Click here to close now.


News Feed Item

New Mimecast Service Disarms Spear Phishing Threat

Mimecast, a leading cloud email security provider, has announced Targeted Threat Protection, a new service to protect enterprises from the growing risk they face from spear phishing. These are targeted attacks using embedded malicious URLs or links in email that appear to come from a ‘trusted’ or known individual that then compromise an organization’s security when clicked. Mimecast Targeted Threat Protection scans all URLs in inbound email every time they are clicked by the end-user to ensure the linked site is clean and risk free. If the user attempts to visit an ‘at risk’ site, they are warned or automatically barred from viewing it. This protection will be provided on all devices used for their enterprise email account including smartphones and tablets whether they are provided directly by the employer or not. Mimecast Targeted Threat Protection will be available in July.

This new service is easy to manage for IT and security teams, as it’s controlled from a single Administration Console alongside other Mimecast services. They also get full logging and visibility of blocked links and sites to assist them with ongoing threat management, reporting and any end-user education designed to reduce future risky online behavior.

Orlando Scott-Cowley, Director of Technology Marketing, Mimecast commented: “Spear phishing is a new frontline in the battle to protect enterprise systems and data. Mimecast Targeted Threat Protection stops spear phishing in its tracks. The threats to an end-users’ inbox are constantly changing and have moved far beyond the daily barrage of spam and virus content on their work desktop. We have to protect their work and personal desktop, laptop, tablet and smartphone as today each device is used for enterprise email. IT teams know their end-users are one of their weakest security links and can be specifically targeted to get access to critical systems and valuable corporate data.”

He continued: “IT teams work hard to block the majority of external attacks at the email gateway, but an innocent click on a link to an infected webpage can undermine all this work. Even those with traditional web scanning in place may not be safe if the link is accessed from a mobile or personal device. Our service protects end-users on all devices and every time they click a link in email, because you never know if today’s safe site is still safe tomorrow.”

Security scanning or gateway services like Mimecast have made it hard for traditional spam or phishing attacks to target enterprises. As a result, determined attackers are increasingly using sophisticated and targeted spear phishing emails. These emails are often created following social engineering reconnaissance that helps to make them look legitimate. Once a link in the email is clicked, it can take users to malicious webpages that trick them into giving away sensitive credentials or even exposes their systems to malware.

Spear phishing attacks are designed to defeat even the most sophisticated security defenses. These attacks can pass through existing security gateways as the emails and embedded URLs are initially inactive and therefore clean when scanned. Phishing web content is activated later when the attacker knows all gateways have passed the email and link. Several major data breaches and hacking attacks have been initiated through the use of spear phishing or targeted email attacks of this kind.

How Mimecast Targeted Threat Protection works

  • Mimecast rewrites URLs for all inbound emails – when the end-user receives an external email containing a URL, Mimecast rewrites the link at the gateway so when it is clicked, they are directed to the Mimecast cloud where the original link is checked for risks before being opened. If the link is safe, they won’t even notice the check has happened as the site will appear to open as normal.
  • Links are scanned every time they are clicked to ensure they are safe – a check is done every time a link is clicked on, not just the first time. This is done for all links in every email whether the sender is ‘known’ or not. Wholesale protection of this kind is more safe and effective than attempting to detect a single phishing email and recognizes that links can start safe but be compromised at a later date.
  • Links are safe on any device used to access them – Targeted Threat Protection provides the same protection whether the end-user is accessing a link in their enterprise email from their work or personal mobile or desktop device.

Benefits of Mimecast Targeted Threat Protection

For end-users:

  • Peace of mind knowing all links clicked on in email are protected – every email is scanned and every link is protected. If they do click on something malicious they know their data and systems are protected.
  • No interruption to how they work - they will hardly notice the scanning if the link is safe. The site will open as normal in the browser.
  • Automatic blocking, and clear warnings and guidance if a malicious link is clicked– Mimecast will block any bad site and let them know, giving them options on what to do next based on their security profile set by the IT team.

For IT Teams:

  • Simple and comprehensive protection against spear phishing for all end-users without the need for additional infrastructure or staffing on-premise – this is a simple-to-activate service integrated into Mimecast’s extensive cloud email security portfolio. No additional equipment or resources are needed on-premise to manage this service.
  • Central administration and visibility for all email security issues from a single Mimecast Administration Console covering all services including Targeted Threat Protection – administrators can also set different policies by end-user based on their security profile, e.g. block outright any at risk site or offer a warning page to alert more informed users.

About Mimecast

Mimecast ( delivers cloud-based email management for Microsoft Exchange and Microsoft Office 365, including archiving, continuity and security. By unifying disparate and fragmented email environments into one holistic solution that is always available from the cloud, Mimecast minimizes risk and reduces cost and complexity, while providing total end-to-end control of email. Founded in the United Kingdom in 2003, Mimecast serves more than 8,000 customers and 2 million users worldwide and has offices in Europe, North America, Africa and Australia.

Mimecast social media resources

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
SYS-CON Events announced today that Machkey International Company will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Machkey provides advanced connectivity solutions for just about everyone. Businesses or individuals, Machkey is dedicated to provide high-quality and cost-effective products to meet all your needs.
The modern software development landscape consists of best practices and tools that allow teams to deliver software in a near-continuous manner. By adopting a culture of automation, measurement and sharing, the time to ship code has been greatly reduced, allowing for shorter release cycles and quicker feedback from customers and users. Still, with all of these tools and methods, how can teams stay on top of what is taking place across their infrastructure and codebase? Hopping between services a...
As the world moves towards more DevOps and microservices, application deployment to the cloud ought to become a lot simpler. The microservices architecture, which is the basis of many new age distributed systems such as OpenStack, NetFlix and so on, is at the heart of Cloud Foundry - a complete developer-oriented Platform as a Service (PaaS) that is IaaS agnostic and supports vCloud, OpenStack and AWS. In his session at 17th Cloud Expo, Raghavan "Rags" Srinivas, an Architect/Developer Evangeli...
As-a-service models offer huge opportunities, but also complicate security. It may seem that the easiest way to migrate to a new architectural model is to let others, experts in their field, do the work. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While this has unlocked huge opportunities to accelerate the deployment of new capabilities or increase economic efficiencies within an organization, i...
As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership ability. Many are unable to effectively engage and inspire, creating forward momentum in the direction of desired change. Renowned for its approach to leadership and emphasis on their people, organizations increasingly look to our military for insight into these challenges.
SYS-CON Events announced today that DataClear Inc. will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The DataClear ‘BlackBox’ is the only solution that moves your PC, browsing and data out of the United States and away from prying (and spying) eyes. Its solution automatically builds you a clean, on-demand, virus free, new virtual cloud based PC outside of the United States, and wipes it clean...
Containers are all the rage among developers and web companies, but they also represent two very substantial benefits to larger organizations. First, they have the potential to dramatically accelerate the application lifecycle from software builds and testing to deployment and upgrades. Second they represent the first truly hybrid-approach to consuming infrastructure, allowing organizations to run the same workloads on any cloud, virtual machine or physical server. Together, they represent a ver...
As operational failure becomes more acceptable to discuss within the software industry, the necessity for holding constructive, actionable postmortems increases. But most of what we know about postmortems from "pop culture" isn't actually relevant for the software systems we work on and within. In his session at DevOps Summit, J. Paul Reed will look at postmortem pitfalls, techniques, and tools you'll be able to take back to your own environment so they will be able to lay the foundations for h...
SYS-CON Events announced today the Containers & Microservices Bootcamp, being held November 3-4, 2015, in conjunction with 17th Cloud Expo, @ThingsExpo, and @DevOpsSummit at the Santa Clara Convention Center in Santa Clara, CA. This is your chance to get started with the latest technology in the industry. Combined with real-world scenarios and use cases, the Containers and Microservices Bootcamp, led by Janakiram MSV, a Microsoft Regional Director, will include presentations as well as hands-on...
As more intelligent IoT applications shift into gear, they’re merging into the ever-increasing traffic flow of the Internet. It won’t be long before we experience bottlenecks, as IoT traffic peaks during rush hours. Organizations that are unprepared will find themselves by the side of the road unable to cross back into the fast lane. As billions of new devices begin to communicate and exchange data – will your infrastructure be scalable enough to handle this new interconnected world?
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in high-performance, high-efficiency server, storage technology and green computing, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology is a premier provider of advanced server Building Block Solutions® for Data ...
In today's digital world, change is the one constant. Disruptive innovations like cloud, mobility, social media, and the Internet of Things have reshaped the market and set new standards in customer expectations. To remain competitive, businesses must tap the potential of emerging technologies and markets through the rapid release of new products and services. However, the rigid and siloed structures of traditional IT platforms and processes are slowing them down – resulting in lengthy delivery ...
Nowadays, a large number of sensors and devices are connected to the network. Leading-edge IoT technologies integrate various types of sensor data to create a new value for several business decision scenarios. The transparent cloud is a model of a new IoT emergence service platform. Many service providers store and access various types of sensor data in order to create and find out new business values by integrating such data.
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.