What Do You Do When The Smoke Clears?
The Human Firewall Is On Fire
John Kousch – Mimecast Account Manager
2
33
Say Hi To Your User For Today
44
Email: The Ultimate AppWith demanding business and user requirements
24 X 7 Email Availability
ContinuousMission-critical Mobile
© 2017 Mimecast.com All rights reserved.4
© 2017 Mimecast.com All rights reserved.5
How sure are you of your environment’s availability?
What happens when things go wrong?
© 2017 Mimecast.com All rights reserved.6
Email Security Risk Assessment (ESRA)
8
It’s cheap, ubiquitous, global, flexible, anonymous, trusted by users, integral to so many business processes
Why do attackers rely on email?
© 2018 Mimecast. All rights reserved.
225BBusiness Emails Sent Every Day
6.3BEmail Mailboxes in 2017, growing to
7.7B by 2021
O365 Cloud Service by
User Count
#1
© 2017 Mimecast.com All rights reserved.9
It Only
Takes One.
10
Introducing: Your Users
Confidential |
What do you notice?
121212© 2018 Mimecast. All rights reserved.
Impersonating Legitimate Websites
That “Apple.com” URL is really xn--80ak6aa92e.com
© 2017 Mimecast.com All rights reserved.13
Mimecast Targeted Threat Protection+ User Awareness Training:
© 2017 Mimecast.com All rights reserved.14
URL Protect
© 2017 Mimecast.com All rights reserved.15
URL Protect
© 2017 Mimecast.com All rights reserved.16
URL Protect
17
18
19
© 2017 Mimecast.com All rights reserved.20
MIMECAST CONFIDENTIAL – INTERNAL ONLY
Confidential |
Impersonation Attacks
Confidential |
Supply Chain Impersonation
23
Granular Attachment Inspection
Analyze inbound attachments with multiple AV engines + static file
analysis + behavioral sandboxing + Safe file conversion
24
Attachment Protect
25
Attachment Protect
26
Attachment Protect
27
SO WE’VE GOT INDUSTRY LEADING THREAT PROTECTION TECHNOLOGY & WE’RE TRAINING OUR USERS BUT… What if something still
gets compromised? What if you go down? What if data is lost?
© 2017 Mimecast.com All rights reserved.28
CompromisedInsider
CarelessInsider
MaliciousInsider
2929
The Smoke Clears
30
© 2017 Mimecast.com All rights reserved.31
• Effective Automated Security Controls
• Leverage global threat intelligence
• Incident / Response Dashboard
• Constantly monitor and re-check status of all file attachment fingerprints globally
Enhanced Threat Remediation
© 2017 Mimecast.com All rights reserved.32
Sync & Recover for Exchange and Office 365
• Automated Exchange Data Recovery
• No hardware or software required
• Unified administration for security, archiving, continuity, and data protection
FoldersCalendars
Contacts
Mime|OS API Mime|OS API
© 2017 Mimecast.com All rights reserved.33
BeforeMimecast
ANTI-SPAM/VIRUS DLPENCRYPTION STATIONERY
ARCHIVEANTI-SPAM/VIRUS
ENCRYPTION
STATIONERY
DATA LEAK PREVENTION
ARCHIVE
AND/OR
HA
© 2017 Mimecast.com All rights reserved.34
WithMimecast
AND/OR
© 2017 Mimecast.com All rights reserved.35
Cyber Resilience for email
Threat Protection
Durability
AdaptabilityRecoverability
36
Name | Contact Info
Thank you
© 2018 Mimecast. All rights reserved.
John Kousch – Account Manager [email protected]
Thank you!!