Welcome!

News Feed Item

New Mimecast Service Disarms Spear Phishing Threat

Mimecast, a leading cloud email security provider, has announced Targeted Threat Protection, a new service to protect enterprises from the growing risk they face from spear phishing. These are targeted attacks using embedded malicious URLs or links in email that appear to come from a ‘trusted’ or known individual that then compromise an organization’s security when clicked. Mimecast Targeted Threat Protection scans all URLs in inbound email every time they are clicked by the end-user to ensure the linked site is clean and risk free. If the user attempts to visit an ‘at risk’ site, they are warned or automatically barred from viewing it. This protection will be provided on all devices used for their enterprise email account including smartphones and tablets whether they are provided directly by the employer or not. Mimecast Targeted Threat Protection will be available in July.

This new service is easy to manage for IT and security teams, as it’s controlled from a single Administration Console alongside other Mimecast services. They also get full logging and visibility of blocked links and sites to assist them with ongoing threat management, reporting and any end-user education designed to reduce future risky online behavior.

Orlando Scott-Cowley, Director of Technology Marketing, Mimecast commented: “Spear phishing is a new frontline in the battle to protect enterprise systems and data. Mimecast Targeted Threat Protection stops spear phishing in its tracks. The threats to an end-users’ inbox are constantly changing and have moved far beyond the daily barrage of spam and virus content on their work desktop. We have to protect their work and personal desktop, laptop, tablet and smartphone as today each device is used for enterprise email. IT teams know their end-users are one of their weakest security links and can be specifically targeted to get access to critical systems and valuable corporate data.”

He continued: “IT teams work hard to block the majority of external attacks at the email gateway, but an innocent click on a link to an infected webpage can undermine all this work. Even those with traditional web scanning in place may not be safe if the link is accessed from a mobile or personal device. Our service protects end-users on all devices and every time they click a link in email, because you never know if today’s safe site is still safe tomorrow.”

Security scanning or gateway services like Mimecast have made it hard for traditional spam or phishing attacks to target enterprises. As a result, determined attackers are increasingly using sophisticated and targeted spear phishing emails. These emails are often created following social engineering reconnaissance that helps to make them look legitimate. Once a link in the email is clicked, it can take users to malicious webpages that trick them into giving away sensitive credentials or even exposes their systems to malware.

Spear phishing attacks are designed to defeat even the most sophisticated security defenses. These attacks can pass through existing security gateways as the emails and embedded URLs are initially inactive and therefore clean when scanned. Phishing web content is activated later when the attacker knows all gateways have passed the email and link. Several major data breaches and hacking attacks have been initiated through the use of spear phishing or targeted email attacks of this kind.

How Mimecast Targeted Threat Protection works

  • Mimecast rewrites URLs for all inbound emails – when the end-user receives an external email containing a URL, Mimecast rewrites the link at the gateway so when it is clicked, they are directed to the Mimecast cloud where the original link is checked for risks before being opened. If the link is safe, they won’t even notice the check has happened as the site will appear to open as normal.
  • Links are scanned every time they are clicked to ensure they are safe – a check is done every time a link is clicked on, not just the first time. This is done for all links in every email whether the sender is ‘known’ or not. Wholesale protection of this kind is more safe and effective than attempting to detect a single phishing email and recognizes that links can start safe but be compromised at a later date.
  • Links are safe on any device used to access them – Targeted Threat Protection provides the same protection whether the end-user is accessing a link in their enterprise email from their work or personal mobile or desktop device.

Benefits of Mimecast Targeted Threat Protection

For end-users:

  • Peace of mind knowing all links clicked on in email are protected – every email is scanned and every link is protected. If they do click on something malicious they know their data and systems are protected.
  • No interruption to how they work - they will hardly notice the scanning if the link is safe. The site will open as normal in the browser.
  • Automatic blocking, and clear warnings and guidance if a malicious link is clicked– Mimecast will block any bad site and let them know, giving them options on what to do next based on their security profile set by the IT team.

For IT Teams:

  • Simple and comprehensive protection against spear phishing for all end-users without the need for additional infrastructure or staffing on-premise – this is a simple-to-activate service integrated into Mimecast’s extensive cloud email security portfolio. No additional equipment or resources are needed on-premise to manage this service.
  • Central administration and visibility for all email security issues from a single Mimecast Administration Console covering all services including Targeted Threat Protection – administrators can also set different policies by end-user based on their security profile, e.g. block outright any at risk site or offer a warning page to alert more informed users.

About Mimecast

Mimecast (www.mimecast.com) delivers cloud-based email management for Microsoft Exchange and Microsoft Office 365, including archiving, continuity and security. By unifying disparate and fragmented email environments into one holistic solution that is always available from the cloud, Mimecast minimizes risk and reduces cost and complexity, while providing total end-to-end control of email. Founded in the United Kingdom in 2003, Mimecast serves more than 8,000 customers and 2 million users worldwide and has offices in Europe, North America, Africa and Australia.

Mimecast social media resources

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
Continuous testing helps bridge the gap between developing quickly and maintaining high quality products. But to implement continuous testing, CTOs must take a strategic approach to building a testing infrastructure and toolset that empowers their team to move fast. Download our guide to laying the groundwork for a scalable continuous testing strategy.
Let’s face it, embracing new storage technologies, capabilities and upgrading to new hardware often adds complexity and increases costs. In his session at 18th Cloud Expo, Seth Oxenhorn, Vice President of Business Development & Alliances at FalconStor, discussed how a truly heterogeneous software-defined storage approach can add value to legacy platforms and heterogeneous environments. The result reduces complexity, significantly lowers cost, and provides IT organizations with improved efficienc...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
StackIQ has announced the release of Stacki 3.2. Stacki is an easy-to-use Linux server provisioning tool. Stacki 3.2 delivers new capabilities that simplify the automation and integration of site-specific requirements. StackIQ is the commercial entity behind this open source bare metal provisioning tool. Since the release of Stacki in June of 2015, the Stacki core team has been focused on making the Community Edition meet the needs of members of the community, adding features and value, while ...
The cloud competition for database hosts is fierce. How do you evaluate a cloud provider for your database platform? In his session at 18th Cloud Expo, Chris Presley, a Solutions Architect at Pythian, gave users a checklist of considerations when choosing a provider. Chris Presley is a Solutions Architect at Pythian. He loves order – making him a premier Microsoft SQL Server expert. Not only has he programmed and administered SQL Server, but he has also shared his expertise and passion with b...
With 15% of enterprises adopting a hybrid IT strategy, you need to set a plan to integrate hybrid cloud throughout your infrastructure. In his session at 18th Cloud Expo, Steven Dreher, Director of Solutions Architecture at Green House Data, discussed how to plan for shifting resource requirements, overcome challenges, and implement hybrid IT alongside your existing data center assets. Highlights included anticipating workload, cost and resource calculations, integrating services on both sides...
Big Data engines are powering a lot of service businesses right now. Data is collected from users from wearable technologies, web behaviors, purchase behavior as well as several arbitrary data points we’d never think of. The demand for faster and bigger engines to crunch and serve up the data to services is growing exponentially. You see a LOT of correlation between “Cloud” and “Big Data” but on Big Data and “Hybrid,” where hybrid hosting is the sanest approach to the Big Data Infrastructure pro...
"We are a well-established player in the application life cycle management market and we also have a very strong version control product," stated Flint Brenton, CEO of CollabNet,, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
We all know the latest numbers: Gartner, Inc. forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from last year, and will reach 20.8 billion by 2020. We're rapidly approaching a data production of 40 zettabytes a day – more than we can every physically store, and exabytes and yottabytes are just around the corner. For many that’s a good sign, as data has been proven to equal money – IF it’s ingested, integrated, and analyzed fast enough. Without real-ti...
In his session at 18th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., and Logan Best, Infrastructure & Network Engineer at Webair, focused on real world deployments of DDoS mitigation strategies in every layer of the network. He gave an overview of methods to prevent these attacks and best practices on how to provide protection in complex cloud platforms. He also outlined what we have found in our experience managing and running thousands of Linux and Unix ...
In his session at @DevOpsSummit at 19th Cloud Expo, Yoseph Reuveni, Director of Software Engineering at Jet.com, will discuss Jet.com's journey into containerizing Microsoft-based technologies like C# and F# into Docker. He will talk about lessons learned and challenges faced, the Mono framework tryout and how they deployed everything into Azure cloud. Yoseph Reuveni is a technology leader with unique experience developing and running high throughput (over 1M tps) distributed systems with extre...
"Operations is sort of the maturation of cloud utilization and the move to the cloud," explained Steve Anderson, Product Manager for BMC’s Cloud Lifecycle Management, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
I wanted to gather all of my Internet of Things (IOT) blogs into a single blog (that I could later use with my University of San Francisco (USF) Big Data “MBA” course). However as I started to pull these blogs together, I realized that my IOT discussion lacked a vision; it lacked an end point towards which an organization could drive their IOT envisioning, proof of value, app dev, data engineering and data science efforts. And I think that the IOT end point is really quite simple…