzer is built to extend protection from impersonation attacks by helping to detect and block attackers using domains an organization owns that are being used to spoof customers and other external parties, as well as employees.

See Peter Bauer present ‘The Cyber Resilience Imperative & The Role of Pervasive Email Security 3.0’ at RSA Conference 2020 in San Francisco on Wednesday, February 26, 2020 at 9:20 am PT at Moscone South 207.

Learn more about Mimecast’s Cyber Resilience Platform and how you can help plan for the future of email security at Mimecast’s booth 5771 in Moscone North.

*Research from 2019 State of Email Security report

About Mimecast:
Mimecast is a cybersecurity and compliance provider that helps thousands of organizations worldwide make email safer, restore trust and strengthen cyber resilience. Mimecast’s expanded cloud suite enables organizations to implement a comprehensive cyber resilience strategy. From email and web security, archive and data protection, to awareness training, uptime assurance and more, Mimecast helps organizations stand strong in the face of cyberattacks, compliance risk, human error and technical failure. www.mimecast.com

Mimecast is either a registered trademark or trademark of Mimecast Services Limited in the United States and/or other countries. All other trademarks are the property of their respective owners.

Mimecast Social Media Resources
LinkedIn: Mimecast
Facebook: Mimecast
Twitter: @Mimecast
Blog: Cyber Resilience Insights

Press Contact
Alison Raymond Walsh
[email protected]
617-393-7126

Investor Contact
Robert Sanders
[email protected]
617-393-7074

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/22/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13438
PUBLISHED: 2020-05-24
ffjpeg through 2020-02-24 has an invalid read in jfif_encode in jfif.c.
CVE-2020-13439
PUBLISHED: 2020-05-24
ffjpeg through 2020-02-24 has a heap-based buffer over-read in jfif_decode in jfif.c.
CVE-2020-13440
PUBLISHED: 2020-05-24
ffjpeg through 2020-02-24 has an invalid write in bmp_load in bmp.c.
CVE-2020-13433
PUBLISHED: 2020-05-24
Jason2605 AdminPanel 4.0 allows SQL Injection via the editPlayer.php hidden parameter.
CVE-2020-13434
PUBLISHED: 2020-05-24
SQLite through 3.32.0 has an integer overflow in sqlite3_str_vappendf in printf.c.