Product Bundles

    Mimecast makes it easy for organizations of all sizes to find the right solution that meets their needs. From small to mid-size or large enterprises, Mimecast offers the expertise, functional depth, and flexibility to help you bolster cyber resilience and effectively address your unique cybersecurity challenges.

    back to top

     

    Included Optional

    Secure Email Gateway

    Data Leak Prevention

     

    Protect your sensitive and confidential information from accidential or intentional exposure with fine grained policy controls

    Signature & Disclaimer Management

     

    Achieve consistency in all email communications with email signature and disclaimer management based on Active Directory credentials

    End User Productivity Applications

     

    Boost your employee productivity with self-service security, email and archive access features with apps built for Outlook, mobile, Mac and Web

    Intelligent Email Routing

     

    Support complex on-premises, cloud or hybrid email environments and achieve rapid email system integration or separation associated with a merger, acquisition or divestiture

    Threat Intelligence

     

    Gain insight into threats targeting your tenant with the Threat Intelligence Dashboard or use our Threat Intelligence API to feed that targeted intelligence into a third party tool of your choice

    API (Application Programming Interface)

     

    Create an extensible architecture for complete visibility and efficiency by integrating Mimecast with your current or planned IT solutions

    Large File Send

     

    Ensure employees can easily and securely share large files up to 2GB via email whilst maintaining corporate security, compliance and data retention policies

    Secure Messaging

     

    Enable your employees to securely send confidential and sensitive information via email with administrator defined and user selectable controls and policies

    Healthcare Pack

     

    dedicated lexicons designed for those needing to meet specific regulations such as HIPAA

     

    Targeted Threat Protection

    URL Protect

     

    Protect your organization and employees against malicious websites containing malware, phishing and other threats through URL rewriting and on-click deep site inspection

    Attachment Protect

     

    Defend against infection from weaponized attachments often used in ransomware, keylogger, trojan and spyware attacks with multi-layered inspection including static and dynamic analysis

    Impersonation Protect

     

    Comprehensive protection against social engineering / CEO fraud / whaling / Business Email Compromise / phishing attacks targeting your employees

    Internal Email Protect

     

    Prevent the deliberate or unintentional spread of attacks internally and outbound, including automatic or manual remediation of files or emails post-delivery

     

    Email Continuity & Recovery

    Sync & Recover

     

    Continuous synchronization of email that ensures an email or entire inbox can be recovered following an attack, breach or user error

    Email Continuity

     

    Allows the organization to continue to communicate internally and externally during any planned or unplanned email service downtime with a 100% SLA on email availability

     

    Archiving & Email Retention

    30 Day Retention

     

    Search and restoration of email over a thirty day period in the event of accidental deletion or malicious attack

    1 Year Retention

     

    Search and restoration of email over a one year period in the event of accidental deletion or malicious attack

    99 Year Retention

     

    Long term data retention with a multipurpose cloud archive for compliance, e-Discovery, case review, restoration of email and increased user productivity

    Supervision

     

    Supervision provides simplified monitoring and escalation of email items from random selection or defined lexicon

    Compliance Protect

     

    Provides the organization with compliance protection for SEC17-4 type data regulations

     

    Awareness Training

    Core Infosecurity

     

    Change behavior and lower organizational risk with persistent, engaging security awareness training.  Help make employees part of your defense against web and email attacks, data loss, and other security threats.

    Phishing Simulations

     

    Test employee susceptibility with realistic phish tests. Phishing simulations are integrated with core training, making it easy to deploy reinforcement of training concepts based on test response.

    Risk Scoring

     

    Identify your riskiest employees so you can focus precious time and budget supporting the employees who need it most. Benchmark aggregate company score against other organizations in your industry to gauge your overall risk posture.

    Custom Content

     

    Enhance existing modules with supplemental training material or create your own module for training needs unique to your organization.

    Targeted Training

     

    Deploy additional training to employees who need it most. Create custom lists based on training performance, phishing simulation response or risk score so you can assign and send additional modules or conduct other types of training or remediation.

    HIPAA Modules

     

    Supplement core information security training with modules covering issues specific to the Health Insurance Portability and Accountability Act (HIPAA)

     

    Web Security

    Malicious Site Defense

     

    Protect employees and guests from accessing malicious sites with DNS-level category and security policy controls.

    Acceptable Use Enforcement

     

    Control what content is accessible by employees and guests by enforcing acceptable use policies through 90+ granular category filters.

    Intelligent Proxy

     

    Enhance analysis of requests to suspicious sites, including file downloads, by inspecting this traffic via a proxy and applying deeper-level checks including anti-virus and static file analysis.

    On Network Protection

     

    Protection is automatically applied for all web requests originating from employees or guests on your network.

    Off Network Protection

     

    Extend protection to employees when accessing the web remotely, including from home and on the move, though an on-device security agent.

    Protect Guest Wi-Fi

     

    Network-level controls help reduce legal and compliance risks by preventing access to malicious sites and blocking inappropriate content for visitors, customers and anyone else using your guest Wi-Fi networks.

    User Reporting

     

    The ability to report on web access down to a user level when the Mimecast Security Agent is deployed to employees devices.

    Email Security
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
    -
     
     
    -
    -
     
     
     
    -
    -
    -
    -
     
     
    -
    -
    -
    -
    -
    -
     
     
    -
    -
    -
    -
    -
    -
    -
    Email Security & Remediation
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
    -
    -
     
     
     
    -
     
    -
    -
     
     
    -
    -
    -
    -
    -
    -
     
     
    -
    -
    -
    -
    -
    -
    -
    Email Security, Remediation & Continuity
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
    -
     
     
    -
    -
     
     
    -
    -
    -
    -
    -
    -
     
     
    -
    -
    -
    -
    -
    -
    -
    Email Security, Remediation, Continuity & Archiving
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
    -
    -
     
     
     
     
     
    -
    -
    -
    -
    -
    -
     
     
    -
    -
    -
    -
    -
    -
    -
    Awareness Training
     
    -
    -
    -
    -
    -
    -
    -
    -
    -
     
     
    -
    -
    -
    -
     
     
    -
    -
     
     
    -
    -
    -
    -
    -
     
     
     
     
     
     
     
     
     
     
    -
    -
    -
    -
    -
    -
    -
    Web Security
     
    -
    -
    -
    -
    -
    -
    -
    -
    -
     
     
    -
    -
    -
    -
     
     
    -
    -
     
     
    -
    -
    -
    -
    -
     
     
    -
    -
    -
    -
    -
    -
     
     
     
     
     
     
     
     
     

    Secure Email Gateway

    Data Leak Prevention Protect your sensitive and confidential information from accidential or intentional exposure with fine grained policy controls Signature & Disclaimer Management Achieve consistency in all email communications with email signature and disclaimer management based on Active Directory credentials End User Productivity Applications Boost your employee productivity with self-service security, email and archive access features with apps built for Outlook, mobile, Mac and Web Intelligent Email Routing Support complex on-premises, cloud or hybrid email environments and achieve rapid email system integration or separation associated with a merger, acquisition or divestiture Threat Intelligence Gain insight into threats targeting your tenant with the Threat Intelligence Dashboard or use our Threat Intelligence API to feed that targeted intelligence into a third party tool of your choice API (Application Programming Interface) Create an extensible architecture for complete visibility and efficiency by integrating Mimecast with your current or planned IT solutions
     

    Targeted Threat Protection

    URL Protection Protect your organization and employees against malicious websites containing malware, phishing and other threats through URL rewriting and on-click deep site inspection Attachment Protection Defend against infection from weaponized attachments often used in ransomware, keylogger, trojan and spyware attacks with multi-layered inspection including static and dynamic analysis Impersonation Protection Comprehensive protection against social engineering / CEO fraud / whaling / Business Email Compromise / phishing attacks targeting your employees Internal Email Protection Prevent the deliberate or unintentional spread of attacks internally and outbound, including automatic or manual remediation of files or emails post-delivery
     

    Email Continuity & Recovery

    Sync & Recover Continuous synchronization of email that ensures an email or entire inbox can be recovered following an attack, breach or user error Email Continuity Allows the organization to continue to communicate internally and externally during any planned or unplanned email service downtime with a 100% SLA on email availability
     

    Archiving & Email Retention

    30 Day Email Retention Search and restoration of email over a thirty day period in the event of accidental deletion or malicious attack 1 Year Email Retention Search and restoration of email over a one year period in the event of accidental deletion or malicious attack
     

    Optional Addons

    Large File Send Ensure employees can easily and securely share large files up to 2GB via email whilst maintaining corporate security, compliance and data retention policies Secure Messaging Enable your employees to securely send confidential and sensitive information via email with administrator defined and user selectable controls and policies Healthcare Pack dedicated lexicons designed for those needing to meet specific regulations such as HIPAA 99 Year Email Retention Long term data retention with a multipurpose cloud archive for compliance, e-Discovery, case review, restoration of email and increased user productivity Supervision Supervision provides simplified monitoring and escalation of email items from random selection or defined lexicon Compliance Protect Provides the organization with compliance protection for SEC17-4 type data regulations
     

    Included Optional

    Secure Email Gateway

    Data Leak Prevention

     

    Protect your sensitive and confidential information from accidential or intentional exposure with fine grained policy controls

    Signature & Disclaimer Management

     

    Achieve consistency in all email communications with email signature and disclaimer management based on Active Directory credentials

    End User Productivity Applications

     

    Boost your employee productivity with self-service security, email and archive access features with apps built for Outlook, mobile, Mac and Web

    Intelligent Email Routing

     

    Support complex on-premises, cloud or hybrid email environments and achieve rapid email system integration or separation associated with a merger, acquisition or divestiture

    Threat Intelligence

     

    Gain insight into threats targeting your tenant with the Threat Intelligence Dashboard or use our Threat Intelligence API to feed that targeted intelligence into a third party tool of your choice

    API (Application Programming Interface)

     

    Create an extensible architecture for complete visibility and efficiency by integrating Mimecast with your current or planned IT solutions

     

    Targeted Threat Protection

    URL Protect

     

    Protect your organization and employees against malicious websites containing malware, phishing and other threats through URL rewriting and on-click deep site inspection

    Attachment Protect

     

    Defend against infection from weaponized attachments often used in ransomware, keylogger, trojan and spyware attacks with multi-layered inspection including static and dynamic analysis

    Impersonation Protect

     

    Comprehensive protection against social engineering / CEO fraud / whaling / Business Email Compromise / phishing attacks targeting your employees

    Internal Email Protect

     

    Prevent the deliberate or unintentional spread of attacks internally and outbound, including automatic or manual remediation of files or emails post-delivery

     

    Email Continuity & Recovery

    Sync & Recover

     

    Continuous synchronization of email that ensures an email or entire inbox can be recovered following an attack, breach or user error

    Email Continuity

     

    Allows the organization to continue to communicate internally and externally during any planned or unplanned email service downtime with a 100% SLA on email availability

     

    Archiving & Email Retention

    30 Day Email Retention

     

    Search and restoration of email over a thirty day period in the event of accidental deletion or malicious attack

    1 Year Email Retention

     

    Search and restoration of email over a one year period in the event of accidental deletion or malicious attack

     

    Optional Addons

    Large File Send

     

    Ensure employees can easily and securely share large files up to 2GB via email whilst maintaining corporate security, compliance and data retention policies

    Secure Messaging

     

    Enable your employees to securely send confidential and sensitive information via email with administrator defined and user selectable controls and policies

    Healthcare Pack

     

    dedicated lexicons designed for those needing to meet specific regulations such as HIPAA

    99 Year Email Retention

     

    Long term data retention with a multipurpose cloud archive for compliance, e-Discovery, case review, restoration of email and increased user productivity

    Supervision

     

    Supervision provides simplified monitoring and escalation of email items from random selection or defined lexicon

    Compliance Protect

     

    Provides the organization with compliance protection for SEC17-4 type data regulations

    Email Security
     
     
     
     
     
     
     
     
     
     
     
     
    -
     
     
    -
    -
     
     
     
    -
     
     
     
     
     
    -
    -
    -
    Email Security & Remediation
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
    -
    -
     
     
     
    -
     
     
     
     
     
     
    -
    -

    Secure Email Gateway

    Data Leak Prevention Protect your sensitive and confidential information from accidential or intentional exposure with fine grained policy controls Signature & Disclaimer Management Achieve consistency in all email communications with email signature and disclaimer management based on Active Directory credentials End User Productivity Applications Boost your employee productivity with self-service security, email and archive access features with apps built for Outlook, mobile, Mac and Web Intelligent Email Routing Support complex on-premises, cloud or hybrid email environments and achieve rapid email system integration or separation associated with a merger, acquisition or divestiture Threat Intelligence Gain insight into threats targeting your tenant with the Threat Intelligence Dashboard or use our Threat Intelligence API to feed that targeted intelligence into a third party tool of your choice API (Application Programming Interface) Create an extensible architecture for complete visibility and efficiency by integrating Mimecast with your current or planned IT solutions
     

    Data Leak Prevention

    URL Protection Protect your organization and employees against malicious websites containing malware, phishing and other threats through URL rewriting and on-click deep site inspection Attachment Protection Defend against infection from weaponized attachments often used in ransomware, keylogger, trojan and spyware attacks with multi-layered inspection including static and dynamic analysis Impersonation Protection Comprehensive protection against social engineering / CEO fraud / whaling / Business Email Compromise / phishing attacks targeting your employees Internal Email Protection Prevent the deliberate or unintentional spread of attacks internally and outbound, including automatic or manual remediation of files or emails post-delivery
     

    Email Continuity & Recovery

    Sync & Recover Continuous synchronization of email that ensures an email or entire inbox can be recovered following an attack, breach or user error Email Continuity Allows the organization to continue to communicate internally and externally during any planned or unplanned email service downtime with a 100% SLA on email availability
     

    Archiving & Email Retention

    30 Day Email Retention Search and restoration of email over a thirty day period in the event of accidental deletion or malicious attack 1 Year Email Retention Search and restoration of email over a one year period in the event of accidental deletion or malicious attack
     

    Optional Addons

    Large File Send Ensure employees can easily and securely share large files up to 2GB via email whilst maintaining corporate security, compliance and data retention policies Secure Messaging Enable your employees to securely send confidential and sensitive information via email with administrator defined and user selectable controls and policies Healthcare Pack dedicated lexicons designed for those needing to meet specific regulations such as HIPAA 99 Year Email Retention Long term data retention with a multipurpose cloud archive for compliance, e-Discovery, case review, restoration of email and increased user productivity Supervision Supervision provides simplified monitoring and escalation of email items from random selection or defined lexicon Compliance Protect Provides the organization with compliance protection for SEC17-4 type data regulations
     

    Included Optional

    Secure Email Gateway

    Data Leak Prevention

     

    Protect your sensitive and confidential information from accidential or intentional exposure with fine grained policy controls

    Signature & Disclaimer Management

     

    Achieve consistency in all email communications with email signature and disclaimer management based on Active Directory credentials

    End User Productivity Applications

     

    Boost your employee productivity with self-service security, email and archive access features with apps built for Outlook, mobile, Mac and Web

    Intelligent Email Routing

     

    Support complex on-premises, cloud or hybrid email environments and achieve rapid email system integration or separation associated with a merger, acquisition or divestiture

    Threat Intelligence

     

    Gain insight into threats targeting your tenant with the Threat Intelligence Dashboard or use our Threat Intelligence API to feed that targeted intelligence into a third party tool of your choice

    API (Application Programming Interface)

     

    Create an extensible architecture for complete visibility and efficiency by integrating Mimecast with your current or planned IT solutions

     

    Targeted Threat Protection

    URL Protect

     

    Protect your organization and employees against malicious websites containing malware, phishing and other threats through URL rewriting and on-click deep site inspection

    Attachment Protect

     

    Defend against infection from weaponized attachments often used in ransomware, keylogger, trojan and spyware attacks with multi-layered inspection including static and dynamic analysis

    Impersonation Protect

     

    Comprehensive protection against social engineering / CEO fraud / whaling / Business Email Compromise / phishing attacks targeting your employees

    Internal Email Protect

     

    Prevent the deliberate or unintentional spread of attacks internally and outbound, including automatic or manual remediation of files or emails post-delivery

     

    Email Continuity & Recovery

    Sync & Recover

     

    Continuous synchronization of email that ensures an email or entire inbox can be recovered following an attack, breach or user error

    Email Continuity

     

    Allows the organization to continue to communicate internally and externally during any planned or unplanned email service downtime with a 100% SLA on email availability

     

    Archiving & Email Retention

    30 Day Email Retention

     

    Search and restoration of email over a thirty day period in the event of accidental deletion or malicious attack

    1 Year Email Retention

     

    Search and restoration of email over a one year period in the event of accidental deletion or malicious attack

     

    Optional Addons

    Large File Send

     

    Ensure employees can easily and securely share large files up to 2GB via email whilst maintaining corporate security, compliance and data retention policies

    Secure Messaging

     

    Enable your employees to securely send confidential and sensitive information via email with administrator defined and user selectable controls and policies

    Healthcare Pack

     

    dedicated lexicons designed for those needing to meet specific regulations such as HIPAA

    99 Year Email Retention

     

    Long term data retention with a multipurpose cloud archive for compliance, e-Discovery, case review, restoration of email and increased user productivity

    Supervision

     

    Supervision provides simplified monitoring and escalation of email items from random selection or defined lexicon

    Compliance Protect

     

    Provides the organization with compliance protection for SEC17-4 type data regulations

    Email Security, Remediation & Continuity
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
    -
     
     
     
     
     
     
     
    -
    -
    Email Security, Remediation, Continuity & Archiving
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
     
    -
    -
     
     
     
     
     
     
     
     

    NOTE: Awareness Training and Web Security can be purchased in conjunction with one of the cyber resilience packages or as a standalone service.

    Awareness Training

    Core Infosecurity Change behavior and lower organizational risk with persistent, engaging security awareness training.  Help make employees part of your defense against web and email attacks, data loss, and other security threats. Phishing Simulations Test employee susceptibility with realistic phish tests. Phishing simulations are integrated with core training, making it easy to deploy reinforcement of training concepts based on test response. Risk Scoring Identify your riskiest employees so you can focus precious time and budget supporting the employees who need it most. Benchmark aggregate company score against other organizations in your industry to gauge your overall risk posture. Custom Content Enhance existing modules with supplemental training material or create your own module for training needs unique to your organization. Targeted Training Deploy additional training to employees who need it most. Create custom lists based on training performance, phishing simulation response or risk score so you can assign and send additional modules or conduct other types of training or remediation. HIPAA Modules Supplement core information security training with modules covering issues specific to the Health Insurance Portability and Accountability Act (HIPAA)
     

    Web Security

    Malicious Site Defense Protect employees and guests from accessing malicious sites with DNS-level category and security policy controls. Acceptable Use Enforcement Control what content is accessible by employees and guests by enforcing acceptable use policies through 90+ granular category filters. Intelligent Proxy Enhance analysis of requests to suspicious sites, including file downloads, by inspecting this traffic via a proxy and applying deeper-level checks including anti-virus and static file analysis. On Network Protection Protection is automatically applied for all web requests originating from employees or guests on your network. Off Network Protection Extend protection to employees when accessing the web remotely, including from home and on the move, though an on-device security agent. Protect Guest Wi-Fi Network-level controls help reduce legal and compliance risks by preventing access to malicious sites and blocking inappropriate content for visitors, customers and anyone else using your guest Wi-Fi networks. User Reporting The ability to report on web access down to a user level when the Mimecast Security Agent is deployed to employees devices.
     

    Included Optional

     

    Awareness Training

    Core Infosecurity

     

    Change behavior and lower organizational risk with persistent, engaging security awareness training.  Help make employees part of your defense against web and email attacks, data loss, and other security threats.

    Phishing Simulations

     

    Test employee susceptibility with realistic phish tests. Phishing simulations are integrated with core training, making it easy to deploy reinforcement of training concepts based on test response.

    Risk Scoring

     

    Identify your riskiest employees so you can focus precious time and budget supporting the employees who need it most. Benchmark aggregate company score against other organizations in your industry to gauge your overall risk posture.

    Custom Content

     

    Enhance existing modules with supplemental training material or create your own module for training needs unique to your organization.

    Targeted Training

     

    Deploy additional training to employees who need it most. Create custom lists based on training performance, phishing simulation response or risk score so you can assign and send additional modules or conduct other types of training or remediation.

    HIPAA Modules

     

    Supplement core information security training with modules covering issues specific to the Health Insurance Portability and Accountability Act (HIPAA)

     

    Web Security

    Malicious Site Defense

     

    Protect employees and guests from accessing malicious sites with DNS-level category and security policy controls.

    Acceptable Use Enforcement

     

    Control what content is accessible by employees and guests by enforcing acceptable use policies through 90+ granular category filters.

    Intelligent Proxy

     

    Enhance analysis of requests to suspicious sites, including file downloads, by inspecting this traffic via a proxy and applying deeper-level checks including anti-virus and static file analysis.

    On Network Protection

     

    Protection is automatically applied for all web requests originating from employees or guests on your network.

    Off Network Protection

     

    Extend protection to employees when accessing the web remotely, including from home and on the move, though an on-device security agent.

    Protect Guest Wi-Fi

     

    Network-level controls help reduce legal and compliance risks by preventing access to malicious sites and blocking inappropriate content for visitors, customers and anyone else using your guest Wi-Fi networks.

    User Reporting

     
    Awareness Training
     
     
     
     
     
     
     
     
     
     
    -
    -
    -
    -
    -
    -
    -
    Web Security
     
     
    -
    -
    -
    -
    -
    -
     
     
     
     
     
     
     
     
     

    Email Security (S1)

    Mimecast’s Email Security is a 100% cloud-based service that uses multiple, sophisticated detection engines and a diverse set of threat intelligence sources to protect email from spam, malware, phishing, and targeted attacks.

    Email Security & Remediation (S2)

    Mimecast’s Email Security is a 100% cloud-based service that uses multiple, sophisticated detection engines and a diverse set of threat intelligence sources to protect email from spam, malware, phishing, and targeted attacks. The Mimecast Email Security & Remediation solution (S2) extends Mimecast’s multi-layered inspection capabilities to both internal and outbound emails, while also providing advanced remediation capabilities.

    Provides all the features of Mimecast Email Security (S1) plus:

    Email Security, Remediation & Continuity (M3R)

    Over and above email security and remediation, Mimecast’s Email Security, Remediation, & Recovery solution (M3R) adds continuity and recovery to your capabilities. This solution provides always-on access for your email, a 1-year archive for data preservation and discovery, and the ability to recover mailboxes and data to a known good state.

    Provides all the features of Mimecast Email Security & Remediation (S2) plus:

    Email Security, Remediation, Continuity & Archiving (M3RA)

    Mimecast’s Email Security, Continuity, Remediation & Recovery solution (M3RA) extends your data archiving period to 99 years for long-term data preservation and discovery needed to satisfy legal and regulatory compliance requirements.

    Provides all the features of Email Security, Continuity, Remediation & Recovery (M3R) plus:

    Awareness Training (AT1)

    Mimecast Awareness Training is a video-based security awareness training and cyber risk management platform that empowers you to combat information security breaches caused by employee mistakes, dramatically reducing risk. Developed by top leadership from the U.S. military, law enforcement and the intelligence community, the platform combines effective, modern training techniques with predictive analytics to help you solve for your company's vulnerability to human error.

    Web Security (W1)

    Mimecast Web Security delivers cloud-based protection at the DNS level to stop malware and inappropriate web use in its tracks. This service can be used alongside any other Mimecast service or bundle or implemented standalone. Integration with Mimecast Email Security with Targeted Threat Protection means consistent protection, and simpler setup and management when both are used together.

    Web Security for Guest Wi-Fi (W1N)

    Extend web protection to all your guest Wi-Fi networks to help protect your brand and reduce legal and compliance risks. This service can run alongside Web Security for employees (W1) or as a standalone service.