Successful organizations rely on Mimecast's 3.0 Email Security approach and comprehensive cybersecurity, resilience and compliance platform to protect email, data, users and web.
Keep your customers safe from evolving cyber threats by leveraging Mimecast’s proven email, web, awareness training, data protection and uptime assurance. Become the trusted advisor for your customers.
We know that successful customers don’t just require great products but also training, education and flawless implementations. That’s why we’ve created the Legendary Customer Success program because we want our customers to be legends.
Mimecast is a cybersecurity provider that helps thousands of organizations worldwide make email safer, restore trust and bolster cyber resilience. Mimecast helps organizations stand strong in the face of cyberattacks, human error and technical failure.
Here are a few questions you should read and consider to ensure you have the technical capability, or know someone who does, to make sure your Mimecast Implementation runs smoothly.
Do you have access to your DNS provider with knowledge of and comfort with creating/updating TXT and MX records (with potential for needing other records [A, CNAME] depending on details uncovered during implementation)? If not, is there someone you can go to who can perform this function for you
Do you have access to your Directory Service (i.e. Azure / Active Directory) with knowledge of and comfort with creating service accounts, updating security permissions or an understanding regarding certificates and their installation should you require it? If not, is there someone you can go to who can perform this function for you?
Do you have access to your email environment with knowledge of and comfort with current and legacy email routing and/or Journaling configurations? Understanding your current configuration is crucial to ensure how any new changes may impact previous settings. If not, is there someone you can go to who can perform this function for you?
Do you have access to your firewall configuration with knowledge of and comfort with current and legacy firewall configurations? Understanding your current configuration is crucial to ensure how any new changes may impact previous settings. If not, is there someone you can go to who can perform this function for you?
What is your timeline to implement? If applicable, what is the status of your current vendor’s contract? Is it expired or about to expire, if so, can you extend it to ensure there is no gap in your security?
When do you need your onboarding to be completed?
Who are your primary contacts and do you have their contact information ready (Full Name, Phone Number, and Email Address)?
Have you decided who should be the main contact throughout your implementation? Inaccuracies here can lead to delays in the RFI process and kickoff.