Mimecast Plans

    Mimecast provides a solution that helps everyone at your organization

    Plans for small businesses with fewer than 100 employees.

    small-business.png

    Small Business

    commercial-enterprise.png

    Commercial & Enterprise

    365-icon.png

    Microsoft 365 Protection

    Mimecast Core

    core.png
    Most Popular
    Less than

    $340

    USD a month for up to 49 users*
    • Secure Email Gateway
    • Targeted Threat Protection
    • Internal Email Protect
    • Awareness Training

    Key Benefits:

    • Safeguard your organization against the #1 attack channel
    • Prevent financial and loss of sensitive or proprietary information
    • Prevent the lateral and external spread of threats
    • Improve employee security awareness

    49 and 99 user agreements available

    Mimecast Hero

    hero.png
    Most Popular
    Less than

    $420

    USD a month for up to 49 users*
    • ALL CORE FEATURES
    • Continuity
    • Sync & Recover
    • Web Security
    • Large File Send & Secure Messaging

    Key Benefits:

    • Cyber resilience and protection across multiple channels
    • Integrated protection for web and email
    • Maintain productivity during cyber disruption
    • Quickly restore mailboxes
    • Shield sensitive information sent to external recipients

    49 and 99 user agreements available

    Mimecast Mega

    mega.png
    Most Popular
    Less than

    $630

    USD a month for up to 49 users*
    • ALL HERO FEATURES
    • 99 Year Archive
    • E-Discovery
    • Early Case Assessment
    • Extended Retention
    • Integrated Security and Archive

    Key Benefits:

    • Reduce complexity and administrator time
    • Respond quickly to litigation and compliance information requests
    • Slash third-party costs with in-house identification, preservation, collection, and review
    • Preserve the data you need with item level and mailbox legal hold
    • Rapid end user search
    • Extend security protection to archiving to protect against latent threats

    49 and 99 user agreements available

    Zone 1 – At Your Perimeter

    Core

    Core

    Hero

    Hero

    Mega

    Mega

    Secure Email Gateway
     
     
     
    Anti-Virus and Anti-Spam Comprehensive protection delivered via multi-layered engines with an optimum mix of proprietary and best of breed third-party technology
     
     
     
    Data Loss Prevention Protect your sensitive and confidential information from accidential or intentional exposure with fine grained policy controls
     
     
     
    Signature Disclaimer & Management Achieve consistency in all email communications with email signature and disclaimer management based on Active Directory credentials
     
     
     
    End User Productivity Applications Boost your employee productivity with self-service security, email and archive access features with apps built for Outlook, mobile, Mac and Web
     
     
     
    Intelligent Email Routing Support complex on-premises, cloud or hybrid email environments and achieve rapid email system integration or separation associated with a merger, acquisition or divestiture
     
     
     
    Threat Intelligence Gain insight into threats targeting your tenant with the Threat Intelligence Dashboard or use our Threat Intelligence API to feed threat data into a third party tool of your choice
     
     
     
    API (Application Programming Interface) Create an extensible architecture for complete visibility and efficiency by integrating Mimecast with your current or planned IT solutions
     
     
     
    Targeted Threat Protection
     
     
     
    URL Protect Protect your organization and employees against malicious websites containing malware, phishing and other threats through URL rewriting and on-click deep site inspection
     
     
     
    Attachment Protect Defend against infection from weaponized attachments often used in ransomware, keylogger, trojan and spyware attacks with multi-layered inspection including static and dynamic analysis
     
     
     
    Impersonation Protect Comprehensive protection against social engineering attacks like Business Email Compromise, CEO fraud and phishing targeting your employees
     
     
     
    Browser Isolation
    Optional
    Optional
    Optional
    Safely Click Embedded Links Protect from credential phishing by rendering phishing sites read only and eliminate patient-zero malware infections by executing downloaded files in an isolated container
    Optional
    Optional
    Optional
    Rapid, Safe Incident Investigation Provide security analysts with a safe, isolated environment to investigate suspicious URLs to help reduce complexity and time to respond, contain and remediate threats
    Optional
    Optional
    Optional
     

    Zone 2 – Inside Your Perimeter

    Internal Email Protect
     
     
     
    Internal Email Protect Prevent the deliberate or unintentional spread of attacks internally and outbound, including automatic or manual remediation of files or emails post-delivery
     
     
     
    Threat Remediation Continuous monitoring of lateral and outbound email using the latest intelligence with automatic or manual remediation of files or emails post-delivery
     
     
     
    Awareness Training
     
     
     
    Core Infosecurity Change behavior and lower organizational risk with persistent, engaging security awareness training. Help make employees part of your defense against web and email attacks, data loss, and other security threats
     
     
     
    Phishing Simulations Test employee susceptibility with realistic phish tests. Phishing simulations are integrated with core training, making it easy to deploy reinforcement of training concepts based on test response
     
     
     
    Risk Scoring Identify your riskiest employees so you can focus precious time and budget supporting the employees who need it most. Benchmark aggregate company score against other organizations in your industry to gauge your overall risk posture
     
     
     
    Custom Content Enhance existing modules with supplemental training material or create your own module for training needs unique to your organization
     
     
     
    Targeted Training Deploy additional training to employees who need it most. Create custom lists based on training performance, phishing simulation response or risk score so you can assign and send additional modules or conduct other types of training or remediation
     
     
     
    HIPAA Modules Supplement core information security training with modules covering issues specific to the Health Insurance Portability and Accountability Act (HIPAA)
    Optional
    Optional
    Optional
    CyberGraph
    Optional
    Optional
    Optional
    Email Tracker Protection Stop intended targets inadvertently disclosing critical information that could be used in a social engineering targeted phishing attack
    Optional
    Optional
    Optional
    Machine Learning and Identity Graph Detect sophisticated, highly targeted email threats by identifying anomalies in sender and recipient behaviors that could be indicative of a malicious email
    Optional
    Optional
    Optional
    Dynamic, Contextual Banners Engage users with color coded banners that indicate the nature of any risks associated with suspicious emails and solicits their views to strengthen protection
    Optional
    Optional
    Optional
     

    Zone 3 – Beyond Your Perimeter

    DMARC Analyzer
    Optional
    Optional
    Optional
    360 Degree Visibility & Governance Easy to use reporting and forensics that let you see and analyze who is sending email on your behalf to identify legitimate versus fraudulent senders
    Optional
    Optional
    Optional
    Assisted DMARC Enforcement Self-service email intelligence tools, guided workflows and wizards designed to reduce the time, effort and cost of enforcing a DMARC policy to stop domain abuse
    Optional
    Optional
    Optional
    Brand Exploit Protect
    Optional
    Optional
    Optional
    Proactive Threat Hunting Harness artificial intelligence and machine learning to scan quadrillions of web addresses to find webistes spoofing your brand, even before they become live attacks
    Optional
    Optional
    Optional
    Web Detection Agent Discover if your website has been scraped and cloned anywhere on the internet
    Optional
    Optional
    Optional
    Remediation Initiate a rapid takedown of suspicious or active sites while protecting your employees by blocking URLs and domains across both Mimecast's Email and Web Security services
    Optional
    Optional
    Optional
     

    Resilience Extensions

    Email Continuity & Recovery
    --
     
     
    Sync & Recover Continuous synchronization of email that ensures an email or entire inbox can be recovered following an attack, breach or user error
    --
     
     
    Email Continuity Allows the organization to continue to communicate internally and externally during any planned or unplanned email service downtime with a 100% SLA on email availability
    --
     
     
    Web Threats & Shadow IT
    Optional
     
     
    Web Security - Malicious Site Defense Protect your employees and guests from accessing malicious sites with comprehensive category and security policy controls
    Optional
     
     
    Web Security - Acceptable Use Enforcement Control what content is accessible by your employees and guests by enforcing acceptable use policies through 80+ granular category filters
    Optional
     
     
    Web Security - Application Visibility & Control Help mitigate shadow IT risks with full visibility of what cloud applications are being used. Then monitor, sanction or block access to all or groups of employees
    Optional
     
     
    Web Security - Intelligent Proxy Ensures deeper inspection of suspicious sites, including file downloads, by inspecting this traffic via a proxy and applying additional checks including anti-virus and static file analysis
    Optional
     
     
    Web Security - On Network Protection Protection is automatically applied for all web requests originating from employees or guests on your network
    Optional
     
     
    Web Security - Protect Guest Wifi Network-level controls help reduce legal and compliance risks by preventing access to malicious sites and blocking inappropriate content for visitors, customers and anyone else using your guest Wi-Fi networks
    Optional
     
     
    Web Security - User Reporting The ability to report on web access down to a user level when the Mimecast Security Agent is deployed to employees devices
    Optional
     
     
    Large File Send Ensure employees can easily and securely share large files up to 2GB via email whilst maintaining corporate security, compliance and data retention policies
    --
     
     
    Privacy & Encryption
    --
     
     
    Secure Messaging Enable your employees to securely send confidential and sensitive information via email with administrator defined and user selectable controls and policies
    --
     
     
    Privacy Pack Dedicated lexicons designed for those needing to identify personally identifiable information (PII), finanical or healthcare related data
    Optional
    Optional
    Optional
    Governance & Compliance
    --
    --
     
    30 Day Retention Search and restoration of email over a thirty day period in the event of accidental deletion or malicious attack
     
    --
    --
    1 Year Retention Search and restoration of email over a one year period in the event of accidental deletion or malicious attack
    --
     
    --
    99 Year Retention Long term data retention with a multipurpose cloud archive for compliance, e-Discovery, case review, restoration of email and increased user productivity
    --
    --
     
    Supervision Provides simplified monitoring and escalation of email items from random selection or defined lexicon
    --
    --
    Optional
    Compliance Protect Provides the organization with compliance protection for SEC17-4 type data regulations
    --
    --
    Optional
    Archive for Teams Extend email archive capabilities to include Microsoft Teams – all on the same Mimecast platform
    --
    --
    Optional
     
    Core

    Core

    Hero

    Hero

    Mega

    Mega

    *These prices are based on Mimecast's regional list prices for up to 49 users and represent the pro-rated cost of contracts with annual billing cycles. Monthly payment plans are also available. Higher rates will apply. 99 user agreements are also available. Local pricing applies in different regions. Mimecast offers these plans only through authorized Mimecast resellers AND MIMECAST RESELLERS MAY PROVIDE YOU WITH BETTER PRICING. Purchase of these plans requires a 12 month commitment and is subject to your acceptance of Mimecast’s General Terms and Conditions found at mimecast.com/contracts/. Promotions advertised by Mimecast cannot be used for these Plans unless explicitly stated in the terms of the promotion. Mimecast reserves the right to limit the number, and may modify or discontinue these Plans at any time without notice. These Plans are available to organizations only for internal business purposes.

    Back to Top