www.mimecast.com
Open in
urlscan Pro
2620:1ec:46::44
Public Scan
Submitted URL: http://www.mimecast.com/products
Effective URL: https://www.mimecast.com/products/
Submission: On December 02 via manual from HK — Scanned from DE
Effective URL: https://www.mimecast.com/products/
Submission: On December 02 via manual from HK — Scanned from DE
Form analysis
1 forms found in the DOMName: Site Search — GET /search
<form action="/search" method="GET" novalidate="novalidate" name="Site Search" id="SiteSearch" data-di-form-track="">
<div class="text">
<input id="searchQuery" class="advanced" name="query" maxlength="50" type="search" autocomplete="off" tabindex="101" data-di-id="#searchQuery">
</div>
<span style="display:none;" class="SL_swap" id="SearchLang1"></span>
<div class="submit"><input type="submit" value="Search" data-di-id="di-id-5d865940-ec64ff70"></div>
</form>
Text Content
1. 01 2. 02 3. 03 4. 04 5. 05 6. 06 7. 07 8. 08 9. 09 10. 10 11. 11 12. 12 13. 13 * EN * English * Deutsch * Nederlands Search CAREERS BLOG CONTACT SUPPORT LOGIN * Why Mimecast ✕ WHY MIMECAST * Why Choose Mimecast * Our Approach to Email Security * Industry Recognition * Customers Love Us * Cloud Native Platform COMPARE MIMECAST * Mimecast vs. ProofPoint * Mimecast vs. Microsoft 365 * Mimecast vs. Symantec * Products ✕ SEE OUR PRODUCTS * Email Security * Security Awareness Training * DMARC Analyzer * Cloud Archive * Brand Protection * Misaddressed Email Protection * Identity Graph and Machine Learning * Identity Graphing * Web Security * AI Cybersecurity * Email Incident Response * All Products > INTEGRATE & OPTIMIZE * Threat Intelligence * SAFE Score * View Integration Partners * API Developer Documentation * Mimecast Ecosystem Community GET STARTED * Choose a Plan * Get a Quote * Request a Demo * Start a Trial * Request a POC * Contact Us * Solutions ✕ BUSINESS CHALLENGES * Secure Your Email * Secure M365 * Ransomware * Business Email Compromise * Data Governance * Supply Chain Attacks * Brand Impersonation * Cyber Awareness * All Solutions > INDUSTRIES * Healthcare * Financial Services * Legal * Public Sector * Information Technology * Manufacturing * Construction * Education TRANSITION TO MIMECAST * Bolster Microsoft 365 * Migrate from ProofPoint * Migrate from Symantec * Hear From Your Peers BY SIZE * Small Business * Enterprise * Education & Support ✕ FOR CUSTOMERS * Technical Support * Mimecaster Central Community * Knowledge Base * Implementation Services * Login EDUCATION * Mimecast Education * Mimecast Certifications * Education Subscriptions * Mimecast Training RESOURCES * Resource Center * Blog * Customer Stories * Threat Intelligence Hub * Cyber Resilience Think Tank * Partners ✕ SELL MIMECAST * Partner Program * Reseller Network * Managed Service Program * Become a Partner * Partner Portal INTEGRATE WITH MIMECAST * Become an Alliance Partner * Alliance Program Developer Documentation Get a quote Menu ✕ * Why Mimecast Main menu WHY MIMECAST * Why Mimecast * Our Approach to Email Security * Industry Recognition * Customers Love Us * Cloud-native Platform COMPARE MIMECAST * Mimecast vs. ProofPoint * Mimecast vs. Microsoft 365 * Mimecast vs. Symantec * Products Main menu SEE OUR PRODUCTS * Email Security * Security Awareness Training * DMARC Analyzer * Cloud Archive * Brand Protection * Misaddressed Email Protection * Identity Graph and Machine Learning * Identity Graphing * Web Security * AI Cybersecurity * Email Incident Response * All Products > INTEGRATE & OPTIMIZE * Threat Intelligence * SAFE Score * View Integration Partners * API Developer Documentation * Mimecast Ecosystem Community GET STARTED * Choose a Plan * Get a Quote * Request a Demo * Start a Trial * Request a POC * Contact Us * Solutions Main menu BUSINESS CHALLENGES * Secure Your Email * Secure M365 * Ransomware * Business Email Compromise * Data Governance * Supply Chain Attacks * Brand Impersonation * Cyber Awareness INDUSTRIES * Healthcare * Financial Services * Legal * Information Technology * Public Sector * Manufacturing * Construction * Education TRANSITION TO MIMECAST * Bolster Microsoft 365 * Migrate from ProofPoint * Migrate from Symantec * Hear From Your Peers BY SIZE * Small Business * Enterprise * Education & Support Main menu FOR CUSTOMERS * Technical Support * Mimecaster Central Community * Knowledge Base * Implementation Services * Login EDUCATION * Mimecast Education * Mimecast Certifications * Education Subscriptions * Mimecast Training RESOURCES * Resource Center * Blog * Customer Stories * Threat Intelligence Hub * Cyber Resilience Think Tank * Partners Main menu SELL MIMECAST * Partner Program * Reseller Network * Managed Service Program * Become a Partner * Partner Portal INTEGRATE WITH MIMECAST * Become an Alliance Partner * Alliance Program Developer Documentation * Careers * Blog * Contact Support * Login * EN * English * Deutsch * Nederlands Get a quote * Home * Products PRODUCTS * Email Security With Targeted Threat Protection * Alliance & API Ecosystem * Threat Intelligence * DMARC Analyzer * CyberGraph AI Cybersecurity * Brand Exploit Protect * Email Incident Response * Information Protection * Web Security * Platform Selection * Cloud Archive * Mailbox Continuity * Awareness Training * Discovery Center * Mimecast Plans * Mimecast Plans Small Business Ready to get started? Get a Quote EMAIL SECURITY WITH TARGETED THREAT PROTECTION Mimecast Email Security with Targeted Threat Protection is a set of cloud services designed to provide next generation protection against advanced email-borne threats such as malicious URLs, malware, impersonation attacks, as well as internally generated threats. Explore Product THREAT INTELLIGENCE BETTER UNDERSTAND THE NATURE OF THE THREATS TO YOUR ORGANIZATION. Mimecast’s Threat Intelligence Dashboard: A tool that empowers you to stay ahead of security concerns by aggregating and integrating Indicators of Compromise (IoCs) and other actionable information into a single view so you have more visibility into the threats you face. Mimecast’s Threat Remediation: A control panel enabling you to respond rapidly, proactively, and comprehensively to emerging threats, keeping your organization as safe as possible. Explore Product MIMECAST AWARENESS TRAINING Human error is involved in 90-95% of all security breaches. And many of those incidents will be major. There’s about a 30% chance that you will have an incident that compromises over 10,000 records this year. Mimecast’s security awareness training platform will help you tackle human error head on, changing employee security behavior and fundamentally lowering your security risk. EXPLORE PRODUCT INFORMATION PROTECTION Email is the #1 application used by your users and the data they are sending and receiving needs to be protected. To maintain these protections, organizations need a solution that integrates Data Leak Prevention (DLP) and other email content control tools seamlessly into their environment. CONTROL CONTENT AND DLP Inspect and manage how users are sending and receiving sensitive information through email. arrow cta arrow cta SECURE MESSAGING Safely transmit and control how users share and how recipients access confidential information through email. arrow cta arrow cta LARGE FILE SEND Enable users to securely send and receive large files through email without impacting your environment. arrow cta arrow cta WEB SECURITY Mimecast Web Security protects against malicious web activity initiated by user action or malware and blocks business inappropriate websites based on customer-configured policies and Mimecast’s threat intelligence capabilities. Easy to deploy and manage, it gives you the technology needed to keep the web safe, delivered simply and cost-effectively. EXPLORE PRODUCT MAILBOX CONTINUITY MIMECAST MAILBOX CONTINUITY PROVIDES RESILIENCE BY ALLOWING EMPLOYEES TO KEEP SENDING AND RECEIVING EMAIL IN THE EVENT OF AN UNPLANNED OR PLANNED OUTAGE OF THE PRIMARY EMAIL SYSTEM. Critical security and company policies remain in place to keep email safe. Mimecast works with mail solutions that are on-premises, in the cloud or hybrid. CONTINUITY SERVICES Keep email flowing and archives accessible even if the primary system goes down. arrow cta arrow cta EXPERT INSIGHT. Resources you may be interested in: Infographic 5 COMMON MISCONCEPTIONS ABOUT EMAIL ARCHIVING Read More Media Coverage LEARNING TO WORK THROUGH THE OUTAGE, AND NOT AROUND IT Read More Datasheet MIMECAST TARGETED THREAT PROTECTION - URL PROTECT Download PLATFORMS Mimecast knows email technologies inside and out. Manage risk and better control Microsoft Office 365TM, Microsoft Exchange or Google Apps for Work. OFFICE 365 ARROW CTA Add layered security, an independent archive and continuity for when Office 365 goes down. CLOUD ARCHIVE Move to the cloud with a single, secure archive for emails, files and other content. Go beyond the boundaries of traditional archiving by creating a secure, centralized and accessible corporate memory. EXPLORE PRODUCT MIMECAST PLANS Mimecast is an integrated, cloud-based platform that's always working, always protecting. COMPREHENSIVE DEFENSE PLAN ARROW CTA Protect the perimeter and inside your network against cyber threats. All on one cloud platform. FOUNDATIONS PLAN ARROW CTA Protection at the perimeter and inside the network minimizes disruption – resilience keeps your organization working even during a cyber event. See Plans Ready to get started? Get a Quote About Us * Overview * Careers * Leadership * Investors Products * All Products * Education * Partners * Try & Buy Resource Center * News & Events * Resources * Customer Stories * Blog * Trust Center Contact Us * Global Locations * Get a Quote * Contact Support * Sales +44 (0)20 7843 2320 * Contracts * Privacy Statement * Legal * Privacy Preferences * Responsible Disclosure * Sitemap © 2003 - 2021 Mimecast Services Limited. Mimecast is a trademark of Mimecast Services Limited in the United States and other countries. All other trademarks contained herein are the property of their respective owners. This website uses cookies in order to provide you with the best possible experience and to monitor and improve the performance of the site. We have published a new cookie policy which explains what cookies are and which types of cookies this website uses. By continuing to use this site, you are agreeing to the use of cookies, unless you have disabled them. Privacy Statement Cookies Settings Accept All Cookies