Anti-Virus and Anti-Spam Comprehensive protection delivered via multi-layered engines with an optimum mix of proprietary and best of breed third-party technology
Data Loss Prevention Protect your sensitive and confidential information from accidential or intentional exposure with fine grained policy controls
Signature Disclaimer & Management Achieve consistency in all email communications with email signature and disclaimer management based on Active Directory credentials
End User Productivity Applications Boost your employee productivity with self-service security, email and archive access features with apps built for Outlook, mobile, Mac and Web
Intelligent Email Routing Support complex on-premises, cloud or hybrid email environments and achieve rapid email system integration or separation associated with a merger, acquisition or divestiture
Threat Intelligence Gain insight into threats targeting your tenant with the Threat Intelligence Dashboard or use our Threat Intelligence API to feed threat data into a third party tool of your choice
API (Application Programming Interface) Create an extensible architecture for complete visibility and efficiency by integrating Mimecast with your current or planned IT solutions
URL Protect Protect your organization and employees against malicious websites containing malware, phishing and other threats through URL rewriting and on-click deep site inspection
Attachment Protect Defend against infection from weaponized attachments often used in ransomware, keylogger, trojan and spyware attacks with multi-layered inspection including advanced static and dynamic analysis
Impersonation Protect Comprehensive protection against social engineering attacks like Business Email Compromise, CEO fraud and phishing targeting your employees
Safely Click Embedded Links Protect from credential phishing by rendering phishing sites read only and eliminate patient-zero malware infections by executing downloaded files in an isolated container
Optional
Optional
Optional
Optional
Optional
Optional
Rapid, Safe Incident Investigation Provide security analysts with a safe, isolated environment to investigate suspicious URLs to help reduce complexity and time to respond, contain and remediate threats
Optional
Optional
Optional
Optional
Optional
Optional
Core Infosecurity Change behavior and lower organizational risk with persistent, engaging security awareness training. Help make employees part of your defense against web and email attacks, data loss, and other security threats
--
Phishing Simulations Test employee susceptibility with realistic phish tests. Phishing simulations are integrated with core training, making it easy to deploy reinforcement of training concepts based on test response
--
Risk Scoring Identify your riskiest employees so you can focus precious time and budget supporting the employees who need it most. Benchmark aggregate company score against other organizations in your industry to gauge your overall risk posture
--
Custom Content Enhance existing modules with supplemental training material or create your own module for training needs unique to your organization
--
Targeted Training Deploy additional training to employees who need it most. Create custom lists based on training performance, phishing simulation response or risk score so you can assign and send additional modules or conduct other types of training or remediation
--
HIPAA Modules Supplement core information security training with modules covering issues specific to the Health Insurance Portability and Accountability Act (HIPAA)
--
Optional
Optional
Optional
Optional
Optional
Email Tracker Protection Stop intended targets inadvertently disclosing critical information that could be used in a social engineering targeted phishing attack
Optional
Optional
Optional
Optional
Optional
Optional
Machine Learning and Identity Graph Detect sophisticated, highly targeted email threats by identifying anomalies in sender and recipient behaviors that could be indicative of a malicious email
Optional
Optional
Optional
Optional
Optional
Optional
Dynamic, Contextual Banners Engage users with color coded banners that indicate the nature of any risks associated with suspicious emails and solicits their views to strengthen protection
Optional
Optional
Optional
Optional
Optional
Optional
Proactive Threat Hunting Harness artificial intelligence and machine learning to scan quadrillions of web addresses to find websites spoofing your brand, even before they become live attacks
Optional
Optional
Optional
Optional
Optional
Web Detection Agent Discover if your website has been scraped and cloned anywhere on the internet
Optional
Optional
Optional
Optional
Optional
Remediation Initiate a rapid takedown of suspicious or active sites while protecting your employees by blocking URLs and domains across both Mimecast's Email and Web Security services
Optional
Optional
Optional
Optional
Optional
Web Security - Malicious Site Defense Protect your employees and guests from accessing malicious sites with comprehensive category and security policy controls
Optional
Optional
Optional
Optional
Optional
Web Security - Acceptable Use Enforcement Control what content is accessible by your employees and guests by enforcing acceptable use policies through 80+ granular category filters
Optional
Optional
Optional
Optional
Optional
Web Security - Application Visibility & Control Help mitigate shadow IT risks with full visibility of what cloud applications are being used. Then monitor, sanction or block access to all or groups of employees
Optional
Optional
Optional
Optional
Optional
Web Security - Intelligent Proxy Ensures deeper inspection of suspicious sites, including file downloads, by inspecting this traffic via a proxy and applying additional checks including anti-virus and static file analysis
Optional
Optional
Optional
Optional
Optional
Web Security - On Network Protection Protection is automatically applied for all web requests originating from employees or guests on your network
Optional
Optional
Optional
Optional
Optional
Web Security - Protect Guest Wifi Network-level controls help reduce legal and compliance risks by preventing access to malicious sites and blocking inappropriate content for visitors, customers and anyone else using your guest Wi-Fi networks
Optional
Optional
Optional
Optional
Optional
Web Security - User Reporting The ability to report on web access down to a user level when the Mimecast Security Agent is deployed to employees devices
Optional
Optional
Optional
Optional
Optional
Large File Send Ensure employees can easily and securely share large files up to 2GB via email whilst maintaining corporate security, compliance and data retention policies
Optional
Optional
Optional
Optional
Optional
30 Day Retention Search and restoration of email over a thirty day period in the event of accidental deletion or malicious attack
--
--
--
1 Year Retention Search and restoration of email over a one year period in the event of accidental deletion or malicious attack
--
--
--
--
--
99 Year Retention Long term data retention with a multipurpose cloud archive for compliance, e-Discovery, case review, restoration of email and increased user productivity
Optional
Optional
Optional
Optional
Supervision Provides simplified monitoring and escalation of email items from random selection or defined lexicon
--
--
--
--
Optional
Optional
Compliance Protect Provides the organization with compliance protection for SEC17-4 type data regulations
--
--
--
--
Optional
Optional
Archive for Teams Extend email archive capabilities to include Microsoft Teams – all on the same Mimecast platform
--
--
--
--
Optional
Optional