www.mimecast.com Open in urlscan Pro
2620:1ec:46::44  Public Scan

Submitted URL: http://www.mimecast.com/products/
Effective URL: https://www.mimecast.com/products/
Submission: On November 25 via api from SE — Scanned from DE

Form analysis 1 forms found in the DOM

Name: Site SearchGET /search

<form action="/search" method="GET" novalidate="novalidate" name="Site Search" id="SiteSearch" data-di-form-track="">
  <div class="text">
    <input id="searchQuery" class="advanced" name="query" maxlength="50" type="search" autocomplete="off" tabindex="101" data-di-id="#searchQuery">
  </div>
  <span style="display:none;" class="SL_swap" id="SearchLang1"></span>
  <div class="submit"><input type="submit" value="Search" data-di-id="di-id-5d865940-ec64ff70"></div>
</form>

Text Content

 1.  01
 2.  02
 3.  03
 4.  04
 5.  05
 6.  06
 7.  07
 8.  08
 9.  09
 10. 10
 11. 11
 12. 12
 13. 13

 * EN  
   * English
   * Deutsch
   * Nederlands

Search

CAREERS

BLOG

CONTACT SUPPORT

LOGIN

 * WHY MIMECAST
    
   ✕
   WHY MIMECAST
    * Why Mimecast
    * Our Approach to Email Security
    * Industry Recognition
   
    * Customers Love Us
    * Cloud Native Platform
   
   Compare Mimecast
    * Mimecast vs. ProofPoint
    * Mimecast vs. Microsoft 365
    * Mimecast vs. Symantec

 * PRODUCTS
    
   ✕
   SEE OUR PRODUCTS
    * Email Security
    * Security Awareness Training
    * DMARC Analyzer
    * Cloud Archive
    * Brand Protection
   
    * Misaddressed Email Protection
    * Identity Graph and Machine Learning
    * Identity Graphing
    * Web Security
    * AI Cybersecurity
    * Email Incident Response
    * All Products >
   
   INTEGRATE & OPTIMIZE
    * Threat Intelligence
    * SAFE Score
    * View Integration Partners
    * API Developer Documentation
    * Mimecast Ecosystem Community
   
   GET STARTED
    * Choose a Plan
    * Get a Quote
    * Request a Demo
    * Start a Trial
    * Request a POC
    * Contact Us

 * SOLUTIONS
    
   ✕
   BUSINESS CHALLENGES
    * Secure Your Email
    * Secure M365
    * Ransomware
    * Business Email Compromise
    * Data Governance
    * Supply Chain Attacks
    * Brand Impersonation
    * Cyber Awareness
    * All Solutions >
   
   INDUSTRIES
    * Healthcare
    * Financial Services
    * Legal
    * Public Sector
    * Information Technology
   
    * Manufacturing
    * Construction
    * Education
   
   TRANSITION TO MIMECAST
    * Bolster Microsoft 365
    * Migrate from ProofPoint
    * Migrate from Symantec
    * Hear From Your Peers
   
   BY SIZE
    * Small Business
    * Enterprise

 * EDUCATION & SUPPORT
    
   ✕
   FOR CUSTOMERS
    * Technical Support
    * Mimecaster Central Community
    * Knowledge Base
    * Implementation Services
    * Login
   
   EDUCATION
    * Mimecast Education
    * Mimecast Certifications
    * Education Subscriptions
    * Mimecast Training
   
   RESOURCES
    * Resource Center
    * Blog
    * Customer Stories
    * Threat Intelligence Hub
    * Cyber Resilience Think Tank

 * PARTNERS
    
   ✕
   SELL MIMECAST
    * Partner Program
    * Reseller Network
    * Managed Service Program
    * Become a Partner
    * Partner Portal
   
   INTEGRATE WITH MIMECAST
    * Become an Alliance Partner
    * Alliance Program Developer Documentation

Get a quote
Menu
✕
 * WHY MIMECAST
   MAIN MENU
   WHY MIMECAST
    * Why Mimecast
    * Our Approach to Email Security
    * Industry Recognition
   
    * Customers Love Us
    * Cloud-native Platform
   
   COMPARE MIMECAST
    * Mimecast vs. ProofPoint
    * Mimecast vs. Microsoft 365
    * Mimecast vs. Symantec

 * PRODUCTS
   MAIN MENU
   SEE OUR PRODUCTS
    * Email Security
    * Security Awareness Training
    * DMARC Analyzer
    * Cloud Archive
    * Brand Protection
   
    * Misaddressed Email Protection
    * Identity Graph and Machine Learning
    * Identity Graphing
    * Web Security
    * AI Cybersecurity
    * Email Incident Response
    * All Products >
   
   INTEGRATE & OPTIMIZE
    * Threat Intelligence
    * SAFE Score
    * View Integration Partners
    * API Developer Documentation
    * Mimecast Ecosystem Community
   
   GET STARTED
    * Choose a Plan
    * Get a Quote
    * Request a Demo
    * Start a Trial
    * Request a POC
    * Contact Us

 * SOLUTIONS
   MAIN MENU
   BUSINESS CHALLENGES
    * Secure Your Email
    * Secure M365
    * Ransomware
    * Business Email Compromise
    * Data Governance
    * Supply Chain Attacks
    * Brand Impersonation
    * Cyber Awareness
   
   INDUSTRIES
    * Healthcare
    * Financial Services
    * Legal
    * Information Technology
    * Public Sector
   
    * Manufacturing
    * Construction
    * Education
   
   TRANSITION TO MIMECAST
    * Bolster Microsoft 365
    * Migrate from ProofPoint
    * Migrate from Symantec
    * Hear From Your Peers
   
   BY SIZE
    * Small Business
    * Enterprise

 * EDUCATION & SUPPORT
   MAIN MENU
   FOR CUSTOMERS
    * Technical Support
    * Mimecaster Central Community
    * Knowledge Base
    * Implementation Services
    * Login
   
   EDUCATION
    * Mimecast Education
    * Mimecast Certifications
    * Education Subscriptions
    * Mimecast Training
   
   RESOURCES
    * Resource Center
    * Blog
    * Customer Stories
    * Threat Intelligence Hub
    * Cyber Resilience Think Tank

 * PARTNERS
   MAIN MENU
   SELL MIMECAST
    * Partner Program
    * Reseller Network
    * Managed Service Program
    * Become a Partner
    * Partner Portal
   
   INTEGRATE WITH MIMECAST
    * Become an Alliance Partner
    * Alliance Program Developer Documentation

 * CAREERS
 * BLOG
 * CONTACT SUPPORT
 * LOGIN
    * EN  
   
    * English
    * Deutsch
    * Nederlands

Get a quote
 * Home
 * Products


PRODUCTS

 * Email Security With Targeted Threat Protection
 * Alliance & API Ecosystem
 * Threat Intelligence
 * DMARC Analyzer
 * CyberGraph AI Cybersecurity
 * Brand Exploit Protect
 * Email Incident Response
 * Information Protection
 * Web Security
 * Platform Selection
 * Cloud Archive
 * Mailbox Continuity
 * Awareness Training
 * Discovery Center
 * Mimecast Plans
 * Mimecast Plans Small Business

Ready to get started? Get a Quote




EMAIL SECURITY WITH TARGETED THREAT PROTECTION

Mimecast Email Security with Targeted Threat Protection is a set of cloud
services designed to provide next generation protection against advanced
email-borne threats such as malicious URLs, malware, impersonation attacks, as
well as internally generated threats.

Explore Product



THREAT INTELLIGENCE


BETTER UNDERSTAND THE NATURE OF THE THREATS TO YOUR ORGANIZATION. 

Mimecast’s Threat Intelligence Dashboard:  A tool that empowers you to stay
ahead of security concerns by aggregating and integrating Indicators of
Compromise (IoCs) and other actionable information into a single view so you
have more visibility into the threats you face.

Mimecast’s Threat Remediation:  A control panel enabling you to respond rapidly,
proactively, and comprehensively to emerging threats, keeping your organization
as safe as possible.

 

Explore Product



MIMECAST AWARENESS TRAINING

Human error is involved in 90-95% of all security breaches. And many of those
incidents will be major. There’s about a 30% chance that you will have an
incident that compromises over 10,000 records this year. Mimecast’s security
awareness training platform will help you tackle human error head on, changing
employee security behavior and fundamentally lowering your security risk.

EXPLORE PRODUCT


INFORMATION PROTECTION

Email is the #1 application used by your users and the data they are sending and
receiving needs to be protected. To maintain these protections, organizations
need a solution that integrates Data Leak Prevention (DLP) and other email
content control tools seamlessly into their environment.

CONTROL CONTENT AND DLP

Inspect and manage how users are sending and receiving sensitive information
through email.

arrow cta arrow cta

SECURE MESSAGING

Safely transmit and control how users share and how recipients access
confidential information through email.

arrow cta arrow cta

LARGE FILE SEND

Enable users to securely send and receive large files through email without
impacting your environment.

arrow cta arrow cta


WEB SECURITY

Mimecast Web Security protects against malicious web activity initiated by user
action or malware and blocks business inappropriate websites based on
customer-configured policies and Mimecast’s threat intelligence capabilities.
Easy to deploy and manage, it gives you the technology needed to keep the web
safe, delivered simply and cost-effectively.

EXPLORE PRODUCT


MAILBOX CONTINUITY


MIMECAST MAILBOX CONTINUITY PROVIDES RESILIENCE BY ALLOWING EMPLOYEES TO KEEP
SENDING AND RECEIVING EMAIL IN THE EVENT OF AN UNPLANNED OR PLANNED OUTAGE OF
THE PRIMARY EMAIL SYSTEM.

Critical security and company policies remain in place to keep email safe.
Mimecast works with mail solutions that are on-premises, in the cloud or hybrid.



CONTINUITY SERVICES

Keep email flowing and archives accessible even if the primary system goes down.

arrow cta arrow cta



EXPERT INSIGHT.

Resources you may be interested in:

Analyst Report

FORRESTER RESEARCH: SAFEGUARDING COLLABORATION TOOLS FOR THE REMOTE WORKFORCE

Download
Ebook

CYBER RESILIENCE PREPAREDNESS. EXPERT INSIGHT, TIPS AND GUIDANCE

Read More
Video

CYBER RESILIENCE FOR EMAIL

Watch


PLATFORMS

Mimecast knows email technologies inside and out. Manage risk and better control
Microsoft Office 365TM, Microsoft Exchange or Google Apps for Work.



OFFICE 365 ARROW CTA

Add layered security, an independent archive and continuity for when Office 365
goes down.


CLOUD ARCHIVE

Move to the cloud with a single, secure archive for emails, files and other
content.  Go beyond the boundaries of traditional archiving by creating a
secure, centralized and accessible corporate memory.

EXPLORE PRODUCT


MIMECAST PLANS

Mimecast is an integrated, cloud-based platform that's always working, always
protecting.

COMPREHENSIVE DEFENSE PLAN ARROW CTA

Protect the perimeter and inside your network against cyber threats. All on one
cloud platform.

FOUNDATIONS PLAN ARROW CTA

Protection at the perimeter and inside the network minimizes disruption –
resilience keeps your organization working even during a cyber event.

See Plans

Ready to get started? Get a Quote


About Us   
 * Overview
 * Careers
 * Leadership
 * Investors

Products   
 * All Products
 * Education
 * Partners
 * Try & Buy

Resource Center   
 * News & Events
 * Resources
 * Customer Stories
 * Blog
 * Trust Center

Contact Us   
 * Global Locations
 * Get a Quote
 * Contact Support
 * Sales +44 (0)20 7843 2320

 * Contracts
 * Privacy Statement
 * Legal
 * Privacy Preferences
 * Responsible Disclosure
 * Sitemap

© 2003 - 2021 Mimecast Services Limited.
Mimecast is a trademark of Mimecast Services Limited in the United States and
other countries. All other trademarks contained herein are the property of their
respective owners.
 






This website uses cookies in order to provide you with the best possible
experience and to monitor and improve the performance of the site. We have
published a new cookie policy which explains what cookies are and which types of
cookies this website uses. By continuing to use this site, you are agreeing to
the use of cookies, unless you have disabled them. Privacy Statement

Cookies Settings Accept All Cookies