2019 State of Email Security Report
Actionable steps to improve your organization’s email security and cyber resilience.
Organizations need a service that enables and controls how sensitive data is delivered to external contacts via email. It needs to be simple and intuitive for both the sender and recipient, require minimal IT engagement, while remaining in the data owner’s controls.
Certain communications or files are so sensitive that delivering them via email using the open, public internet is unacceptable. However, employees generally want to use their email to deliver and receive all their communications and files, whether sensitive or not. They don’t want to learn another application and be forced to switch between systems to conduct business. Furthermore, employers don’t want more complexity and cost associated with more third-party services.
What organizations need is a secure messaging service built directly into their email system that provides security and control over-and-above that which is provided using traditional email encryption, such as TLS.
Mimecast Secure Messaging Service provides:
A secure, cloud-based messaging service that enables the sharing of sensitive information and files initiated directly from within the employee’s email client.
Easy message and file access via a secure web portal hosted by Mimecast.
More complete protection than just using server-to-server encryption, such as TLS, providing security all the way to the receiver.
Fully-customizable to ensure brand recognition and to enhanced recipient confidence.
Granular message controls covering message recall, expiration, automated read receipt, print and reply/forward control, which is applied by the sender or enforced using policies.
Employee initiated Secure Messaging via Mimecast for Outlook, Mimecast Personal Portal, the Secure Messaging Portal directly, or via the Mimecast mobile application.
Mimecast Secure Messaging securely delivers sensitive communications and files directly from the employees’ email client eliminating the need to use costly third-party applications and to train users on these external systems.