Successful organizations rely on Mimecast's 3.0 Email Security approach and comprehensive cybersecurity, resilience and compliance platform to protect email, data, users and web.
Keep your customers safe from evolving cyber threats by leveraging Mimecast’s proven email, web, awareness training, data protection and uptime assurance. Become the trusted advisor for your customers.
We know that successful customers don’t just require great products but also training, education and flawless implementations. That’s why we’ve created the Legendary Customer Success program because we want our customers to be legends.
Mimecast is a cybersecurity provider that helps thousands of organizations worldwide make email safer, restore trust and bolster cyber resilience. Mimecast helps organizations stand strong in the face of cyberattacks, human error and technical failure.
Matthew Gardiner is a Director of Enterprise Security Campaigns at Mimecast and is currently focused on email security, phishing, malware and cloud security. With more than 15 years focused in security, Matthew’s expertise in various roles includes threat detection & response, network monitoring, SIEM, endpoint threat detection, threat intelligence, identity & access management, Web access management, identity federation, cloud security, and IT compliance at RSA, Netegrity, and CA Technologies. Previously he was President and a member of the board of trustees of the security industry non-profit, the Kantara Initiative. Matthew has a BS in Electrical Engineering from the University of Pennsylvania and an SM in Management from MIT's Sloan School of Management.
From a CISO’s perspective: Why the Carbon Black acquisition is potentially good news and the Symantec one is not.
The following is an op-ed from Matthew Gardiner, Director, Enterprise Security Campaigns
The recently announced acquisitions of S…
Practical Advice for Advancing Your Security Programs
What do threat intelligence, securing Office 365, brand spoofing, internal threats, human error, employee risk scoring, cyber insurance, web security, and cybercrime investigations have in common…
Mass market vs. targeted marketing: Techniques and technology behind these two strategies
Do cybercriminals have different go-to-market strategies? Does this strike you as a weird question to ask? Don’t only legitimate organizations have marke…