White paper: Reaching Beyond The Perimeter:
A Deep Dive into Mimecast’s Email Security 3.0 Strategy
By completing this form you are opting into emails from Secon Cyber. You can unsubscribe at any time.
Email has been right at the center of cyber attack and security trends and perfectly highlights the evolution of both cybercrime and cyber-defense. Bad actors have moved from the relatively unsophisticated to the very sophisticated using email. The evolution started years ago with unwanted advertising email (spam), moved to broad-based, malware-centric attacks (phishing and ransomware), to today’s highly customised and targeted email-borne attacks (spear-phishing and impersonations). As the attackers shifted their goals, tools, and techniques, the defenders have had to react accordingly. It seems clear that no matter how cybercrime evolves, email, due to its ubiquity and flexibility, will remain at its center.
Mimecast’s Email Security 3.0 strategy is here to help IT and security professionals achieve a new and more comprehensive form of protection by providing security controls:
- At the email perimeter – Enforcing security controls at the point of entry or exit of the organisation or of the email platform.
- Inside the network and the organisation – Security capabilities focused on applications, systems, and people that are internal to the organisation.
- Beyond the perimeter – The realm of the internet that is beyond the direct view and control of an organisation’s IT and security teams, but where cybercriminals develop and host many of their attacks.