Successful organizations rely on Mimecast's 3.0 Email Security approach and comprehensive cybersecurity, resilience and compliance platform to protect email, data, users and web.
Keep your customers safe from evolving cyber threats by leveraging Mimecast’s proven email, web, awareness training, data protection and uptime assurance. Become the trusted advisor for your customers.
We know that successful customers don’t just require great products but also training, education and flawless implementations. That’s why we’ve created the Legendary Customer Success program because we want our customers to be legends.
Mimecast is a cybersecurity provider that helps thousands of organizations worldwide make email safer, restore trust and bolster cyber resilience. Mimecast helps organizations stand strong in the face of cyberattacks, human error and technical failure.
Steven Malone is Director of Security Product Management.
Having joined Mimecast in July 2013, he is tasked with defining and bringing the security product roadmap from vision to reality. Steve works closely with the all areas of the organization to bring new security products and services innovations to our customers.
Steven is a passionate advocate for security in technology. Prior to joining Mimecast, he held senior roles in the security channel and also technical positions in a number of global organizations.
WannaCry ransomware is a wake-up call for organizations and governments around the world.
This on-going cyber threat will continue to adapt to take advantage of weaknesses in IT systems and procedures. New variants of this malware may cause even more…
Whaling, CEO Fraud and Business Email Compromise pose many risks to organizations around the world.These email attacks use simple social engineering with eloquent affect to trick employees into handing over critical data or into making fraudulent fin…
Malicious email attachments are a critical threat to businesses as they can easily bypass existing defences as part of sophisticated spear-phishing attacks. For example, a macro in a Word document could run when the file is opened and deploy malware …