News UC & Collaboration

Mimecast’s Email Security Advances the Way Organizations Combat Email Based Cyber Attacks

New Technology Capabilities and Integrations Further Strengthen Mimecast’s Cloud-based Platform

Mimecast has added new capabilities to its cloud-based platform comprised of integrated service components that organizations need to combat the latest cybersecurity challenges. These capabilities further enable customers to embrace a new approach to defending email. Mimecast’s Email Security 3.0 strategy helps organizations address threats at three distinct zones: the email perimeter, inside the organization or network and beyond the perimeter. Mimecast has incorporated new major platform innovations helping to increase efficacy with technology integrations and product capabilities, including web browser isolation, security awareness training integrations and brand exploitation protection solutions.

“The email threat landscape has changed and requires organizations to evolve from a perimeter-based discipline to a more pervasive one. For instance, tactics, like impersonation attempts, are becoming increasingly more difficult to identify as they’re happening both in email and ‘in the wild’, but organizations still need to cover off on their basic protection needs at the same time. This requires organizations to consider a new strategy when it comes to defending email,” said Peter Bauer, chief executive officer at Mimecast. “As our customers’ needs evolve, Mimecast is committed to continuing to developnew innovations into our platform to help them build a stronger cybersecurity and resilience posture.”

New enhancements to Mimecast’s cloud-based platform include:

Zone 1 – At the Email Perimeter: Now Includes Browser Isolation and Custom Security Block for Added Protection

Zone 2 – Inside the Perimeter: Security Awareness Training is Integrated into the Mimecast Platform to Reduce Costs and Complexity

Zone 3 – Beyond the Email Perimeter: Brand and Domain Protection with Machine Learning Advances Phishing Protection from Known and Unknown Attacks

Related posts

DataStax and LlamaIndex Simplify RAG Application Development for GenAI Developers

enterpriseitworld

Palo Alto Networks Empowers Customers with Cortex Platform for Endpoint Security

enterpriseitworld

Tata Tele Business Services to offer Unified Solution on Toll-Free for WhatsApp Business

enterpriseitworld