Mimecast Acquires Segasec to Boost Phishing DefenseMimecast Acquires Segasec to Boost Phishing Defense
Segasec's technology will be integrated into Mimecast's email and Web security services to identify malicious domains.
January 6, 2020
Mimecast has confirmed plans to acquire threat protection startup Segasec, starting a new year of cybersecurity M&A after an especially active 2019. Terms of the deal were not disclosed.
Tel Aviv-based Segasec, founded in 2017 by Elad Schulman and Gad Akuka, aims to protect businesses from phishing, business email compromise, ransomware, and other threats. Its platform monitors domain registrations, new certificates, mail server provisioning, social networks, and other Web resources where consumers and brands interact. The goal is to help companies better defend against attacks using fake websites and domains for credential theft.
Mimecast plans to integrate Segasec's technology into email and Web security services as part of a broader effort to build an approach dubbed Email Security 3.0. The idea behind this is to improve security defense against three types of threats: those trying to breach the perimeter (Zone 1), those that exist inside the perimeter (Zone 2), and attacks taking place outside the perimeter (Zone 3). The Segasec acquisition is specifically intended to address Zone 3 by improving the ability to identify attacks that imitate brands using domains they don't own.
Read more details here.
Check out The Edge, Dark Reading's new section for features, threat data, and in-depth perspectives. Today's top story: "What Tools Will Find Misconfigurations in My AWS S3 Cloud Buckets?"
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Burnout Breach: How employee burnout is emerging as the next frontier in cybersecurity
Selling Breaches: The Transfer of Enterprise Network Access on Criminal Forums
5 Reasons To Move your PKI Deployment to the Cloud