What is Mimecast?
Mimecast is an international company specializing in cloud-based email management for Microsoft Exchange and Microsoft Office 365. Including security, archiving, and continuity services to protect business mail.
Notably, Mimecast was founded back in 2003 by Peter Bauer and Neil Murray. It has offices located in various cities across the world. Such as,
- San Francisco,
- Cape Town,
- Munich, and Israel.
On October 16, 2015, Mimecast announced that it filed its registration statement for a proposed Initial Public Offering (IPO). Whereby, it began trading on the Nasdaq Global Select Market under the ticker symbol “MIME” on November 19, 2015.
The offering closed on November 24, 2015.
Then again, not forgetting, the company has 12 global offices with over 1,500 employees. Not to mention, Mimecast has surpassed 35,300 customers and is NASDAQ-listed.
Nasdaq: Daily Stock Market Overview, Data Updates, Reports, etc.
Why is Mimecast Cyber Resilience for Email?
In the first place, Mimecast empowers you with a holistic approach to cybersecurity designed to secure, preserve and continue the flow of information via email.
For one thing, they prepare you for every stage of an attack:
- The right security services in place before an attack happens – focused both on prevention and adapting after an attack happens.
- A durability plan to keep email – and your business operations – running during an attack or failure.
- The ability to recover data and other corporate IP after an incident or attack occurs.
Are you ready to move ahead of adversaries?
Their broad-based, multidimensional cyber resilience strategy covers everything you need to stay ahead of today’s evolving threat landscape. All in all, from a single cloud platform.
Having said that, keep email flowing; business operations running; employees productive, and data accessible and recoverable.
Mimecast is Making Email Safer for Business
It is our belief that securely operating a business in the cloud requires new levels of IT preparedness, centered around cyber resilience.
This is why Mimecast unifies the delivery and management of security, continuity and data protection for email via one, simple-to-use cloud platform.
In reality, thousands of organizations trust it towards increasing their cyber resilience preparedness, streamline compliance, reduce IT complexity and keep their business running.
Equally important, they give employees fast and secure access to sensitive business information and ensure email keeps flowing in the event of an outage.
Mimecast will remain committed to protecting your IT assets through constant innovation and focus on your success.
Facts you need to know about Mimecast
Your organization runs on email right?
And therefore, it’s the main way you communicate internally and externally and you rely on it being available all day, every day.
It’s a gateway to other critical IT systems and home to a treasure trove of corporate information your employee’s value.
For all it offers, email needs to be protected and managed or it risks exposing your organization and your data to attack.
Your customers and your supply chain are far too valuable to take that chance. It also needs to be effectively archived to meet growing compliance, e-discovery, and legal obligations.
And that’s where Mimecast comes in!
Below are more additional facts about Mimecast:
Notably, Mimecast co-founder and CEO, Peter Bauer, previously founded FAB Technology in the mid-nineties and sold it to Idion. Earlier, Peter trained as a Microsoft systems engineer and worked with corporate messaging systems.
Other executives include Mimecast Chief Scientist Nathaniel Borenstein, who was amongst the original designers of the MIME protocol for formatting multimedia Internet electronic mail – he sent the world’s first e-mail attachment on 11 March 1992.
- In January 2010, the company raised $21 million in Series B financing from Index Ventures and Dawn Capital.
- Additionally, in September 2012 Mimecast raised $62m in a Series C funding round, led by New York-based Insight Venture Partners.
- As of February 2018, Mimecast has 29,200 customers globally. Up from 14,500 customers in 2015.
- On July 10, 2018, Mimecast acquired cybersecurity training startup Ataata. Not to mention, on July 31, 2018, Mimecast acquired Solebit for $88 million.
By the same token, in 2018, the company was a Top-Rated Cloud Software Employer on Glassdoor.
Equally, in May 2019, Mimecast announced it had exceeded 34,000 customers globally and 296 billion e-mails under management.
What does Mimecast provide?
In reality, the service uses a massively-parallel grid infrastructure for email storage and processing through geographically dispersed data centers.
Of course, enabling it to offer a 100% uptime service level agreement on all services.
Another important key, its Mail Transfer Agent provides intelligent email routing based on server or user mailbox location.
1. Email Security
- Secure Email Gateway: user optimized spam protection, malware, DoS and DHA protection. Real-time diagnostics and reporting; data loss prevention, secure message delivery, email branding, and disclaimer management, document conversion and metadata management, real-time online queue management, large attachment management, advanced routing and spooling.
- Targeted-threat Protection: URL rewriting at the gateway with time-of-click scanning for malicious content before being opened.
- Large File Send: send and receive large files from Outlook, with encryption, optional access key and custom expiration dates.
- Secure Messaging: secure email channel for sensitive information either user-initiated or policy-driven.
2. Enterprise Information Archiving
- Cloud Archive for Email: Encrypted cloud storage which saves emails in triplicate in an immutable storage system. Users can access and search emails through an Outlook desktop client. Archive access is available via a Mac desktop app and apps for Android, BlackBerry, iOS and Windows Mobile devices.
3. Mailbox Continuity
- Continuity: During primary mail system outages, email can be accessed via Microsoft Outlook, through a web browser, and via mobile devices.
Mimecast Emails Threat Protection
To maximize the protection against email-borne threats, Mimecast combines internally-developed and third‐party detective analytics. With multiple internal and external threat intelligence sources.
This provides customers with a multi‐layered inspection system that is effective against both widely used, commodity attacks as well as highly targeted attacks.
By serving tens-of-thousands of customers globally, Mimecast leverages this massive attack visibility to accelerate the detection of the latest attacks. The Mimecast Email Security service, which includes:
- Targeted Threat Protection,
- URL Protect,
- Attachment Protect and Impersonation Protect (a set of security services that help organizations defend against advanced email-borne threats).
This service defends against impersonation attempts, malicious URLs and malware attachments, as well as spam and more commoditized viruses.
Traditional email security controls or relying on your cloud email provider won’t protect you from today’s more targeted and sophisticated threats.
You must continuously work to improve security protections to defend against threats such as spear‐phishing, ransomware, impersonation attacks, and malware.
How else do your emails get protected?
Before an inbound email ever makes it to your organization’s email system, whether it is on‐premises or in the cloud, Mimecast provides a deep inspection system to detect the ways phishers and spammers try to access and fool your email security system and your users.
Ways in which you also get protected include:
What is Phishing?
Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution.
Especially, to lure individuals into providing sensitive data. Such as personally identifiable information, banking, and credit card details, and passwords.
Other than email and website phishing, there’s also ‘vishing’ (Voice Phishing), ‘smishing’ (SMS Phishing). And also, several other phishing techniques Cybercriminals are constantly coming up with.
Therefore, you need a security awareness training program that can be deployed in minutes. Protecting your network and actually saving you a lot of time.
What is Spam Filtering?
Spam filters detect unsolicited, unwanted, and virus-infested email (called spam) and stop it from getting into email inboxes.
As an example, Internet Service Providers (ISPs) use spam filters to make sure they aren’t distributing spam. Small- to medium-sized businesses (SMBs) also use spam filters to protect their employees and networks.
In fact, ISPs use both methods to protect their customers. Whereby, SMBs typically focus on inbound filters.
Always remember, there are many spam filtering solutions available. They can be hosted in the “cloud,” on computer servers, or integrated into email software such as Microsoft Outlook.
Generally speaking, traditional security approaches are no longer effective. Attack methods are quickly evolving and growing more sophisticated, targeted and dangerous.
Right now, the industry is faced with email-borne threats like phishing attacks delivering malicious attachments and URLs to you.
In addition, impersonation fraud fueled by social engineering aimed at tricking employees. Particularly, to wire-transfer money or send the company personally identifiable information.
Not forgetting, ransomware attacks that can encrypt your data and take entire systems offline.
Ignoring these advanced threats, and sticking with legacy security capabilities or deploying a defense-only security strategy, puts your data, business operations, employee productivity, and reputation at risk.
Having said that, its time for a new approach, therefore, Get Started with Mimecast cloud security Today!
I hope you have gathered enough information in regards to the above profile review.
But, if you have additional information, contributions or even suggestions, please Contact Us.
You can also share some or more of your thoughts in the comments box below this post.
Finally, below are more additional and related to the topic links.