Mimecast Plans

    Get started with Microsoft 365 Protect Plans

    Mimecast offers comprehensive, affordable and multi-layered email security and resilience solutions, purpose-built for dramatically enhancing Microsoft 365 work environments.

    small-business.png

    Small Business

    commercial-enterprise.png

    Commercial & Enterprise

    365-icon.png

    Microsoft 365 Protection

    365 Protect Plan

    Most Popular
    • Secure Email Gateway
    • Targeted Threat Protection
    • Browser Isolation
    • Internal Email Protect
    • CyberGraph

    Key Benefits:

    • Safeguard your organization against the #1 attack channel
    • Prevent lateral and external spread of threats
    • AI powered anomalous sender warnings
    • Contextual bannering to highlight cyber risk and remediation
    • Protect against credential phishing and malicious file download by rendering sites read only

    365 Protect Plus Plan

    Most Popular
    • All 365 Protect Plan Features
    • Continuity
    • Sync & Recover

    Key Benefits:

    • Safeguard your organization against the #1 attack channel
    • Prevent lateral and external spread of threats
    • AI powered anomalous sender warnings
    • Contextual bannering to highlight cyber risk and remediation
    • Protect against credential phishing by rendering sites read only
    • Maintain productivity during cyber disruption
    • Quickly recover and prevent data loss

    Zone 1 – At Your Perimeter

    365 Protect Plan

    365 Protect Plus Plan

      Secure Email Gateway
     
     
    Anti-Virus and Anti-Spam Comprehensive protection delivered via multi-layered engines with an optimum mix of proprietary and best of breed third-party technology
     
     
    Data Loss Prevention Protect your sensitive and confidential information from accidential or intentional exposure with fine grained policy controls
     
     
    Signature Disclaimer & Management Achieve consistency in all email communications with email signature and disclaimer management based on Active Directory credentials
     
     
    End User Productivity Applications Boost your employee productivity with self-service security, email and archive access features with apps built for Outlook, mobile, Mac and Web
     
     
    Intelligent Email Routing Support complex on-premises, cloud or hybrid email environments and achieve rapid email system integration or separation associated with a merger, acquisition or divestiture
     
     
    Threat Intelligence Gain insight into threats targeting your tenant with the Threat Intelligence Dashboard or use our Threat Intelligence API to feed threat data into a third party tool of your choice
     
     
    API (Application Programming Interface) Create an extensible architecture for complete visibility and efficiency by integrating Mimecast with your current or planned IT solutions
     
     
      Targeted Threat Protection
     
     
    URL Protect Protect your organization and employees against malicious websites containing malware, phishing and other threats through URL rewriting and on-click deep site inspection
     
     
    Attachment Protect Defend against infection from weaponized attachments often used in ransomware, keylogger, trojan and spyware attacks with multi-layered inspection including static and dynamic analysis
     
     
    Impersonation Protect Comprehensive protection against social engineering attacks like Business Email Compromise, CEO fraud and phishing targeting your employees
     
     
      Browser Isolation
     
     
    Safely Click Embedded Links Protect from credential phishing by rendering phishing sites read only and eliminate patient-zero malware infections by executing downloaded files in an isolated container
     
     
    Rapid, Safe Incident Investigation Provide security analysts with a safe, isolated environment to investigate suspicious URLs to help reduce complexity and time to respond, contain and remediate threats
     
     
     

    Zone 2 – Inside Your Perimeter

      Internal Email Protect
     
     
    Internal Email Protect Prevent the deliberate or unintentional spread of attacks internally and outbound, including automatic or manual remediation of files or emails post-delivery
     
     
    Threat Remediation Continuous monitoring of lateral and outbound email using the latest intelligence with automatic or manual remediation of files or emails post-delivery
     
     
      Awareness Training
    Optional
    Optional
    Core Infosecurity Change behavior and lower organizational risk with persistent, engaging security awareness training. Help make employees part of your defense against web and email attacks, data loss, and other security threats
    Optional
    Optional
    Phishing Simulations Test employee susceptibility with realistic phish tests. Phishing simulations are integrated with core training, making it easy to deploy reinforcement of training concepts based on test response
    Optional
    Optional
    Risk Scoring Identify your riskiest employees so you can focus precious time and budget supporting the employees who need it most. Benchmark aggregate company score against other organizations in your industry to gauge your overall risk posture
    Optional
    Optional
    Custom Content Enhance existing modules with supplemental training material or create your own module for training needs unique to your organization
    Optional
    Optional
    Targeted Training Deploy additional training to employees who need it most. Create custom lists based on training performance, phishing simulation response or risk score so you can assign and send additional modules or conduct other types of training or remediation
    Optional
    Optional
    HIPAA Modules Supplement core information security training with modules covering issues specific to the Health Insurance Portability and Accountability Act (HIPAA)
    Optional
    Optional
      CyberGraph
     
     
    Email Tracker Protection Stop intended targets inadvertently disclosing critical information that could be used in a social engineering targeted phishing attack
     
     
    Machine Learning and Identity Graph Detect sophisticated, highly targeted email threats by identifying anomalies in sender and recipient behaviors that could be indicative of a malicious email
     
     
    Dynamic, Contextual Banners Engage users with color coded banners that indicate the nature of any risks associated with suspicious emails and solicits their views to strengthen protection
     
     
     

    Zone 3 – Beyond Your Perimeter

      DMARC Analyzer
    Optional
    Optional
    360 Degree Visibility & Governance Easy to use reporting and forensics that let you see and analyze who is sending email on your behalf to identify legitimate versus fraudulent senders
    Optional
    Optional
    Assisted DMARC Enforcement Self-service email intelligence tools, guided workflows and wizards designed to reduce the time, effort and cost of enforcing a DMARC policy to stop domain abuse
    Optional
    Optional
      Brand Exploit Protect
    Optional
    Optional
    Proactive Threat Hunting Harness artificial intelligence and machine learning to scan quadrillions of web addresses to find webistes spoofing your brand, even before they become live attacks
    Optional
    Optional
    Web Detection Agent Discover if your website has been scraped and cloned anywhere on the internet
    Optional
    Optional
    Remediation Initiate a rapid takedown of suspicious or active sites while protecting your employees by blocking URLs and domains across both Mimecast's Email and Web Security services
    Optional
    Optional
     

    Resilience Extensions

      Email Continuity & Recovery
    --
     
    Sync & Recover Continuous synchronization of email that ensures an email or entire inbox can be recovered following an attack, breach or user error
    --
     
    Email Continuity Allows the organization to continue to communicate internally and externally during any planned or unplanned email service downtime with a 100% SLA on email availability
    --
     
      Web Threats & Shadow IT
    Optional
    Optional
    Web Security - Malicious Site Defense Protect your employees and guests from accessing malicious sites with comprehensive category and security policy controls
    Optional
    Optional
    Web Security - Acceptable Use Enforcement Control what content is accessible by your employees and guests by enforcing acceptable use policies through 80+ granular category filters
    Optional
    Optional
    Web Security - Application Visibility & Control Help mitigate shadow IT risks with full visibility of what cloud applications are being used. Then monitor, sanction or block access to all or groups of employees
    Optional
    Optional
    Web Security - Intelligent Proxy Ensures deeper inspection of suspicious sites, including file downloads, by inspecting this traffic via a proxy and applying additional checks including anti-virus and static file analysis
    Optional
    Optional
    Web Security - On Network Protection Protection is automatically applied for all web requests originating from employees or guests on your network
    Optional
    Optional
    Web Security - Protect Guest Wifi Network-level controls help reduce legal and compliance risks by preventing access to malicious sites and blocking inappropriate content for visitors, customers and anyone else using your guest Wi-Fi networks
    Optional
    Optional
    Web Security - User Reporting The ability to report on web access down to a user level when the Mimecast Security Agent is deployed to employees devices
    Optional
    Optional
    Large File Send Ensure employees can easily and securely share large files up to 2GB via email whilst maintaining corporate security, compliance and data retention policies
    Optional
    Optional
      Privacy & Encryption
    Optional
    Optional
    Secure Messaging Enable your employees to securely send confidential and sensitive information via email with administrator defined and user selectable controls and policies
    Optional
    Optional
    Privacy Pack Dedicated lexicons designed for those needing to identify personally identifiable information (PII), finanical or healthcare related data
    Optional
    Optional
      Governance & Compliance
    Optional
    Optional
    30 Day Retention Search and restoration of email over a thirty day period in the event of accidental deletion or malicious attack
     
    --
    1 Year Retention Search and restoration of email over a one year period in the event of accidental deletion or malicious attack
    --
     
    99 Year Retention Long term data retention with a multipurpose cloud archive for compliance, e-Discovery, case review, restoration of email and increased user productivity
    Optional
    Optional
    Supervision Provides simplified monitoring and escalation of email items from random selection or defined lexicon
    Optional
    Optional
    Compliance Protect Provides the organization with compliance protection for SEC17-4 type data regulations
    --
    --
    Archive for Teams Extend email archive capabilities to include Microsoft Teams – all on the same Mimecast platform
    --
    --
     

    365 Protect Plan

    365 Protect Plus Plan

    Back to Top