July 12, 2016
At Mimecast, delivering the best customer experience is at the heart of everything we do. Whether before becoming a customer or when using our services, our mission is to meet and exceed customers’ needs and make the experience easy and enjoyable.
The Mimecast Administration Console allows customers to manage all aspects of their Mimecast service from a single web-based console, including security, Targeted Threat Protection, Archiving and Mailbox Continuity. It underpins the simple, fast and effective email risk management we deliver to our customers. That’s why I’m thrilled to announce the general availability of the first of a series of improvements we are making to our Administration Console.
For now, let’s talk about phase one of this upgrade. This first phase delivers a complete revamp of the top-level navigation and improvements to the service dashboard. These enhancements make managing Mimecast services even easier and more intuitive.
1. Menu Structure:
The top-level menu is more simple and intuitive for easier navigation.
Bookmark your 10 favorite items for quick access from the main screen.
3. Mimecaster Central Search:
Search our customer community and knowledge base from directly within the console.
4. New Contemporary Dashboard:
A redesigned dashboard features a cleaner layout making it easier to see what’s important.
5. Notification Feed:
A scrollable list of service status notifications and product news.
Easily go back to what you were doing with clickable recent history links.
This will be the second Infosecurity Europe since its return to Olympia last year. We've been regular exhibitors at the premier European security show for years and been part of an era of fundamental changes in the security industry. Let’s take a look at some key things to watch at this year’s Infosec 2016. I’ll cover patterns in the program, speakers to watch for and some highlights of what to look for in the Mimecast booth!
Patterns in the Program
A quick glance at the speaker programme shows that this year, a pattern is already emerging - a widening of the description of a cybercriminal. What once was just the traditional hacker in a darkened basement has changed to a completely different variant, urging all those who control the security of their companies to think ahead of the next hack. Attacks can now come from governments (think Stuxnet), from bored teens (Talk Talk) or from anyone with a credit card and the motivation to rent a botnet. Cybercrime is big business and the continuing upward spikes in ransomware (complete with support helpdesks to assist with payments) highlights how criminals are adopting legitimate business practices to increase their effectiveness.
Speakers to Watch
Speaker slots I'm personally looking forward to include 'Profiling the Connected Cybercriminal' by Mikko Hypponen from F-Secure, who has recently published some interesting posts on the Infosecurity Europe blog, and 'How to Hack a Human; Anatomy of a Social Engineering Attack' by Dr Jessica Barker.
Highlights & Prizes
I'll also be at our ‘Making Email Safer for Business’ stand (#G100) talking about the growing threat of spear-phishing and email impersonation attacks. On our stand, everyone can walk away with RFID protection cards and ‘Snap out of it’ swirly glasses. We’ll also have regular stand presentations from Microsoft Exchange and Office 365 MVP J. Peter Bruzzese – where he’ll be exploring the risk factors you’ll need to consider when moving to Office 365. Plus, we’ll be running through demonstrations of our services on the stand - to book a demonstration with one of our technical team, you can request one here.
Also, you can enter your details into our draw to have a chance to win a pair of Ray-Bans (T&Cs here) and if you publish selfies with our #AddMimecast frame you can be in with a chance to win an iPad Air 2.
Or if you fancy a more informal setting, we’ll be serving drinks at our stand between 4:00-5:30pm on Tuesday, the 7th of June. In addition, on Wednesday the 8th of June between 5:00-7:00pm we’ll be hosting a CIO & IT Professionals drinks reception in the Millennium Gloucester Hotel, London – registration is available on this microsite.
I for one can’t wait to see all of my peers, colleagues, partners and customers this year – it looks set to be a pivotal event for the Infosecurity world again - see you next week!
Last week we saw two of the most important occasions in our UK channel world – this year’s UK Mimecast Partner Awards and CRN Fight Night 2016. This time, we were proud to sponsor fight night along with other tech brands such as AMD and Trend Micro.
And we were pleased to cheer on our fighter Lenny 'The Lone Wolf' Bowers, who secured a well-earned draw, going the full three rounds. Congratulations to Lenny - all the training and dedication paid off, and I can say, as I was next to the ring, it was a heroic performance.
Softcat won Premier Partner of the Year, recognizing it generated the highest revenue in the last year and demonstrated exemplary dedication to its partnership with Mimecast.
The Mimecast Partner Awards were held just before the fight and were equally as exciting. Five winners were announced in total (detailed at the end of this post) and some exclusive material was previewed by Mimecast.
Alan Kenny, GM Europe, and I provided an overview of the UK channel strategy to partners, which includes a new and larger Mimecast team to support partners as well as some partner program updates that will help increase deal conversion and protect partner’s Mimecast customer base.
Also, Alex Bender, Senior Vice President of Global Marketing explained how Mimecast would be positioning our brand this year.
We also lifted the lid on the expanded range of products on offer from Mimecast this year and heard from our CTO, Neil Murray, about the evolution of our technology platform which delivers our services.
The reaction and engagement we get from the Partner Awards always highlight how honored we are to have a large and highly committed partner channel in the UK…thank you to our partners from me and all of the UK team at Mimecast!
Mimecast Partner Awards 2016 Winners
Premier Partner of the Year: Softcat
This is the premier award and recognizes the partner that has generated the highest revenue in the last year and demonstrates exemplary dedication to its partnership with Mimecast.
Growth Partner of the Year: Bytes Software Services
This award goes to the partner that has achieved the highest level of growth.
Champion of the Year: Dean Zachariades, CDW
This goes to the individual within a partner organization who has demonstrated strong support for Mimecast’s technology and is responsible for securing significant customer results.
Customer Excellence Partner of the Year: IT Lab
This is for the partner that has shown unrivaled dedication to customer service excellence.
Technical Services Partner of the Year: Sprout IT
This award recognizes the partner with exemplary levels of technical proficiency and customer assistance on Mimecast’s services.
Surely everyone changed their LinkedIn credentials in 2012, when the LinkedIn hack was made public right?
Furthermore, most users would have doubled down on their credential security - changing their passwords to something complex and perhaps using a secure service like LastPass to manage those credentials securely, right?
LinkedIn confirmed last week that more than 100 million members' email and password combinations stemming from a 2012 data breach have been posted online.
So when LinkedIn confirmed last week that more than 100 million members' email and password combinations stemming from a 2012 data breach have been posted online, the natural question is 'why bother'?
As I pointed out to CNET this week, it's no longer the credentials themselves which have value (although there might be a few laggards who still haven't changed their passwords). It's the fact that cybercriminals now hone in on a target by building very accurate pictures of companies and employees ripe for targeting. Also, as I discussed with Computing in March, LinkedIn is now the principle super market for enterprise hacking intelligence - a front door for hackers.
Once the overall picture of an organization is complete, the email account of the target be it personal or professional becomes the Holy Grail for the attackers. Suddenly the penny drops…Peace, who according to a story from Vice's Motherboard is trying to sell the credentials for about $2,200 in bitcoin is actually selling the email addresses.
And I'm sure he or she will sell the information in no time at all - because who thought it was important to change their password and email address in 2012? Not many.
Aside from the immediate damage of social engineering-based attacks, the damage will really be felt by organizations who've been hacked over the last few years and are high-value targets in general. What this action has done is highlight the long-tail value of hacking - inspiring cybercriminals to re-harvest old hack data and inspire more audacious attacks in future as the financial incentive has been boosted further still.