Mimecast Plans

Email Security 3.0 Plans

Plans for organizations with more than 100 employees

Perimeter
Defense

 
  • Secure Email Gateway
  • Targeted Threat Protection
Key Benefits:
  • Safeguard your organization against the #1 attack channel
  • Prevents financial loss and the exposure of sensitive or proprietary information
  • Reduces complexity and administrator time
or see more features

Pervasive
Defense

 
  • ALL COMPREHENSIVE DEFENSE FEATURES
  • DMARC Analyzer
  • Brand Exploit Protect
Key Benefits:
  • Extends protection beyond the perimeter
  • Stops attackers from destroying your brand
  • Constantly scans for website and domain impersonation
  • Rapidly takes down web sites mimicking your brand
  • Leverages DMARC standard to safeguard emails from your legitimate domains
or see more features

Cyber Resilience Plans

Cyber Resilience
Pro

 
  • ALL FOUNDATIONS FEATURES
  • Secure Messaging
  • Web Security
  • Large File Send
  • Privacy Pack
  • 99 Year Archive
Key Benefits:
  • Integrated email and web security
  • Protects all web traffic on and off your network
  • Prevents shadow IT with full visibility and control of cloud app use, and an alternative to file sharing sites
  • Encryption and DLP capabilities to protect sensitive content
  • Comprehensive compliance and data governance
  • Rapid response to litigation with e-discovery and case review
  • Preserves the data you need with item level and mailbox legal hold
or see more features
 

Email Security Plans

 

Cyber Resilience Plans

 

Zone 1 – At Your Perimeter

Perimeter
Defense GET A QUOTE
Comprehensive Defense GET A QUOTE
Pervasive
Defense GET A QUOTE
Cyber Resilience Foundations GET A QUOTE
Cyber Resilience Pro GET A QUOTE
  Secure Email Gateway
 
 
 
 
 
Anti-Virus and Anti-Spam Comprehensive protection delivered via multi-layered engines with an optimum mix of proprietary and best of breed third-party technology
 
 
 
 
 
Data Loss Prevention Protect your sensitive and confidential information from accidential or intentional exposure with fine grained policy controls
 
 
 
 
 
Signature Disclaimer & Management Achieve consistency in all email communications with email signature and disclaimer management based on Active Directory credentials
 
 
 
 
 
End User Productivity Applications Boost your employee productivity with self-service security, email and archive access features with apps built for Outlook, mobile, Mac and Web
 
 
 
 
 
Intelligent Email Routing Support complex on-premises, cloud or hybrid email environments and achieve rapid email system integration or separation associated with a merger, acquisition or divestiture
 
 
 
 
 
Threat Intelligence Gain insight into threats targeting your tenant with the Threat Intelligence Dashboard or use our Threat Intelligence API to feed threat data into a third party tool of your choice
 
 
 
 
 
API (Application Programming Interface) Create an extensible architecture for complete visibility and efficiency by integrating Mimecast with your current or planned IT solutions
 
 
 
 
 
  Targeted Threat Protection
 
 
 
 
 
URL Protect Protect your organization and employees against malicious websites containing malware, phishing and other threats through URL rewriting and on-click deep site inspection
 
 
 
 
 
Attachment Protect Defend against infection from weaponized attachments often used in ransomware, keylogger, trojan and spyware attacks with multi-layered inspection including advanced static and dynamic analysis
 
 
 
 
 
Impersonation Protect Comprehensive protection against social engineering attacks like Business Email Compromise, CEO fraud and phishing targeting your employees
 
 
 
 
 
 

Zone 2 – Inside Your Perimeter

  Internal Email Protect
--
 
 
 
 
Protection from threats inside your email perimeter Detect and prevent security threats that originate internally as a result of account compromise, human error or malicious action with comprehensive file and URLs checks on internal and outbound email
--
 
 
 
 
Threat Remediation Continuous monitoring of lateral and outbound email using the latest intelligence with automatic or manual remediation of files or emails post-delivery
--
 
 
 
 
  Awareness Training
--
 
 
 
 
Core Infosecurity Change behavior and lower organizational risk with persistent, engaging security awareness training. Help make employees part of your defense against web and email attacks, data loss, and other security threats
--
 
 
 
 
Phishing Simulations Test employee susceptibility with realistic phish tests. Phishing simulations are integrated with core training, making it easy to deploy reinforcement of training concepts based on test response
--
 
 
 
 
Risk Scoring Identify your riskiest employees so you can focus precious time and budget supporting the employees who need it most. Benchmark aggregate company score against other organizations in your industry to gauge your overall risk posture
--
 
 
 
 
Custom Content Enhance existing modules with supplemental training material or create your own module for training needs unique to your organization
--
 
 
 
 
Targeted Training Deploy additional training to employees who need it most. Create custom lists based on training performance, phishing simulation response or risk score so you can assign and send additional modules or conduct other types of training or remediation
--
 
 
 
 
HIPAA Modules Supplement core information security training with modules covering issues specific to the Health Insurance Portability and Accountability Act (HIPAA)
--
Optional
Optional
Optional
Optional
 

Zone 3 – Beyond Your Perimeter

  DMARC Analyzer
Optional
Optional
 
Optional
Optional
360 Degree Visibility & Governance Easy to use reporting and forensics that let you see and analyze who is sending email on your behalf to identify legitimate versus fraudulent senders
Optional
Optional
 
Optional
Optional
Assisted DMARC Enforcement Self-service email intelligence tools, guided workflows and wizards designed to reduce the time, effort and cost of enforcing a DMARC policy to stop domain abuse
Optional
Optional
 
Optional
Optional
  Brand Exploit Protect
Optional
Optional
 
Optional
Optional
Proactive Threat Hunting Harness artificial intelligence and machine learning to scan quadrillions of web addresses to find websites spoofing your brand, even before they become live attacks
Optional
Optional
 
Optional
Optional
Web Detection Agent Discover if your website has been scraped and cloned anywhere on the internet
Optional
Optional
 
Optional
Optional
Remediation Initiate a rapid takedown of suspicious or active sites while protecting your employees by blocking URLs and domains across both Mimecast's Email and Web Security services
Optional
Optional
 
Optional
Optional
 

Resilience Extensions

  Email Continuity & Recovery
Optional
Optional
Optional
 
 
Sync & Recover Continuous synchronization of email that ensures an email or entire inbox can be recovered following an attack, breach or user error
Optional
Optional
Optional
 
 
Email Continuity Allows you to continue to communicate internally and externally during any planned or unplanned email service downtime with a 100% SLA on email availability
Optional
Optional
Optional
 
 
 
  Web Threats & Shadow IT
Optional
Optional
Optional
Optional
 
Web Security - Malicious Site Defense Protect your employees and guests from accessing malicious sites with comprehensive category and security policy controls
Optional
Optional
Optional
Optional
 
Web Security - Acceptable Use Enforcement Control what content is accessible by your employees and guests by enforcing acceptable use policies through 80+ granular category filters
Optional
Optional
Optional
Optional
 
Web Security - Application Visibility & Control Help mitigate shadow IT risks with full visibility of what cloud applications are being used. Then monitor, sanction or block access to all or groups of employees
Optional
Optional
Optional
Optional
 
Web Security - Intelligent Proxy Ensures deeper inspection of suspicious sites, including file downloads, by inspecting this traffic via a proxy and applying additional checks including anti-virus and static file analysis
Optional
Optional
Optional
Optional
 
Web Security - On Network Protection Protection is automatically applied for all web requests originating from employees or guests on your network
Optional
Optional
Optional
Optional
 
Web Security - Protect Guest Wifi Network-level controls help reduce legal and compliance risks by preventing access to malicious sites and blocking inappropriate content for visitors, customers and anyone else using your guest Wi-Fi networks
Optional
Optional
Optional
Optional
 
Web Security - User Reporting The ability to report on web access down to a user level when the Mimecast Security Agent is deployed to employees devices
Optional
Optional
Optional
Optional
 
Large File Send Ensure employees can easily and securely share large files up to 2GB via email whilst maintaining corporate security, compliance and data retention policies
Optional
Optional
Optional
Optional
 
  Privacy & Encryption
Optional
Optional
Optional
Optional
 
Secure Messaging Enable your employees to securely send confidential and sensitive information via email with administrator defined and user selectable controls and policies
Optional
Optional
Optional
Optional
 
Privacy Pack Dedicated lexicons designed for those needing to identify personally identifiable information (PII), finanical or healthcare related data
Optional
Optional
Optional
Optional
 
  Governance & Compliance
Optional
Optional
Optional
Optional
 
30 Day Retention Search and restoration of email over a thirty day period in the event of accidental deletion or malicious attack
 
 
 
--
--
1 Year Retention Search and restoration of email over a one year period in the event of accidental deletion or malicious attack
--
--
--
 
--
99 Year Retention Long term data retention with a multipurpose cloud archive for compliance, e-Discovery, case review, restoration of email and increased user productivity
Optional
Optional
Optional
Optional
 
Supervision Provides simplified monitoring and escalation of email items from random selection or defined lexicon
--
--
--
--
Optional
Compliance Protect Provides the organization with compliance protection for SEC17-4 type data regulations
--
--
--
--
Optional
 
Perimeter
Defense
GET A QUOTE
Comprehensive Defense
GET A QUOTE
Pervasive
Defense
GET A QUOTE
Cyber Resilience Foundations
GET A QUOTE
Cyber Resilience Pro
GET A QUOTE