HOME NEWS ARTICLES PODCASTS VIDEOS EVENTS JOBS COMMUNITY TECH DIRECTORY ABOUT US
at Financial Technnology Year
Email security, web security, data protection, and compliance solution designed for financial institutions. Includes threat protection, archiving, DLP, and secure messaging to help meet regulatory requirements.
Comprehensive security solutions including firewalls, encryption tools, multi-factor authentication systems, and intrusion detection systems to protect sensitive client financial data.
More Cybersecurity Infrastructure
More Compliance and Risk Management ...
Firewall Protection Implements barriers between trusted and untrusted networks to control traffic. |
Mimecast integrates a secure email gateway with advanced firewall protection, blocking unsafe attachments and URLs as part of network traffic control. | |
Intrusion Detection System (IDS) Monitors network traffic for suspicious activity and potential threats. |
Mimecast's threat protection and real-time monitoring capabilities function as an IDS, actively monitoring inbound and outbound communications. | |
Intrusion Prevention System (IPS) Actively prevents network threats identified by monitoring systems. |
Mimecast’s threat protection services actively prevent threats, not just detect, indicating IPS-like behavior. | |
Network Segmentation Divides networks into segments to restrict access and reduce attack surfaces. |
No information available | |
Traffic Encryption Encrypts data communicated within and between networks. |
Mimecast encrypts web and email traffic, providing network traffic encryption in-transit. | |
Secure VPN Access Allows remote users secure and encrypted access to internal systems. |
Mimecast offers secure VPNs and encrypted channels for remote administration and secure communications. | |
Wireless Security Controls Protects wireless communications via protocols and strong authentication. |
. | No information available |
Network Monitoring Frequency How frequently the network is actively monitored for threats. |
. | No information available |
Automated Threat Blocking Ability to automatically block threats detected on the network. |
Mimecast automatically blocks malicious URLs, attachments, and senders, providing automated threat blocking. | |
Logging and Audit Trails Maintains detailed logs of network activity for forensic analysis. |
Mimecast maintains audit trails and logs of emails and threat events. Audit logs are available for forensic analysis. | |
DNS Filtering Prevents access to malicious domains and controls web access. |
Mimecast’s web security product includes DNS filtering to protect users from malicious domains. | |
DDoS Protection Protects networks and services against Distributed Denial of Service attacks. |
Mimecast DDoS protection is referenced in service documentation as part of ensuring availability and resilience. | |
Zero Trust Network Architecture Reduces reliance on perimeter security by enforcing strict access controls everywhere. |
. | No information available |
Network Access Control (NAC) Restricts device and user access based on compliance with policies. |
. | No information available |
At-rest Encryption Ensures all stored data is encrypted on disk. |
Mimecast encrypts archived data at rest per documentation. | |
In-transit Encryption Encrypts data as it travels across networks. |
Mimecast encrypts all email traffic in-transit using TLS and similar protocols. | |
End-to-End Encryption Secures data from the origin to the intended recipient. |
. | No information available |
Key Management System Manages and rotates cryptographic keys securely. |
. | No information available |
Encryption Algorithm Strength Bit length or standard of encryption (e.g., AES-256). |
. | No information available |
Tokenization Support Replaces sensitive data with non-sensitive placeholders. |
No information available | |
Encrypted Backups Ensures all backup data is also encrypted. |
Mimecast states all backups are encrypted per best practices for financial compliance. | |
Database Encryption Encrypts entire databases or selected fields. |
Mimecast solutions for email archiving and cloud storage use database encryption. | |
Encryption Policy Management Defines and enforces data encryption standards. |
. | No information available |
Pseudonymization Options Enables privacy-preserving techniques alongside encryption. |
. | No information available |
Hardware Security Module (HSM) Integration Leverages physical devices for additional encryption security. |
. | No information available |
Automatic Key Rotation Regular automatic change of encryption keys. |
. | No information available |
Regulatory-Compliant Encryption Aligns with PCI DSS, GDPR, and similar standards. |
Mimecast advertises compliance with PCI DSS, GDPR, and other regulatory frameworks for financial services. |
Multi-Factor Authentication (MFA) Requires more than one method of authentication to verify a user's identity. |
Mimecast offers multi-factor authentication for administrative and end-user access. | |
Single Sign-On (SSO) Allows users to access multiple applications using one set of login credentials. |
Mimecast integrates with SSO providers for unified access control. | |
Role-Based Access Control (RBAC) Assigns system access based on user roles and responsibilities. |
Mimecast administrative console allows configuration of role-based access controls for management and reporting. | |
Time-based Access Restrictions Limits system access to specific time windows. |
. | No information available |
Granular Permissions Enables fine-tuned access controls down to module or record level. |
. | No information available |
Adaptive Authentication Adjusts authentication requirements based on risk factors. |
. | No information available |
Session Timeout Automates the termination of sessions after inactivity. |
. | No information available |
Password Policy Enforcement Enforces complexity, rotation, and reuse rules for passwords. |
. | No information available |
Account Lockout Mechanism Temporarily locks user accounts after a set number of failed login attempts. |
Account lockout is a standard feature for cloud-based admin and user portals; referenced in helpdesk/SAML settings. | |
Device Authentication Restricts access based on registered devices. |
. | No information available |
User Provisioning/Deprovisioning Automation Automates account creation and removal to prevent orphaned access. |
. | No information available |
Privileged Access Management Provides special controls for administrator or sensitive access. |
. | No information available |
Audit Logging of Access Attempts Maintains an immutable record of all access attempts. |
Audit logging of user access attempts is part of the Mimecast administrative dashboard and compliance reporting. |
Antivirus & Antimalware Detects and removes malicious software from endpoints. |
Mimecast provides antivirus protection and sandboxing for both inbound and outbound email. | |
Endpoint Detection and Response (EDR) Monitors endpoints for suspicious activity to respond rapidly to incidents. |
No information available | |
Device Encryption Encrypts hard drives and storage on endpoints. |
. | No information available |
Remote Device Wipe Allows administrators to erase sensitive data from lost/stolen devices. |
Mimecast supports remote device wipe via integration with Microsoft 365 and related ecosystem workflows. | |
Mobile Device Management (MDM) Centralizes control and monitoring of mobile endpoints. |
. | No information available |
Application Whitelisting/Blacklisting Restricts which applications can run on endpoints. |
. | No information available |
Patch Management Automation Automates installation of software security patches. |
. | No information available |
USB/Peripheral Control Restricts use of removable storage and peripheral devices. |
. | No information available |
Browser Security Controls Secures web browsing on endpoints. |
. | No information available |
Endpoint Health Checks Ensures only compliant endpoints can access network resources. |
. | No information available |
Real-time Threat Monitoring Provides continuous monitoring for endpoint threats. |
. | No information available |
Phishing Protection Detects and blocks phishing attempts delivered to endpoints. |
Mimecast includes phishing protection and simulation as part of its awareness and threat protection offering. |
Secure Software Development Lifecycle (SDLC) Integrates security checkpoints at each phase of application development. |
Mimecast follows secure development and application review lifecycles for its own SaaS infrastructure. | |
Static Application Security Testing (SAST) Analyzes source code for vulnerabilities during development. |
. | No information available |
Dynamic Application Security Testing (DAST) Tests running applications for vulnerabilities. |
. | No information available |
Web Application Firewall (WAF) Protects web applications from common threats (e.g., OWASP Top 10). |
Mimecast includes a Web Application Firewall on its hosted services. | |
Code Review Automation Automated scanning and review of codebases for security issues. |
. | No information available |
Vulnerability Patch Frequency How often identified vulnerabilities are patched. |
. | No information available |
API Security Tools Protects APIs from unauthorized access and attacks. |
Mimecast protects API endpoints for integrations and provides API security keys/tokens. | |
Application Penetration Testing Regular testing of application defenses by ethical hackers. |
. | No information available |
Security Configuration Management Ensures secure default configurations for all applications. |
. | No information available |
Third-Party Library Scanning Checks for vulnerabilities in third-party dependencies. |
. | No information available |
Secure Coding Standards Enforcement Mandates use of published secure coding guidelines. |
. | No information available |
Sandboxing Capabilities Runs applications in isolated environments to limit possible attacks. |
. | No information available |
User Activity Logging Records all user actions on sensitive systems. |
. | No information available |
Security Information and Event Management (SIEM) Centralizes analysis of security events and alerts. |
Mimecast supports SIEM integration and has its own security event/audit console. | |
Anomaly Detection Algorithms Uses machine learning or heuristics to spot unusual behavior. |
Mimecast leverages anomaly detection in its threat intelligence, as referenced in solution overviews. | |
Real-time Alerting Notifies security teams instantly of potential security incidents. |
Mimecast issues real-time security alerts for threats via dashboard and email/SMS notifications. | |
Automated Incident Response Initiates response playbooks or actions upon detection. |
. | No information available |
Data Loss Prevention (DLP) Monitors for, and prevents, the unauthorized movement of sensitive data. |
Mimecast includes DLP features, scanning outbound emails and attachments to prevent unauthorized data disclosure. | |
Session Recording Captures user sessions for review and auditing. |
. | No information available |
Alert Resolution Time Average time to resolve security alerts. |
. | No information available |
User Behavior Analytics (UBA) Analyzes statistical user behavior to find security issues. |
. | No information available |
Privilege Escalation Detection Detects when a user tries to gain unauthorized access. |
. | No information available |
Reporting Dashboard Provides graphical reports and summaries of user and incident data. |
. | No information available |
GDPR Compliance Meets the General Data Protection Regulation requirements. |
Mimecast advertises GDPR compliance and assists clients with fulfilling regulatory obligations. | |
PCI DSS Compliance Meets the Payment Card Industry Data Security Standards. |
Mimecast is used by PCI-regulated financial services and advertises PCI DSS compliance readiness. | |
SOC 2 Reporting Supports System and Organization Controls (SOC) 2 compliance. |
Mimecast provides SOC 2 Type II compliance reports for enterprise clients. | |
Automated Compliance Monitoring Continuously checks systems for compliance with defined standards. |
. | No information available |
Policy Management Tools Enables creation, approval, and enforcement of compliance policies. |
Mimecast allows for policy creation and enforcement for email/data security and regulatory obligations. | |
Automated Regulatory Updates Monitors and integrates regulatory change notifications. |
Mimecast monitors interpretation of regulatory standards and issues updates to customers in regulated verticals. | |
Audit-ready Reporting Generates reports immediately usable in compliance audits. |
. | No information available |
Compliance Checklist Management Tracks and manages compliance requirements and status. |
. | No information available |
Data Subject Request Management Assists with requests under privacy laws (e.g., access, delete, rectify). |
. | No information available |
Automated Incident Reporting Files regulatory notifications of security incidents per jurisdiction. |
. | No information available |
Breach Notification Timeliness Average time from breach discovery to notification. |
. | No information available |
Consent Management Tools Captures, manages, and documents client consent under CCPA/GDPR/etc. |
. | No information available |
Access Control Systems Restricts physical access to authorized personnel only. |
. | No information available |
Security Surveillance Cameras Monitors facilities with video recording for incident review. |
. | No information available |
Visitor Log Management Tracks all external personnel entering secure areas. |
. | No information available |
Biometric Access Controls Uses fingerprints or facial recognition to authorize personnel. |
. | No information available |
Alarm Systems Detects and alerts to unauthorized entry or incidents. |
. | No information available |
Physical Asset Tagging Tags and inventories critical devices for monitoring. |
. | No information available |
Equipment Disposal Procedures Ensures secure destruction or wiping of retired equipment. |
. | No information available |
Onsite Security Staffing Employs dedicated personnel for facility security. |
. | No information available |
Environment Monitoring Detects fire, water, or temperature threats to IT environments. |
. | No information available |
Secure Area Designation Defines and enforces areas with restricted access. |
. | No information available |
Physical Penetration Testing Regularly tests the effectiveness of physical security defenses. |
. | No information available |
Automated Backups Schedules and maintains regular data backups. |
. | No information available |
Backup Frequency How often data backups are performed. |
. | No information available |
Backup Retention Policy Policies for how long backups are retained. |
No information available | |
Disaster Recovery Plan Documentation Maintains comprehensive documentation for recovery procedures. |
. | No information available |
Failover Systems Automatic switching to redundant resources during outages. |
Mimecast is a cloud SaaS solution with failover and redundancy built into its hosting architecture. | |
Recovery Time Objective (RTO) Maximum allowable downtime for critical systems. |
. | No information available |
Recovery Point Objective (RPO) Maximum allowable data loss measured in time. |
. | No information available |
Ransomware Recovery Tools Capabilities to recover data in the event of ransomware attacks. |
Mimecast promotes recovery tools/procedures for ransomware in its business continuity marketing. | |
Tabletop Testing Frequency How often disaster recovery plans are tested via scenarios. |
. | No information available |
Data Center Redundancy Ensures backup systems are located geographically apart. |
Mimecast maintains geographically separated data centers for service resilience. | |
Alternate Communication Channels Provides backup communications (e.g., phone, messaging). |
. | No information available |
Third-Party Security Assessments Evaluates vendors’ security postures before partnership. |
Mimecast offers security assessments for its integrated vendors and supply chain as part of its security program. | |
Vendor Onboarding Controls Standard procedures to ensure secure onboarding. |
Mimecast conducts mandatory onboarding assessments for new vendors, as disclosed in its Trust Center. | |
Continuous Vendor Monitoring Regularly reviews vendors for changing risk. |
Continuous vendor monitoring is a foundational requirement for Mimecast's regulated client base. | |
Data Sharing Agreements Specifies how client data is shared, used, and protected. |
. | No information available |
Contractual Security Clauses Mandates specific security obligations in contracts. |
. | No information available |
Vendor Breach Notification Time Time required for vendors to disclose breaches. |
. | No information available |
Shared Responsibility Matrix Defines security responsibilities among parties. |
. | No information available |
Fourth-Party Risk Visibility Tracks risk due to your vendors’ suppliers. |
. | No information available |
Due Diligence Documentation Retention How long vendor risk assessment records are kept. |
. | No information available |
Integration Security Testing Validates the security of vendor software/API integrations. |
. | No information available |
Mandatory Security Training All staff must complete initial and periodic security training. |
. | No information available |
Phishing Simulation Exercises Regular simulated attacks to train staff in recognizing threats. |
Mimecast provides phishing simulation capabilities within security awareness products. | |
Social Engineering Awareness Includes modules on social engineering tactics and response. |
. | No information available |
Customizable Training Content Adapts content to organization roles and needs. |
. | No information available |
Incident Response Training Teaches staff their responsibilities in event of breach. |
Mimecast training solutions include incident response modules for staff awareness in the event of a breach. | |
Security Policy Acknowledgement Staff must confirm understanding/compliance with policies. |
. | No information available |
Training Completion Tracking Monitors which users have completed required courses. |
. | No information available |
Knowledge Assessment Quizzes Tests user retention and comprehension after training. |
. | No information available |
Training Frequency How often training must be renewed. |
. | No information available |
Multilingual Training Support Offers content in multiple languages. |
. | No information available |
Executive & Board Training Programs Tailored programs for senior leadership. |
. | No information available |
This data was generated by an AI system. Please check
with the supplier. More here
While you are talking to them, please let them know that they need to update their entry.