Mimecast Plans to Mitigate Human Risk
Mimecast offers flexible solutions and plans designed to meet the needs of businesses of all sizes, both today and tomorrow.
Critical
Protections include:
- AI-powered BEC protection
- Social graphing and dynamic bannering
- On-click URL analysis
- AI-powered QR code protection
- Advanced attachment sandboxing and detection
- Malware scanning
- Spam filtering
- Outbound and internal email scanning
- Browser Isolation
- Email Backup and Recovery
- Email Continuity (Cloud Gateway)
- Securely send messages and large files (Cloud Gateway)
- AI-powered protection for collaboration tools
Advanced
Protections include:
- AI-powered BEC protection
- Social graphing and dynamic bannering
- On-click URL analysis
- AI-powered QR code protection
- Advanced attachment sandboxing and detection
- Malware scanning
- Spam filtering
- Outbound and internal email scanning
- Browser Isolation
- Email Backup and Recovery
- Email Continuity (Cloud Gateway)
- Securely send messages and large files (Cloud Gateway)
- AI-powered protection for collaboration tools
Premium
Protections include:
- AI-powered BEC protection
- Social graphing and dynamic bannering
- On-click URL analysis
- AI-powered QR code protection
- Advanced attachment sandboxing and detection
- Malware scanning
- Spam filtering
- Outbound and internal email scanning
- Browser Isolation
- Email Backup and Recovery
- Email Continuity (Cloud Gateway)
- Securely send messages and large files (Cloud Gateway)
- AI-powered protection for collaboration tools
Email Security Plans FAQs (For Customers)
Why is Mimecast introducing new email security plans?
Mimecast is committed to providing our customers with the most advanced email security solutions available. As the cyber threat landscape evolves, we are enhancing our product offerings to ensure all Mimecast customers receive the best protection against sophisticated threats, including Business Email Compromise (BEC) and advanced phishing attacks.
What benefits do the new plans offer?
Our new email security plans provide:
- Enhanced protection against the latest cyber-attacks.
- Simplified packages that are easier to understand and manage.
- Clear upgrade paths to accommodate your growing security needs.
Are any of my products or services going away?
No, the products and services your organization has purchased will remain online, uninterrupted, and unchanged.
When will legacy plans no longer be supported?
As of August 15th, 2025, new Mimecast customers must purchase the new email security plans.
What legal terms need to be signed for the new plans?
To implement our advanced features, including the use of AI within our products, a standard 1-page legal agreement will need to be signed. This agreement outlines the terms of use and ensures compliance with our AI governance standards.
Will there be a cost associated with this upgrade to the new plans?
In some cases, there will be an additional cost to migrate to the new plans. Standard price increase terms will apply. This will vary based on the products and services your organization currently owns. Speak with your account manager for more information regarding price increases.
Where can I get more information about the new plans?
For detailed information about our new email security plans, please contact your account manager.
Do I need to take immediate action?
While your current services will continue uninterrupted, we recommend discussing an upgrade with your account manager as soon as possible. This will ensure you have the most advanced protection available against today's sophisticated cyber threats. This FAQ aims to clarify the transition process and highlight the benefits of upgrading to Mimecast's latest email security solutions. If you have any further questions or need assistance, please don't hesitate to reach out!
Professional
Comprehensive Insider risk protection with detection and response across endpoints, cloud, and email.
Monitored Sources:
- Endpoints
- Exfiltration Detectors for SaaS/Cloud Apps (1 Included)
- Exfiltration Detection
- Trusted Activity
- Historical Activity (30 Days)
- Metadata Collection for Exfiltrated File Activity
Features:
- Incydr Risk Indicators/span>
- Dashboards
- Watchlists
- Forensic Search
- Exact Match File Access
- Cases
- Content Inspection (Add On)
- Incydr Flows (Add On)
Risk Reduction Training:
- Instructor™ (Add On)
Integrations:
- Pre-built Integrations with SOAR, SIEM and other platforms
- API (Base Access)
- CLI
- SDK
Enterprise
Includes extended event data retention, cases archival, and enhanced API integrations.
Monitored Sources:
- Endpoints
- Exfiltration Detectors for SaaS/Cloud Apps (1 Included)
- Exfiltration Detection
- Trusted Activity
- Historical Activity (90 Days)
- Metadata Collection for Exfiltrated File Activity
Features:
- Incydr Risk Indicators
- Dashboards
- Watchlists
- Forensic Search
- Exact Match File Access
- Cases
- Content Inspection (Add On)
- Incydr Flows (Add On)
Risk Reduction Training:
- Instructor™ (Add On)
Integrations:
- Pre-built Integrations with SOAR, SIEM and other platforms
- API (Full Access)
- CLI
- SDK
Gov
A FedRAMP-authorized SaaS solution ideal for government agencies, contractors, or related entities.
Monitored Sources:
- Endpoints
- Exfiltration Detectors for SaaS/Cloud Apps (1 Included)
- Exfiltration Detection
- Trusted Activity
- Historical Activity (30 Days)
- Metadata Collection for Exfiltrated File Activity
Features:
- Incydr Risk Indicators
- Dashboards
- Watchlists
- Forensic Search
- Exact Match File Access
- Cases
- Content Inspection (Add On)
- Incydr Flows (Add On)
Risk Reduction Training:
- Instructor™ (Add On)
Integrations:
- Pre-built Integrations with SOAR, SIEM and other platforms
- API (Full Access)
- CLI
- SDK
Incydr Plans FAQs
How can I see the interface and get access to Incydr?
See what Incydr looks like by taking the product tour, and when you’re ready you can reach out to sales and get a complementary 30-day Proof of Value (POV) to understand your insider risk and improve your data protection efforts.
What operating systems are supported with the endpoint agent?
A single, lightweight agent can be easily deployed via desktop management software on Windows, Mac and Linux operating systems to silently monitor user activity. Virtual Desktop Infrastructure (VDI) is also supported.
What cloud services are supported to detect data exfiltration?
Exfiltration Detectors for Microsoft OneDrive & SharePoint, Google Drive, and Box offer in-depth visibility into file access and sharing; 1 is included for each Incydr license. A dedicated Salesforce data connection is available to monitor downloads.
What email services are supported to detect data exfiltration?
Microsoft Office 365 Email and Gmail are available.
Can I extend historical activity in Incydr?
Yes, there are add-ons available to retain historical data for up to 3 years for organizations needing extended visibility into insider risk management events in their environment.
Can I monitor all file activity on an endpoint, not just exfiltrated file activity?
Yes, this is available as an add-on.
What are Incydr Risk Indicators?
Incydr Risk Indicators (IRI) are hundreds of signals to detect, prioritize, and address both known and unknown data risks on three dimensions of event detail including data context, user context, and destination context.
What is Content Inspection?
The Incydr Content Inspection add-on allows administrators to set alerts for PII, PCI, and custom data entities to better detect, score, and respond to risk events. It minimizes performance impact by using AI-based content inspection capabilities in the cloud using Natural Language Processing (NLP).
What are Incydr Flows?
An Incydr Flow is a customizable automation add-on for Incydr actions to or from another software, like adding departing employees to a watchlist, revoking user access, quarantining endpoints, or sending alerts to collaboration tools.
Flows are available for:
- Alert Triage: Microsoft Teams, Slack, and ServiceNow
- HCM Tools for Watchlist Management: Mimecast, BambooHR, Jira, SuccessFactors, UKG, and Workday
- Containment for Endpoint: Crowdstrike and SentinelOne
- Containment for Permissions: Okta and Microsoft Entra ID
Are other integrations available besides Incydr Flows?
Yes, there are 30+ integrations for data security, IAM & PAM, endpoint, SOAR, and SIEM solutions to automate workflows. During the 30-day Proof of Value (POV) you can explore supported integrations and best practices for your specific environment.
What is Incydr Instructor™?
Incydr Instructor is a security education tool that automatically delivers short, targeted video lessons to employees when risky behavior is detected, based on a customer’s alert rules. This contextual, just-in-time training library of 90+ video lessons helps users understand and immediately correct their actions, reducing the likelihood of future data risk events and supporting long-term behavior change. One customer had a 36% reduction in data exfiltration events in just 4 months.
Professional
Essential phishing simulation, video training, and human risk visibility in a unified security behavior management platform.
Phishing:
- Phishing Simulation
- Phishing Reporting & Analytics
- Direct Mail Injection
- Email Reporting Plug-in (O365)
Training:
- All Modules
- Training Reporting & Analytics
- SCORM Files
Human Risk Command Center:
- HRCC Dashboard
- HRCC Watchlists & Watchlists Manager
- HRCC Third-Party Integration
Adaptive Intervention & Personalization:
- Nudges (Email, Slack, Teams)
- User Scorecards
Enterprise
Adds adaptive intervention and advanced personalization with behavior-based nudges, integration, and custom user scorecards.
Phishing:
- Phishing Simulation
- Phishing Reporting & Analytics
- Direct Mail Injection
- Email Reporting Plug-in (O365)
Training:
- All Modules
- Training Reporting & Analytics
- SCORM Files
Human Risk Command Center:
- HRCC Dashboard
- HRCC Watchlists & Watchlists Manager
- HRCC Third-Party Integration
Adaptive Intervention & Personalization:
- Nudges (Email, Slack, Teams)
- User Scorecards