Targeted Threat Protection

Defend the company with real-time protection from spear-phishing and advanced threats

Your company and employees are targets for sophisticated email attacks designed to steal credentials, customer data and valuable intellectual property.

Mimecast Targeted Threat Protection extends traditional gateway security to defend against malicious links in email, weaponized attachments and malware-less social-engineering attacks, often called whaling – the three most common attack methods. Real-time scanning and blocking of suspect websites and attachment sandboxing prevent employees from inadvertently downloading malware or revealing credentials and the detection of suspicious financial fraud emails. Dynamic user awareness capabilities reinforce email security policies and engage employees in assessing risks. Improve frontline security protection against sophisticated spear-phishing and other advanced attacks with Mimecast S1 or integrated service bundles M2 or M2A.

Instant Protection from Malware-less Social Engineering Attacks like Whaling

  • Advanced protection against malware-less attacks in email – like the latest whaling, CEO fraud and business email compromise.
  • Real-time scanning of all inbound emails to detect anomalies in the header, domain information and body content that could point to financial fraud or social engineering.
  • Prevent employees from being duped into making fraudulent wire-transfers by using Impersonation Protect to mark or quarantine suspicious messages.
  • Simple policy control and reporting that assist security specialists in monitoring attempted attacks.

Download the Targeted Threat Protection – Impersonation Protect datasheet

Next generation protection from malicious URLs

  • Advanced protection against targeted attacks and spear-phishing – anytime, anywhere, any device – for peace of mind from evolving and emerging threats
  • Real-time scanning of all URLs within incoming and archived emails on every click to shield you from immediate and delayed attacks
  • Dynamic user awareness reinforces security policies and highlights high risk situations for improved protection 
  • Simple policy control, administrative dashboards and reporting that assist security specialists in monitoring and reporting on attempted attacks

Download the Targeted Threat Protection – URL Protect datasheet

Comprehensive defense against weaponized attachments

  • Flexible attachment protection options allowing administrators to choose the best mix of  email solutions for safety, performance and functionality
  • Pre-emptive sandboxing security checks on attachments before they are delivered to help prevent exposure to malware
  • Safe attachments are delivered without traditional sandboxing delays through file conversion with on-demand sandboxing, helping maintain employee productivity
  • Protection on and off the corporate network, including mobile devices

Download the Targeted Threat Protection – Attachment Protect datasheet


Countdown to Compromise: The Timeline of a Spear-Phishing Attack

A day-by-day look at how an attack on your company will play out Spear-phishing is one of the most dangerous …


White paper: Email Security in a Zero Trust World

To tackle today’s cyber threats, IT security leaders must rethink traditional security strategies. Email …

Forrester Webinar - The Human Firewall

Forrester Webinar - The Human Firewall

How to protect against spear-phishing and targeted attacks

How to protect against spear-phishing and targeted attacks