Close Menu
CloudSecNewsHub
  • News
  • Technologies
  • Automation
  • Updates
  • Guides
  • Tools
  • Compliance

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

What's Hot

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025

How to pick up criminal evidence for Microsoft 365

May 8, 2025

Cloud security treatment: American federal edition

May 7, 2025
Facebook X (Twitter) Instagram
Trending
  • Google Cloud Security Plitz attacks e -hunting, improves vision
  • How to pick up criminal evidence for Microsoft 365
  • Cloud security treatment: American federal edition
  • The most prominent report: 2025 Experience of exposure to cloud data
  • Artificial intelligence agents to convert Google Cloud Security Ops
  • The necessity of cloud security in the electronic scene today
  • Gap block: How to simplify QULYS Compliance NCA ECC 2024 for companies
  • Ransomware Spike displays cracks in cloud safety
Facebook X (Twitter) Instagram Pinterest Vimeo
CloudSecNewsHubCloudSecNewsHub
  • News

    How to pick up criminal evidence for Microsoft 365

    May 8, 2025

    The most prominent report: 2025 Experience of exposure to cloud data

    May 7, 2025

    Artificial intelligence agents to convert Google Cloud Security Ops

    May 6, 2025

    Ransomware Spike displays cracks in cloud safety

    May 5, 2025

    Sentinelone wins the best safety point and cloud security at the 2025 SC Awards

    May 1, 2025
  • Technologies

    Gartner: How to build a safe institution cloud environment

    April 21, 2025

    Promote South Korea's national security by adopting the cloud

    April 11, 2025

    “The traditional methods of cloud safety, where organizations depend on the segmented cloud safety tools, are not simply enough”

    April 3, 2025

    Stream.security The cloud solution in actual time in industry with TRP technology designed to dilute proactively from the effect of breach in the cloud

    April 1, 2025

    Skyhawk's creation platform mentioned in 2024 Gartner Emerging Tech Impact Radar: Preventive Cyber ​​Security

    March 28, 2025
  • Automation

    Cloud Security Alliance launches an initiative to automate compliance

    April 30, 2025

    The security automation market to see a great expansion

    April 25, 2025

    GSA FedRAMP '20X' rejuvenation keys to automation, to the approvals in “Weeks” – MERITALK

    April 16, 2025

    Cortex Cloud – cloud safety conversion

    April 11, 2025

    TUFIN extends the possibilities of the security of the cloud and the network with the latest version of the synchronous pavilion

    April 8, 2025
  • Updates

    Google Cloud Security Plitz attacks e -hunting, improves vision

    May 8, 2025

    April 2025 Correction Tuesday: updates and analysis

    April 15, 2025

    Google Cloud 2025: News and updates

    April 12, 2025

    5 Google Big Google Aman ads on the next 2025

    April 9, 2025

    Google offers a unified safety platform and safety agents driven by artificial intelligence

    April 9, 2025
  • Guides

    CISO guide for effective cloud security strategies

    April 30, 2025

    Singapore offers instructions to support the cloud and the elasticity of the first place

    April 29, 2025

    Singapore has new guidelines to enhance flexibility and security for cloud services and data centers

    April 5, 2025

    What is the safety of the cloud? | IBM

    April 3, 2025

    Google gets Wiz for $ 32 billion to boost cloud safety

    March 19, 2025
  • Tools

    Cloud security treatment: American federal edition

    May 7, 2025

    The necessity of cloud security in the electronic scene today

    May 6, 2025

    Crowdstrike (CRWD) launches Amnesty International Security tools to improve the cloud p

    April 30, 2025

    The 5 best CNAPP benefits that you need to know in 2025

    April 26, 2025

    The security coalition cloud launches the latest security report. Saas

    April 26, 2025
  • Compliance

    Gap block: How to simplify QULYS Compliance NCA ECC 2024 for companies

    May 5, 2025

    Ensuring commitment to international standards

    April 29, 2025

    Thales and Deloitte are an alliance to enhance the security and compliance data strategies

    April 22, 2025

    AWS security compliance is easy: IT-Magic Devops solutions for a stronger security situation

    April 21, 2025

    5 ways that banks can achieve smooth security and compliance in 2025

    April 14, 2025
Login
CloudSecNewsHub
Home»News»Mimecast Cloud Integrated Extends Security Across Communication Channels
News

Mimecast Cloud Integrated Extends Security Across Communication Channels

CloudSecNewsHubBy CloudSecNewsHubSeptember 8, 2024No Comments9 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Mimecast Cloud Integrated Extends Security Across Communication Channels
Share
Facebook Twitter LinkedIn Pinterest Email

(This version was created automatically)
00:00
Hello everyone. Welcome to DEMO, the show where companies come to show us their latest products and services. Today, I’m joined by Edwin Moreno, Global Field CTO at Mimecast. Welcome to the show, Edwin.

00:09
Thanks for having me.

00:10
So, what are you showing us here today?

00:11
So today I'm going to show you the Mimecast Cloud Integrated platform. This is actually one of the newer solutions that we've released. We've actually moved from a traditional cloud gateway offering to this gateway solution that we're very excited to show you.

00:23
Who is this program designed for within your company? IT professionals? Email security experts? Large corporations, small businesses, everyone?

00:31
This solution is really meant to provide an extra layer of security for anyone using Microsoft. A lot of people use this solution, whether it's email security teams or infrastructure protection, but these are the people who are really looking for an extra layer of protection. Microsoft probably doesn't provide this layer natively.

00:47
What problems are you trying to solve with this product that may not have been solved before? What have companies done before that had a real need for this product?

00:57
What we're really seeing is that there are a lot of companies that are using native offerings, and Microsoft has some of these capabilities out of the box, but they typically come to us because there are threats that they were expecting to stop that are just passing through, right? That's where I think of us as a security-oriented organization. We're looking for phishing emails. We're looking for business email compromise. We're looking for malware where Microsoft has a platform, great, but we'll help them when it comes to additional security controls.

01:27
Do many companies use on-premises or on-premises hardware and software to do many of these email security things? Why is the cloud better than some of these on-premises tools?

01:39
Traditionally, organizations that wanted additional security, they used security gateways. So, SAGs, whether they were on-premises or even cloud offerings out there. In fact, what we're seeing, though, is that a lot of people don't actually want to make the move to MX forwarding, which is what SAGs require. So, in fact, what they want to do is get the full capabilities from Microsoft, whether it's E3 or E5 or keeping those things enabled, and then add Mimecast as an additional layer there.

02:06
Okay, stay tuned for the rest of the show, because we've got a great surprise for you. But Edwin, let's jump right into the demo.

02:12
Great. What you see here is the cloud-integrated console, right? The point here, though, is that the people who are using this, as I asked earlier, are typically sophisticated security organizations, but they probably don't have all the resources or people to spend on a full solution, right? So they're looking for a simple, cloud-integrated setup, because it doesn't require MX redirection. Typically, it deploys in five minutes. And then we also have the ability to do things like historical scanning. So what you're seeing here is all the detections that we've seen in this environment. As an administrator, I don't know if people are going to log in. Simple dashboard. Is there anything I can do? You have a good idea of ​​what the trends are. Are you seeing more or less threats over time? But let's start to dig into some of the good stuff. Where are these attacks actually coming from? Because you might want to get to a point where you have geo-restriction controls in place if you're not actually doing legitimate business with China, for example. Why are you allowing these IP addresses, right? Then let's look at the other chart, which is admin login by origin. Imagine if we didn't have any admins that I know of from South Africa, right? And I started seeing three logins. Someone has compromised, and that definitely raises a red flag. I want the easy ability to log in from the first screen so I can see that, but let's continue to show you more.

We know that users are inherently vulnerable, but do you have any idea who they are most targeted for? Not many organizations have any idea, right? So here we’ll show you the top five targeted recipients, whether they’re receiving malware, phishing, or untrustworthy emails. And if you want to dig deeper, you can always click on that user and see all the emails that person has received.

03:48
Now is it received or just clicked on?

03:52
Well, there are two different categories, as you can see. So, malware is usually inbound. Phishing is something that they typically click on or receive. If you want, let me show you an example here. Well, you'll see below all the recent discoveries. However, one of the biggest areas that I know Mimecast is going to bring that extra layer that Microsoft doesn't do is with commercial email compromise. So this really leverages large language models, where you start to understand how people communicate. Who's sending you emails, who do you typically reply to? And then, if they suddenly start asking for bank transfers or direct deposit information, you might want to challenge that a little bit, right? As an administrator, the goal here is to show you all the relevant information right away. This thing was analyzed as a phishing attack, so its current state is isolated, so we know it wasn't delivered, right? You know the policy that leads to that. But as a security professional, I want to be able to look at this email and see if this email is actually classified as a potential phishing email, right? So if I look at this email, there are some things already in the subject line, there is an element of urgency here. So I already know that whatever this person is emailing me, they want me to do something right away. Okay, maybe I should be a little bit more careful about that, right? Also, look at the subject line. There’s actually a direct deposit update, so they’re asking me to change my payroll, right? Let’s move on. Mark Van Zadelhoff, our CEO. Why is he emailing me from a personal email address? Okay, and why is this the first time I’ve ever gotten an email from the CEO?

05:25
This doesn't generate all these other red flags for the user, does it?

05:29
But let’s dig a little deeper here. What about this? The crucial thing is the way our technology works, so we leverage the capabilities of the social graph, which tracks the above things, who are you sending emails to? Are they replying? Are they coming from a personal email address? But then natural language processing takes it even further, right? So right now here in this email, they’re changing banks. It’s direct deposit, there’s urgency to the case, and the uprising before the next payroll period.

05:56
So this email was impersonating your CEO, right? That’s amazing. And you were telling me before the show that the reason for that was because I was asking you about the importance of email. Are hackers still hacking through email? Because we hear about voice AI and texting attacks and things like that, but email is still a really big problem for a lot of companies.

06:17
It's crazy to start with the statistics, there's about 91% of threats that still start with email. I think the reason for that is because it's so easy to set up random email servers and start sending emails to people and hide their identity, and that's usually the first form of attack. And if I can hack you, I can get your credentials, for example, now I can probably move to that attack. So what's also interesting about cloud integration is that we're not just focusing on email, we're also focusing on collaboration channels. Because if I can hack you, what if you go through Teams, what if you actually start sending malicious URLs or malicious attachments to other people?

06:56
If you can click on it, if you can get in and trick me, I'm going to ask you questions now and drop links. Everyone thinks I'm me, and then it turns out I'm not me.

07:03
In many of the conversations I have with clients, email is usually the first thing that comes to mind, but they always say, since Covid, people are more inclined to work remotely. They don't have to be tied to email anymore.

07:24
So, do you provide layers of protection across our other communications? Because now I'm concerned about that. And you have some other things as well. There's some awareness, and I think you mentioned some other things that you have, other than just scanning. Because I think the key thing here is that you can have the best technology in the world to be proactive, but you're going to be up against these dangerous humans, right? So what are you doing to focus on that human element?

07:30
We have a solution here, which is an awareness training tool, where we’re going to pick up on all of these risk indicators. Are they failing phishing simulations? Are they actually clicking on phishing attacks in real life? Are they watching the videos that we’re telling them to do? But let’s take that idea and move it forward. We should be training people based on their risk, not treating everyone the same. So we’re going to be rolling out adaptive training very soon.

08:11
You've shown me a lot of stuff here. I'm sure you have a lot of other features. So where can people go for more details and more information?

08:17
So if people go to Mimecast.com/free-trial, that's the special offer we talked about earlier. So you're going to go to this page. What we're offering now is a free threat scam. For organizations that want low impact, zero impact, on their environment, that just want to know if there are threats that I need to know about, especially dormant threats. Not only can Mimecast give you that historical scan, but we'll go ahead and clean up those messages there for you. And if you want to continue to protect Day Zero in the future, go ahead and do that.

08:50
Edwin Moreno from Mimecast, thanks again. Thanks for the demo. That's all the time we have for today's episode. Don't forget to like the video, subscribe to the channel, and add any thoughts you have below. Join us every week for new episodes of the demo. I'm Keith Shaw, thanks for watching.

Channels cloud Communication Extends Integrated Mimecast security
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleTop 9 OSS CSPM Tools to Consider
Next Article TCS and Google Cloud: AI Becomes the Lifeblood of Cybersecurity
admin
CloudSecNewsHub
  • Website

Related Posts

Updates

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025
News

How to pick up criminal evidence for Microsoft 365

May 8, 2025
Tools

Cloud security treatment: American federal edition

May 7, 2025
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Debian 12.6 released with 84 security updates and 162 bug fixes

July 15, 20241 Views

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 20250 Views

How to pick up criminal evidence for Microsoft 365

May 8, 20250 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Don't Miss
Updates

Google Cloud Security Plitz attacks e -hunting, improves vision

CloudSecNewsHubMay 8, 2025
News

How to pick up criminal evidence for Microsoft 365

CloudSecNewsHubMay 8, 2025
Tools

Cloud security treatment: American federal edition

CloudSecNewsHubMay 7, 2025

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

Most Popular

Debian 12.6 released with 84 security updates and 162 bug fixes

July 15, 20241 Views

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 20250 Views

How to pick up criminal evidence for Microsoft 365

May 8, 20250 Views
Don't Miss

Google Cloud Security Plitz attacks e -hunting, improves vision

May 8, 2025

How to pick up criminal evidence for Microsoft 365

May 8, 2025

Cloud security treatment: American federal edition

May 7, 2025

Subscribe to Updates

Subscribe to our newsletter and stay updated with the latest news and exclusive offers.

Facebook X (Twitter) Instagram Pinterest
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms and Conditions
  • Disclaimer
© 2025 CloudSecNewsHub. All Rights Reserved

Type above and press Enter to search. Press Esc to cancel.

Sign In or Register

Welcome Back!

Login to your account below.

Lost password?