SlideShare una empresa de Scribd logo
1 de 31
[email_address] +27(0)41 3640264 +27(0)711647617
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Agenda
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],About Mimecast
Software + Services (SaaS) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RSA Clients Include
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The Corporate email problem
Despite best efforts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
LAN versus MSP versus Mimecast LAN MSP/ISP Mimecast Pros Pros Pros ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Cons Cons Cons ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Market shifts to SaaS ,[object Object],[object Object],[object Object],[object Object]
Introducing ‘Unified Email Management™’ ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Protects existing investments ,[object Object]
 
 
Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Mimecast Security success:
Continuity ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mimecast keeps your users working during an outage ,[object Object],[object Object],[object Object],[object Object]
Drivers for Email Retention ,[object Object],[object Object],[object Object],[object Object],[object Object]
Email storage Management ,[object Object],[object Object],[object Object],[object Object],[object Object]
Handling Data Migration
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Archiving the easy way. Mimecast
Compliance & e-discovery ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Retention for Compliance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Confidentiality Integrity Availability
Retention Reality ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data leak prevention & content filtering ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case Study: Transnet Group ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case study: Growth-Point Properties ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Case study: Innovation Group ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Recap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Recap ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Questions ?

Más contenido relacionado

La actualidad más candente

Realizing the Full Potential of Cloud-Native Application Security
Realizing the Full Potential of Cloud-Native Application SecurityRealizing the Full Potential of Cloud-Native Application Security
Realizing the Full Potential of Cloud-Native Application SecurityOry Segal
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceVignesh Ganesan I Microsoft MVP
 
Going Passwordless with Microsoft
Going Passwordless with MicrosoftGoing Passwordless with Microsoft
Going Passwordless with MicrosoftFIDO Alliance
 
ITIL 4 Strategist Direct, Plan and Improve (DPI)
ITIL 4 Strategist Direct, Plan and Improve (DPI)ITIL 4 Strategist Direct, Plan and Improve (DPI)
ITIL 4 Strategist Direct, Plan and Improve (DPI)Mohamed Zakarya Abdelgawad
 
IBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewIBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewnazeer325
 
Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Dock 365
 
ACCA Better on the Cloud: Financial Services in Asia Pacific 2021
ACCA Better on the Cloud:  Financial Services in Asia Pacific 2021ACCA Better on the Cloud:  Financial Services in Asia Pacific 2021
ACCA Better on the Cloud: Financial Services in Asia Pacific 2021accacloud
 
What You're Missing With Your Current WAF Provider
What You're Missing With Your Current WAF ProviderWhat You're Missing With Your Current WAF Provider
What You're Missing With Your Current WAF ProviderCloudflare
 
2023 - IBM Cost of a Data Breach Report.pdf
2023 - IBM Cost of a Data Breach Report.pdf2023 - IBM Cost of a Data Breach Report.pdf
2023 - IBM Cost of a Data Breach Report.pdfErickaDiaz24
 
Deploying Open Banking APIs on AWS
Deploying Open Banking APIs on AWSDeploying Open Banking APIs on AWS
Deploying Open Banking APIs on AWSAmazon Web Services
 
Charles Taylor InsureTech - InsurTech Innovation Award 2022
Charles Taylor InsureTech - InsurTech Innovation Award 2022Charles Taylor InsureTech - InsurTech Innovation Award 2022
Charles Taylor InsureTech - InsurTech Innovation Award 2022The Digital Insurer
 
ZA Tech - Insurtech Innovation Award 2023
ZA Tech - Insurtech Innovation Award 2023ZA Tech - Insurtech Innovation Award 2023
ZA Tech - Insurtech Innovation Award 2023The Digital Insurer
 
Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021Capgemini
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Aujas
 
WEECOMPANY - InsurTech Innovation Award 2022
WEECOMPANY - InsurTech Innovation Award 2022WEECOMPANY - InsurTech Innovation Award 2022
WEECOMPANY - InsurTech Innovation Award 2022The Digital Insurer
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Sarfaraz Chougule
 
Beyond Banking: New Business Models for the Digital Era
Beyond Banking: New Business Models for the Digital EraBeyond Banking: New Business Models for the Digital Era
Beyond Banking: New Business Models for the Digital EraJessica Wilkinson
 

La actualidad más candente (20)

Endpoint Security
Endpoint SecurityEndpoint Security
Endpoint Security
 
Realizing the Full Potential of Cloud-Native Application Security
Realizing the Full Potential of Cloud-Native Application SecurityRealizing the Full Potential of Cloud-Native Application Security
Realizing the Full Potential of Cloud-Native Application Security
 
Fundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and ComplianceFundamentals of Microsoft 365 Security , Identity and Compliance
Fundamentals of Microsoft 365 Security , Identity and Compliance
 
Going Passwordless with Microsoft
Going Passwordless with MicrosoftGoing Passwordless with Microsoft
Going Passwordless with Microsoft
 
ITIL 4 Strategist Direct, Plan and Improve (DPI)
ITIL 4 Strategist Direct, Plan and Improve (DPI)ITIL 4 Strategist Direct, Plan and Improve (DPI)
ITIL 4 Strategist Direct, Plan and Improve (DPI)
 
IBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewIBM InfoSphere Guardium overview
IBM InfoSphere Guardium overview
 
Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365Overview of Data Loss Prevention Policies in Office 365
Overview of Data Loss Prevention Policies in Office 365
 
ACCA Better on the Cloud: Financial Services in Asia Pacific 2021
ACCA Better on the Cloud:  Financial Services in Asia Pacific 2021ACCA Better on the Cloud:  Financial Services in Asia Pacific 2021
ACCA Better on the Cloud: Financial Services in Asia Pacific 2021
 
What You're Missing With Your Current WAF Provider
What You're Missing With Your Current WAF ProviderWhat You're Missing With Your Current WAF Provider
What You're Missing With Your Current WAF Provider
 
2023 - IBM Cost of a Data Breach Report.pdf
2023 - IBM Cost of a Data Breach Report.pdf2023 - IBM Cost of a Data Breach Report.pdf
2023 - IBM Cost of a Data Breach Report.pdf
 
Deploying Open Banking APIs on AWS
Deploying Open Banking APIs on AWSDeploying Open Banking APIs on AWS
Deploying Open Banking APIs on AWS
 
Charles Taylor InsureTech - InsurTech Innovation Award 2022
Charles Taylor InsureTech - InsurTech Innovation Award 2022Charles Taylor InsureTech - InsurTech Innovation Award 2022
Charles Taylor InsureTech - InsurTech Innovation Award 2022
 
ZA Tech - Insurtech Innovation Award 2023
ZA Tech - Insurtech Innovation Award 2023ZA Tech - Insurtech Innovation Award 2023
ZA Tech - Insurtech Innovation Award 2023
 
Acronis presentation
Acronis presentationAcronis presentation
Acronis presentation
 
Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021Top Trends in Retail Banking: 2021
Top Trends in Retail Banking: 2021
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
 
WEECOMPANY - InsurTech Innovation Award 2022
WEECOMPANY - InsurTech Innovation Award 2022WEECOMPANY - InsurTech Innovation Award 2022
WEECOMPANY - InsurTech Innovation Award 2022
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
Beyond Banking: New Business Models for the Digital Era
Beyond Banking: New Business Models for the Digital EraBeyond Banking: New Business Models for the Digital Era
Beyond Banking: New Business Models for the Digital Era
 
ISO 27701
ISO 27701ISO 27701
ISO 27701
 

Destacado

Boosting the Customer Experience: The New Admin Console for Mimecast
Boosting the Customer Experience: The New Admin Console for MimecastBoosting the Customer Experience: The New Admin Console for Mimecast
Boosting the Customer Experience: The New Admin Console for MimecastMimecast
 
The Fog Around the Cloud- Nathaniel Borenstein
The Fog Around the Cloud- Nathaniel BorensteinThe Fog Around the Cloud- Nathaniel Borenstein
The Fog Around the Cloud- Nathaniel BorensteinMimecast
 
How to Improve the Resilience of Your Email Infrastructure Through Cloud Base...
How to Improve the Resilience of Your Email Infrastructure Through Cloud Base...How to Improve the Resilience of Your Email Infrastructure Through Cloud Base...
How to Improve the Resilience of Your Email Infrastructure Through Cloud Base...Mimecast
 
The 5 Phases of a Whaling Assault
The 5 Phases of a Whaling Assault The 5 Phases of a Whaling Assault
The 5 Phases of a Whaling Assault Mimecast
 
Institucional proofpoint
Institucional proofpointInstitucional proofpoint
Institucional proofpointvoliverio
 
Google Architecture - Breaking it Open
Google Architecture - Breaking it OpenGoogle Architecture - Breaking it Open
Google Architecture - Breaking it OpenHARMAN Services
 

Destacado (7)

Boosting the Customer Experience: The New Admin Console for Mimecast
Boosting the Customer Experience: The New Admin Console for MimecastBoosting the Customer Experience: The New Admin Console for Mimecast
Boosting the Customer Experience: The New Admin Console for Mimecast
 
The Fog Around the Cloud- Nathaniel Borenstein
The Fog Around the Cloud- Nathaniel BorensteinThe Fog Around the Cloud- Nathaniel Borenstein
The Fog Around the Cloud- Nathaniel Borenstein
 
Mime@20
Mime@20Mime@20
Mime@20
 
How to Improve the Resilience of Your Email Infrastructure Through Cloud Base...
How to Improve the Resilience of Your Email Infrastructure Through Cloud Base...How to Improve the Resilience of Your Email Infrastructure Through Cloud Base...
How to Improve the Resilience of Your Email Infrastructure Through Cloud Base...
 
The 5 Phases of a Whaling Assault
The 5 Phases of a Whaling Assault The 5 Phases of a Whaling Assault
The 5 Phases of a Whaling Assault
 
Institucional proofpoint
Institucional proofpointInstitucional proofpoint
Institucional proofpoint
 
Google Architecture - Breaking it Open
Google Architecture - Breaking it OpenGoogle Architecture - Breaking it Open
Google Architecture - Breaking it Open
 

Similar a Mimecast Presentation

Unified Email Management
Unified Email ManagementUnified Email Management
Unified Email ManagementTim Pickard
 
Microsoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services WhitepaperMicrosoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services WhitepaperMicrosoft Private Cloud
 
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...Mithi SkyConnect
 
Tsg mimecast-service-comparison-datasheet
Tsg mimecast-service-comparison-datasheetTsg mimecast-service-comparison-datasheet
Tsg mimecast-service-comparison-datasheetServium
 
Ppt Template
Ppt TemplatePpt Template
Ppt Templatepapdev
 
Ds security
Ds securityDs security
Ds securityServium
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5damonhough
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Preventiondkaya
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computingbenskjold
 
Panda Cloud Services
Panda Cloud ServicesPanda Cloud Services
Panda Cloud ServicesOzgur Gercek
 
Webinar - Which Email Archiving Strategy is Right for Your Business?
Webinar - Which Email Archiving Strategy is Right for Your Business?Webinar - Which Email Archiving Strategy is Right for Your Business?
Webinar - Which Email Archiving Strategy is Right for Your Business?Vaultastic
 
Delivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware EnvironmentsDelivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware EnvironmentsPaula Koziol
 
RapidScale CloudMail
RapidScale CloudMailRapidScale CloudMail
RapidScale CloudMailRapidScale
 
Seven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT BurdenSeven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT Burdenwebhostingguy
 
Seven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT BurdenSeven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT Burdenwebhostingguy
 
Seven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT BurdenSeven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT Burdenwebhostingguy
 
CTECH StackedDefense™
CTECH StackedDefense™CTECH StackedDefense™
CTECH StackedDefense™Alex Body
 

Similar a Mimecast Presentation (20)

Unified Email Management
Unified Email ManagementUnified Email Management
Unified Email Management
 
Microsoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services WhitepaperMicrosoft Forefront - Exchange Hosted Services Whitepaper
Microsoft Forefront - Exchange Hosted Services Whitepaper
 
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
How Cloud Email delivers security, reliability, and speed to Indian Oil Corpo...
 
Tsg mimecast-service-comparison-datasheet
Tsg mimecast-service-comparison-datasheetTsg mimecast-service-comparison-datasheet
Tsg mimecast-service-comparison-datasheet
 
Ppt Template
Ppt TemplatePpt Template
Ppt Template
 
Ds security
Ds securityDs security
Ds security
 
Lab Datareach Presentation V5
Lab Datareach Presentation V5Lab Datareach Presentation V5
Lab Datareach Presentation V5
 
Ironport Data Loss Prevention
Ironport Data Loss PreventionIronport Data Loss Prevention
Ironport Data Loss Prevention
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Panda Cloud Services
Panda Cloud ServicesPanda Cloud Services
Panda Cloud Services
 
Webinar - Which Email Archiving Strategy is Right for Your Business?
Webinar - Which Email Archiving Strategy is Right for Your Business?Webinar - Which Email Archiving Strategy is Right for Your Business?
Webinar - Which Email Archiving Strategy is Right for Your Business?
 
Back to Front Vision for Mithi's Collaboration Environment
Back to Front Vision for Mithi's Collaboration Environment Back to Front Vision for Mithi's Collaboration Environment
Back to Front Vision for Mithi's Collaboration Environment
 
IBM MQ v8 enhancements
IBM MQ v8 enhancementsIBM MQ v8 enhancements
IBM MQ v8 enhancements
 
Overview of Microsoft Exchange Online
Overview of Microsoft Exchange OnlineOverview of Microsoft Exchange Online
Overview of Microsoft Exchange Online
 
Delivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware EnvironmentsDelivering Modern Data Protection for VMware Environments
Delivering Modern Data Protection for VMware Environments
 
RapidScale CloudMail
RapidScale CloudMailRapidScale CloudMail
RapidScale CloudMail
 
Seven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT BurdenSeven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT Burden
 
Seven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT BurdenSeven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT Burden
 
Seven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT BurdenSeven Ways to Reduce Your 2009 IT Burden
Seven Ways to Reduce Your 2009 IT Burden
 
CTECH StackedDefense™
CTECH StackedDefense™CTECH StackedDefense™
CTECH StackedDefense™
 

Mimecast Presentation

Notas del editor

  1. Mimecast were founded in 2002 and spent the first couple of years heavily investing in research and development. Mimecast’s original founders are still at the helm of the company focusing the companies efforts on the company’s original goal – to provide a comprehensive Software-as-a-Service offering to solve all customer issues to do with e-mail. Mimecast is funded by private angel funders rather than venture capitalists, this allows Mimecast to focus on long-term scalability and services for its customers rather than being run to be acquired or go public. Mimecast is headquartered in London with offices in North America, South Africa and off-shore in the Cayman Islands. Mimecast maintains local infrastructure in all its locations and provides local timezone support. Mimecast was designed with scalability and performance in mind, the aim was to provide the scalability and redundancy of a carrier network with LAN-like performance. Every single day, Mimecast removes spam, rejects malware and archives millions of e-mails for thousands of customers. Mimecast focuses on e-mail and e-mail only. The aim of Mimecast since its inception has been to provide an end-to-end solution for all customer issues relating to e-mail – no matter how difficult they are to build and implement. Many other anti-virus and anti-spam vendors moved on to easier ways to make money such as Instant Messenging and Web filtering. Mimecast, in contrast, chose to build solutions for continuity, e-mail storage management, content filtration, directory harvest protection, data leak provention, e-mail branding and compliance – all from one platform, with one price and no hardware or software. Mimecast offers a comprehensive solution ‘in-the-cloud’ with the flexibility and configurability of local software. As a result Mimecast has customers in almost all vertical market segments. Mimecast is particularly strong in professional services, with over 35% of the top 100 law firms in the UK using our service. As you can imagine, lawyers are some of the most demanding customers in terms of due diligence and scrutiny of service level agreements. Mimecast maintains the world’s largest on-line archiver of e-mail, providing our customers with 24 x 7 access to their historical e-mail via the the Web or natively within Microsoft Outlook. E-mail is a changing environment, with new legislation to comply with, new ways of access the data and ever changing usage profiles. Mimecast constantly adds new features every quarter, rolled out free of charge to Mimecast’s existing customers. By buying Mimecast you not only solve your current issues, but you future proof yourself by already having a solution to solve issues you don’t even know you have yet. Mimecast’s simple one cost pricing module allows you to take the service and roll out the various unified features as you need them, with no additional cost.
  2. Mimecast provides organisations with every possible e-mail service apart from actually hosting the e-mail server itself. This frees an organisation from the burden of managing potentially dozens of disparate solutions, each with their own platform to update and patch, each with their own management interface to configure policy, users, groups and report from. Mimecast aims to solve all an organisation’s issues related to e-mail both now and in the future. Unlike Managed Service providers who OEM products from third parties and tie them together, Mimecast is based on custom built software components designed to work together in a cohesive manner. Due to this, Mimecast maintains strong chains-of-custody for each mail from when it is first accepted to decades later when it is purged from the archive. Mimecast uses a cryptographic algorithm and single instance storage to ensure that data is immutable and secure once stored. Comprehensive role-based access control and auditing further ensures a data’s confidentiaity. Mimecast is deployed as Software-as-a-Service, there is no hardware to continually upgrade and migrate data from and there is no software to deploy and patch. Mimecast can be deployed in a matter of hours, solving all of an organisation’s e-mail security, continuity and archiving needs. By reducing the number of platforms needed to support e-mail services – e-mail firewalls, denial of service protection, archiving software, hierarchical storage management, intrusion protection, disclaimer management, e-mail marketing, clustering, etc – Mimecast reduces the administrative burden and management costs. Mimecast is a single platform with a single interface.
  3. Mimecast supports 5 core operational areas: Security & Policy Continuity E-mail Storage Management Compliance & E-Discovery Data Leak Prevention & Content Filtration These services are provided from Mimecast’s carrier grade infrastructure based on multiple geographically dispersed data centres – each one containing a grid of hundreds of servers. These services are accessed over a secure connection through either a Web browser or from within a user’s Microsoft Outlook client – no need to retrain users or change the way they work.
  4. If we take a peek inside the Mimecast cloud…. Mimecast is built upon a series of modules there are designed from the ground up to work together in a cohesive manner. Incoming e-mail is run through a series of scanning engines, each of which return a confidence value to a centralised policy engine. This engine makes a decision based on the aggregate of the values from the scanners. This analysis happens ‘in protocol’ or ‘on the wire’ with the decision and rejection being made without even accepting the e-mail. An instant standards-based rejection is sent back to the send giving reasons for the rejection, this provides instant feedback as opposed to using quarantining where messages may sit in quarantine for several hours before being acted upon. This removes the burden of dealing with quarantine, provides instant feedback for time critical e-mails and reduces an organisation’s bandwidth utilisation. Some of the techniques Mimecast use to provide protection include: Local Reputation : Mimecast maintains a reputation index for each party you communicate with. Known good parties with good reputation can avoid future spam analysis (but will always be virus scanned). Each Local Reputation database is unique to each customer, allowing Mimecast to adapt to each individual customer’s e-mail profile. Global Reputation : Mimecast takes feeds about known bad communicating parties from the Local Reputation service and shares this information among Mimecast subscribers. This allows Mimecast to reject e-mails from these parties immediately, providing pre-emptive protection from attacks such as those from botnets. Firewall and Intrusion Prevention : Mimecast offers firewall and intrusion prevention capabilities to ensure malicious content is not propagated via e-mail. Mimecast intrusion prevention does deep application level analysis of all e-mail traffic. Directory Harvest Protection : Due to Mimecast’s tight integration with Active Directory, Mimecast is able to protect against directory harvest attacks. All e-mail to accounts that do not exist are immediately rejected. Sandbox : E-mails may contain malicious scripting or may attempt to take advantage of e-mail protocols, by using sandboxing Mimecast separates e-mails into its constituent parts. Each component is then examined in a ‘sandbox’ that is designed to identify malicious content. The e-mail is then reassembled to compare it against its original form to detect protocol anomalies. Anti-virus : Mimecast puts each external e-mail through multiple different commercial, open source and custom developed anti-virus engines. Once a policy engine accepts an e-mail, it is forwarded simultaneously to the organisation’s e-mail server and three separate geographically dispersed storage grids. E-mail between internal users on Microsoft Exchange servers are forwarded to the and three separate geographically dispersed storage grids using Exchange journaling.
  5. The Mimecast storage grid is spread across three geographically disparate data centres. Within each data centre commodity servers, each containing up to 4 processors and up to 8 750 Gb drives, work together in a similar way to RAID disks but contain both a storage and processing capability. Within Mimecast’s current data centres there are 63 rows of these stripes. An algorithm is used to distribute customer’s e-mail across as many different stripes to optimise the later retrieval of their data. Every e-mail entering Mimecast is stored striped across 9 different machines within 3 different data centres – ensuring optimum performance and multiple levels of resilience. The cost of maintaining the Mimecast storage grid is reduced by using commodity servers in a stripe, instead of using monolithic SAN-based storage, Mimecast is able to bring a new stripe on-line and migrate portions of the data within an impact on service quality. The Mimecast grid can be expanded horizontally by adding more servers to each stripe, or vertically by adding more stripes. All data within the Mimecast grid is cryptographically hashed and encrypted using AES 256 bit encryption. Each customer has a unique key known only to them, Mimecast maintains no interface to gain access to data stored on the grid. All transactions, including searches are recorded in a immutable audit log.
  6. As I mentioned earlier when explaining the processing grid, Mimecast security is provided ‘in protocol’ without the need for quarantine. Mimecast’s Local Reputation database ensures that legitimate e-mail from known good parties flow freely into your organisation. Mimecast offers a 100% virus protection SLA and no claim has ever been made under it. Due to Mimecast’s tight integration with Active Directory, Mimecast is able to protect against directory harvest attacks. All e-mail to accounts that do not exist are immediately rejected. Because Mimecast’s processing grid is based on a grid architecture designed to process dozens of millions of e-mails a day and reject malicious attacks in protocol, Mimecast protects organisations from e-mail borne denial of service attacks.
  7. E-mail is a mission critical application but is often not treated as such by the organisation. It is only when there is an outage that people realise how critical it has become. Employees, partners and customers like the asynchronous nature of e-mail, as well as the record of the communication and it remains the preferred method of communication for many people. Bounced messages increase the sender’s workload and increase their frustration. Bounced e-mails to partners and customers damages the reputation of your organisation – if you can’t keep an email server up can you build a good product/run a good service. In some industries, records must be kept of transactions. Often these are submitted via some form of e-mail workflow. Not being able to record these e-mails would breach this legislation. E-mail is often an intrinsic part of ordering workflow, orders that come in during downtime remain unfulfilled and the customer unsatisfied. Even worse they may be lost forever, pushing business to your competitors. With the rise of handheld e-mail devices and 3G data cards, downtime of a mail server is now more visible than ever. Even worse, now users can call you to complain from the very device they can no longer receive e-mail on. Even a short outage may generate dozens of calls to deal with at the time where IT departments should be concentrating on solving the issue. E-mail system are some of the most utilised servers within any organisation and require upgrading and patching. Continuity is important not just to handle unforeseen events, but also to continue to provide e-mail services while enabling IT departments to undertake serving of the mail platform without the need to do this at weekends or have to rushed to complete upgrades. Mimecast can provide service while you maintain your email service, automatically resyncing email to your server once it is back online – senders while not even notice the outage and your users need only click a different folder in Outlook. So how does Mimecast work in continuity scenarios?
  8. Mimecast provides several flexible ways to access your e-mail in continuity environments. Mimecast provides access to both incoming new and historical e-mail via a secure Web-based interface, users can read, forward and reply to incoming e-mail using nothing more than their Webbrowser. In fact, if you only use Microsoft Outlook Web Access for e-mail, Mimecast provides a more secure platform for remote Web-based e-mail as you remove the need to run an Internet Information Server with API connections back to your Exchange server from within your DMZ. What really separates Mimecast from all other continuity vendors is that we offer Mimecast + Services for Outlook – a plug-in for Microsoft Outlook 2003 and 2007, using Microsoft proprietary Exchange protocols (rather than other solutions that just render a Webpage within Outlook). This allows users to access incoming e-mail in continuity scenarios simply from within Outlook, users also have the ability to see and search all of their historical e-mail directly within Outlook – providing a bottomless mailbox with no hardware or software to manage. Users do not need to retrain users, or constantly retrain users, as they forget how to use complex multiple in-house software solutions – Mimecast provides access to your e-mail, old and new, in a way you know from within an application you know. If you ingest your existing PST files, you now have the ability to search any of your e-mail from within Outlook. Our experience is once you provide users with easy to use access to all of their historical e-mail their efficiency goes up as they can reuse their parts of previous work in their day-to-day work. Mimecast’s POP3 service always provides access to a rolling window of 110 days worth of e-mail from any standards-based e-mail client, from desktop to mobilee device. Mimecast continuity does not need to be invoked, it is always working 24 x 7, always on.
  9. So why pick Software-as-a-Service to provide e-mail storage management compared with doing this in-house? In house archiving is complex and involves multiple tiers of storage hardware (Fibre Channel Host Bus Adapters to connect servers to the Storage Area Network, Fibre Channel fabric switches, fibre interconnections between all of the components, disk arrays along with the disks inside, tape backup as well if the customer is implementing some form of hierarchical storage management), if redundancy is required for high-availability purposes this needs to be duplicated and interconnected in at least two sites. On top of the hardware, multiple tiers of software needs to be installed, managed and patched (Host Bus Adapter drivers, archiving software, Fibre Shortest Path First routing protocol on the Fibre Channel fabric, storage array management and reporting and hierarchical storage management software). It is very hard to plan what the required volume is for future e-mail storage, how many users will you have in two years, how large will e-mail attachments be in 2009, with this unpredictable growth what is the total volume of your e-mail store containing each aggregate year’s worth of e-mail in 2015? This normally results in businesses overspending on unutilised storage capacity or constantly having to add additional storage when space becomes tight. If the SAN is provided by a different business unit, you may have to go cap-in-hand continually to the SAN administrator to request additional space. The SAN may be shared with mission critical applications such as ERP and CRM, e-mail archiving needs to compete with these services for both space and utilisation of the SAN. Mimecast removes all of the tiers involved in archiving in house, every single e-mail coming into your organisation is archived automatically ‘in-the-cloud’, internal e-mails are automatically archived from Microsoft Exchange servers. The Mimecast storage grid provides unlimited high-performance storage on a massively redundant infrastructure. The biggest issue of all is caused by using an in-house solution to maintain a long term store of data….
  10. As we saw in the previous slide, in-house archiving involves lots of software and hardware. Archiving is a long-term issue, you may have the internal resources to manage all of this complexity now – but what about in 3, 6 years as we enter an economic downturn? Decisions made now will need to be justified over the entire lifecycle of the archiving project – we is typically endless and continually rolling. A typical life of storage hardware is 3 or 4 years, so in a 7 year retention scenario the data will need to be initially migrated onto the archiving solution, then migrated every 3 years – 3, 6, 9, 12, 15 ….. eternally. As well as migrating the physical bits from one storage platform to another, the format of the data needs to be converted to support the latest version of the messaging platform, the archiving product, the storage management software, etc. So a 7 year retention period has a continual management over head which massively increases every 3 – 4 years with a large capital expenditure to renew the storage hardware, add to this the significant impact of having to migrate the data from one platform to another. There has to be a better way…
  11. With Mimecast your data is archived automatically, no hardware and no software to renew, no data to migrate, with one fixed cost. Mimecast is designed to perform and offer the same granular configuration as an in-house solution. The Mimecast archiving solution is designed to work as a part of the Mimecast Unified E-mail Management portfolio – providing strong chains-of-custody on immutable storage. Mimecast is able to ingest e-mail from your existing e-mail server or existing .PST files, providing an instant centralised searchable store. By reducing the size of inboxes stored on e-mail servers increases their performance and responsiveness. Users continue to use their Outlook clients, with their historical e-mail appearing as a folder. Users can search across decades of e-mails, including inside attachments, at speeds rivaling or exceeding those of data stored on a local SAN.
  12. Mimecast provides instant compliance for a whole host of legislative compliance and internal governance requirements. The ability to maintain proper records of e-mails is critical not just for compliance, but also for mounting prosecutions or organising a defence from a prosecution. Often, in our continually increasingly litigious society it is often the party that has the strongest evidence that wins a legal action. Having evidence with better chains-of-custody than the opposing side can curtain months of costly and disruptive legal action. Mimecast looks after every e-mail during its entire life – from the moment a connection is negotiated with the sending server to the moment you choose to purge the data from the archive. Each part of the Mimecast platform is designed to tightly integrate with the other components, this combined with rule-based access control, forensic level auditing and the use of an immutable storage platform ensure the integrity of any e-mail stored within Mimecast is rock-solid.
  13. The reality of trying to deploy email retention solutions for compliance or other means usually differs wildly from the ideal. Retention is just one aspect of running a successful messaging platform – throughput, availability, usability, blocking of inappropriate or dangerous content all have their part to play. In typical environments these functions are achieved by the use of several independent point solutions, often manufactured by different vendors. All of these point solutions can act on the incoming and outgoing messages independently of one another. Most of these point solutions are not designed with retention in mind and no provision is made within them to retain both the original message acted on and the result of the action. So often within email archives we have a message retained that bears no resemblance to the one originally sent, making its use as evidence limited. Another issue of using several point solutions is it is very hard to integrate the requirements of security, continuity and retention. Almost certainly organisations will incorporate e-mail systems into business continuity plans, but will fail to provision comprehensive security and retention solutions in the event of invocation. Thus when an organisation invokes, the organisation’s threat profile increases and they breach compliance regulations. The cost of ongoing management of several different point solutions, each with different user interfaces and platforms, can be significant. The typical three or four year lifecycle for appliances and hardware requires a constant migration of data onto the new platforms while trying to maintain the availability and integrity of the data retained.
  14. Mimecast is committed to continually pushing the boundaries of what a Software-as-a-Service company can offer with regards e-mail solutions. Mimecast is the first vendor to offer any kind of true data leak prevention in the cloud. Mimecast content filtration policies can filter inappropriate from both entering and leaving your organisation. Mimecast data leak prevention aims to stop internal content leaving the organisation, or restricting the transmission to approved partners or via encrypted links. Mimecast doesn’t like to tout features that it does not have in the market, but Mimecast’s commitment to data leak prevention means we don’t mind talking about some of the features you’d see as a Mimecast customer over the next couple of quarters. Remember this additional functionality is rolled out free of charge to existing Mimecast customers. Weighted dictionaries allow organisations to allocate specific values to words or phrases, each e-mail are then through rules that check whether thresholds for the aggregate value of each dictionary have been met. The ability to search phrases, as well as individual words, massively increases the context of the content. Intelligent Identifiers put known patterns through several layers of analysis to distinguish known types of content – such credit card numbers for PCI compliance, Social Security numbers for HIPAA compliance and UK National Insurance numbers. The multiple levels of analysis including length, pattern, proximity, known starting values and checksuming aim to eliminate false positives. Moving forward, Mimecast will launch a plugin that can be installed on fileservers that will crytographically hash each document stored and take note of the directory structure. Policy can then be set within Mimecast to prevent the leakage of documents from particular directories, ensure documents for other directories are only sent to specific parties or ensure that documents from another directory are always sent in an encrypted format.