Mimecast Adds New Continuity Features to Monitor, Alert and Respond More Quickly to Mail Flow Disruptions
In a recent global survey of 600 IT decision makers, Mimecast found that 88% view email as critical to their organization with 55% saying email is mission-critical. This isn’t surprising; email is often the first thing we check in the morning and the last thing we check before going to bed. Any email disruption can bring productivity to a screeching halt—severely impacting customer service, preventing new sales, and impacting day-to-day operations.
Mimecast is pleased to release new Continuity Event Management features designed to ease the challenges of identifying, diagnosing and responding to mail flow problems on Microsoft Office 365™, Microsoft Exchange™ or G Suite by Google Cloud™. When every second counts, Mimecast reduces the time to respond to email disruptions so organizations can avoid the problems caused when this critical infrastructure isn’t working.
Mimecast Continuity Event Management features enable administrators to:
Monitor –Mimecast monitors for high latency and failed deliveries, both inbound and outbound, so admins stay on top of potential issues.
Alert – Organization specific thresholds for mail flow give administrators the ability to tailor when they are notified. Once a threshold is met, an automated alert is generated and sent via SMS or to an alternate email address. Administrators are alerted to problems on any device, anywhere.
Respond – A fast response continuity event portal provides the administrator with key metrics on the mail flow problem and gives details to quickly assess the severity of the problem. One-click activation starts continuity, with Mimecast sending and receiving email until the primary system can be recovered independently. An SMS message to employees reduces manual tasks and ensures the employee base follows company procedures.
Whether your organization operates on-premises, from the cloud or in a hybrid environment, problems still do occur. By analyzing customer data, Mimecast finds that 11% of detected outages were due to server or service issues that lasted 24 hours. Another example is the June 30, 2016 mail disruption of Microsoft Office 365™ which lasted for over nine hours on the last day of the month and last day of the quarter across most tenants in the United States.
No company can predict when a mail flow problem will arise and as the Office 365 incident points out, any disruption during a critical time can have widespread consequences. With the new features, available March 2017, Mimecast makes it easier to detect and manage mail flow disruptions.
Learn more about Mimecast’s leading Mailbox Continuity service and new event management features.
A recent survey confirms that Microsoft Office 365 continues to outpace Google’s G Suite in the race to the cloud. Overall it’s clear that more organizations are using cloud or hybrid deployment models over on-premises, but let’s dig into the survey results.
Let’s start with the Bitglass Cloud Adoption Report, which is in its third iteration, for some context into how things have changed over the years. In 2014, the report found that 16% of organizations were using Google Apps for Work (now rebranded G Suite). At that time, only about 8% were found to be on Office 365. Google at that point had a 2X lead on Microsoft! Since then, the picture has changed dramatically. In 2015, Office 365 closed the gap and squeaked past to take a 25% to 23% lead. The ’16 report saw that lead extend as Office 365 now controls a commanding 35% to 24% advantage. Bitglass says this report was created using an internally-developed tool that analyzed over 120,000 companies.
We’ve also heard that cloud adoption is progressing faster than industry experts originally expected. In the spring of 2016, Redmond Magazine reported on a recently completed Gartner survey showing Office 365 was either in use or planning to be used in the next six months by 78% of respondents. This is up 13% from two years ago when the survey was run last. What’s interesting is that the use of Exchange on-premises only dropped by 5%, with most feeling that hybrid environments will remain popular and persist well into the future.
It’s no surprise to hear that Office 365 continues to gain ground and extend their advantage in corporate accounts. I’ve referenced before that Office 365 adds 50,000 customers a month and as of June 2016, that was true for 28 straight months! What’s more, the service has been growing by about 40% year-over-year and looks poised to top 120 million corporate users by this time next year. Interested in learning more about how organizations are managing risk while moving to the cloud? Check out this market trend report by Microsoft MVP J. Peter Bruzzese titled, Resetting Your Expectations on Office 365.
Mimecast is pleased to announce the general availability of the Data Logging Application Programming Interface (API) and Splunk application. The API allows customers and partners to integrate data to their security information and event management (SIEM) or data analytics platform of choice to help identify current email vulnerabilities in their organization and defend against future cyber threats.
SIEM platforms have grown quickly as organizations seek to ease compliance reporting, improve incident detection and more efficiently remediate events. Splunk is one of the most popular and fastest growing SIEM platforms, allowing users to quickly add new data and drive value with numerous applications accessible from SplunkBase. Using the Data Logging API, Mimecast created an application to give organizations that use Splunk a seamless way to add and analyze email information.
Benefits for Customers and Partners
- Consolidate and centralize security investigations and reporting, making it more efficient for the security team.
- Improve threat detection and investigations by integrating Mimecast logged data with the data from other security systems and IT infrastructure within a single security monitoring system such as Splunk or any other SIEM system.
- ‘Out of the box’ Splunk reports for email, the most widely used attack vector. Easily index and visualize Mimecast data with no development and little Splunk experience required. Getting Mimecast data into Splunk is as easy as installing the application and filling out a short web form. No coding or scripting is required.
Mimecast customers can download the application and begin using the Splunk application to manage email data. For those that want to integrate Mimecast data without Splunk, the Data Logging API provides an open standard to combine email data with other information. For more details, customers and partners can access the Mimecaster Central Developer Community at https://community.mimecast.com/community/developer.
It’s no secret that social engineering attacks, like phishing, spear-phishing and domain spoofing have grown from being a nuisance to a colossal problem. But, perhaps the most colossal problem of the moment is Business Email Compromise, otherwise called CEO fraud or whaling.
Whaling attacks can cost companies millions in financial losses. In fact, according to the U.S. Federal Bureau of Investigation, whaling attacks led to more than $2.3 billion in losses over the last three years. Cybercriminals are able to pull off these deceptive scams by posing as a CEO, or other executive, sending an email asking the unsuspecting target to initiate a wire transfer or send payroll and other sensitive data.
It’s time to protect your organization from whaling attacks. This means you must get to know the ‘5 Phases of a Whaling Assault’ so you can both educate your employees and increase your technology defenses. They are:
- In the Crosshairs: In the first stage of an assault, fraudsters use social media networks to gather intel on their target.
- The Domain Game: Next, armed with just enough detail, they register a domain similar to the actual domain for the target company.
- Gone Phishing: An employee receives the phishing email, but doesn’t notice the subtle warning signs that it’s fraudulent.
- Victim’s Assistance: The target follows the call-to-action in what appears to be an authentic email from someone familiar.
- On the Money: But, it’s not authentic. The attacker now moves the funds from the fraudulent bank account or has sensitive employee information like W-2 forms and social security numbers that are used in a larger scam.
Are you ready to take action against whaling? Download: “Whaling: Anatomy of an Attack” to learn more, including why whaling works, examples of recent high-profile attacks, and ways to defend against whaling fraudsters.