detect security threats. Additionally,
using Mimecast’s global threat
intelligence network, Internal Email
Protect can help customers more quickly
remediate security threats that originate
from any email account inside or outside
the organisation.
Internal Email Protect will constantly
monitor and re-check the status of all
file attachment ‘fingerprints’ globally. If
the security posture of a delivered file
changes, the service is designed to
quickly alert and update administrators,
automatically or manually remediate
attachment-based malware and will log
incident actions.
Ed Jennings, Chief
Operating Officer,
Mimecast
senders from so-called trusted third
parties that the target company does
business with regularly.
New Mimecast and Vanson Bourne
research found that 40% of the 800
IT-decision makers who responded said
they saw an increase in these types of
attacks over the past 12 months.
Mimecast’s Impersonation Protect
will offer supply chain impersonation
protection to guard companies against
similar or lookalike third party email
domains, helping to stop these attacks
before they could cause any issue.
This tactic helps to mask the true
destination of a link. Mimecast has
incorporated new capabilities within
www.intelligentciso.com
|
Issue 03
Impersonation Protect and URL Protect
that are designed to use new algorithms
to protect internal users from similar or
lookalike domains.
New real-time data feeds have also
been added to Impersonation Protect,
engineered to better identify newly
observed and registered domains to
further enhance Mimecast’s ability to
“In fact, for those that had suffered
an email-based attack in the last year,
the average recovery time was three
days. That’s a long time and, for many
organisations, catastrophic.
“It is critical organisations have
comprehensive security controls in place
before, continuity during and automated
recovery after an attack to help them
build cyber-resilience for email.”
Available in June 2018, these new
features will be delivered through
Mime|OS, a 100% single cloud platform
that underpins the Mimecast services
and via a single administration console
with a simple to use user interface.
Built using micro-services, Mime|OS
allows customers to take advantage
of the cost and performance benefits
of industry-standard hardware and
resource-sharing, specifically for the
secure management of email and data. u
57
Lookalike domains are also increasingly
becoming a problem, as recently
publicised. Attackers are now using non-
western character sets to display letters
that look identical to the naked eye, such
as the Cyrillic ‘ а ’ in comparison to the
Western ‘a’.
Attackers have
started to
impersonate senders
from so-called trusted
third parties that
the target company
does business with
regularly.
“Cybercriminals are constantly looking for
new ways to be stealthy and trick users,
which was the key driver for us to enhance
Targeted Threat Protection with these new
capabilities. Research found that 97% of
respondents said maintaining email uptime
is critical for business continuity, yet only
27% have adopted a cyber-resilience
strategy,” said Ed Jennings, Chief
Operating Officer, Mimecast.