|By Business Wire||
|April 28, 2014 03:01 AM EDT||
Mimecast, a leading cloud email security provider, has announced Targeted Threat Protection, a new service to protect enterprises from the growing risk they face from spear phishing. These are targeted attacks using embedded malicious URLs or links in email that appear to come from a ‘trusted’ or known individual that then compromise an organization’s security when clicked. Mimecast Targeted Threat Protection scans all URLs in inbound email every time they are clicked by the end-user to ensure the linked site is clean and risk free. If the user attempts to visit an ‘at risk’ site, they are warned or automatically barred from viewing it. This protection will be provided on all devices used for their enterprise email account including smartphones and tablets whether they are provided directly by the employer or not. Mimecast Targeted Threat Protection will be available in July.
This new service is easy to manage for IT and security teams, as it’s controlled from a single Administration Console alongside other Mimecast services. They also get full logging and visibility of blocked links and sites to assist them with ongoing threat management, reporting and any end-user education designed to reduce future risky online behavior.
Orlando Scott-Cowley, Director of Technology Marketing, Mimecast commented: “Spear phishing is a new frontline in the battle to protect enterprise systems and data. Mimecast Targeted Threat Protection stops spear phishing in its tracks. The threats to an end-users’ inbox are constantly changing and have moved far beyond the daily barrage of spam and virus content on their work desktop. We have to protect their work and personal desktop, laptop, tablet and smartphone as today each device is used for enterprise email. IT teams know their end-users are one of their weakest security links and can be specifically targeted to get access to critical systems and valuable corporate data.”
He continued: “IT teams work hard to block the majority of external attacks at the email gateway, but an innocent click on a link to an infected webpage can undermine all this work. Even those with traditional web scanning in place may not be safe if the link is accessed from a mobile or personal device. Our service protects end-users on all devices and every time they click a link in email, because you never know if today’s safe site is still safe tomorrow.”
Security scanning or gateway services like Mimecast have made it hard for traditional spam or phishing attacks to target enterprises. As a result, determined attackers are increasingly using sophisticated and targeted spear phishing emails. These emails are often created following social engineering reconnaissance that helps to make them look legitimate. Once a link in the email is clicked, it can take users to malicious webpages that trick them into giving away sensitive credentials or even exposes their systems to malware.
Spear phishing attacks are designed to defeat even the most sophisticated security defenses. These attacks can pass through existing security gateways as the emails and embedded URLs are initially inactive and therefore clean when scanned. Phishing web content is activated later when the attacker knows all gateways have passed the email and link. Several major data breaches and hacking attacks have been initiated through the use of spear phishing or targeted email attacks of this kind.
How Mimecast Targeted Threat Protection works
- Mimecast rewrites URLs for all inbound emails – when the end-user receives an external email containing a URL, Mimecast rewrites the link at the gateway so when it is clicked, they are directed to the Mimecast cloud where the original link is checked for risks before being opened. If the link is safe, they won’t even notice the check has happened as the site will appear to open as normal.
- Links are scanned every time they are clicked to ensure they are safe – a check is done every time a link is clicked on, not just the first time. This is done for all links in every email whether the sender is ‘known’ or not. Wholesale protection of this kind is more safe and effective than attempting to detect a single phishing email and recognizes that links can start safe but be compromised at a later date.
- Links are safe on any device used to access them – Targeted Threat Protection provides the same protection whether the end-user is accessing a link in their enterprise email from their work or personal mobile or desktop device.
Benefits of Mimecast Targeted Threat Protection
- Peace of mind knowing all links clicked on in email are protected – every email is scanned and every link is protected. If they do click on something malicious they know their data and systems are protected.
- No interruption to how they work - they will hardly notice the scanning if the link is safe. The site will open as normal in the browser.
- Automatic blocking, and clear warnings and guidance if a malicious link is clicked– Mimecast will block any bad site and let them know, giving them options on what to do next based on their security profile set by the IT team.
For IT Teams:
- Simple and comprehensive protection against spear phishing for all end-users without the need for additional infrastructure or staffing on-premise – this is a simple-to-activate service integrated into Mimecast’s extensive cloud email security portfolio. No additional equipment or resources are needed on-premise to manage this service.
- Central administration and visibility for all email security issues from a single Mimecast Administration Console covering all services including Targeted Threat Protection – administrators can also set different policies by end-user based on their security profile, e.g. block outright any at risk site or offer a warning page to alert more informed users.
Mimecast (www.mimecast.com) delivers cloud-based email management for Microsoft Exchange and Microsoft Office 365, including archiving, continuity and security. By unifying disparate and fragmented email environments into one holistic solution that is always available from the cloud, Mimecast minimizes risk and reduces cost and complexity, while providing total end-to-end control of email. Founded in the United Kingdom in 2003, Mimecast serves more than 8,000 customers and 2 million users worldwide and has offices in Europe, North America, Africa and Australia.
Mimecast social media resources
As organizations shift toward IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection &E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his session at 16th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Partnerships, will discuss how to cut costs, scale easily, and unleash insight with CommVault Simpana software, the only si...
Mar. 6, 2015 07:00 PM EST Reads: 1,176
Analytics is the foundation of smart data and now, with the ability to run Hadoop directly on smart storage systems like Cloudian HyperStore, enterprises will gain huge business advantages in terms of scalability, efficiency and cost savings as they move closer to realizing the potential of the Internet of Things. In his session at 16th Cloud Expo, Paul Turner, technology evangelist and CMO at Cloudian, Inc., will discuss the revolutionary notion that the storage world is transitioning from mere Big Data to smart data. He will argue that today’s hybrid cloud storage solutions, with commodity...
Mar. 6, 2015 06:00 PM EST Reads: 2,089
Cloud data governance was previously an avoided function when cloud deployments were relatively small. With the rapid adoption in public cloud – both rogue and sanctioned, it’s not uncommon to find regulated data dumped into public cloud and unprotected. This is why enterprises and cloud providers alike need to embrace a cloud data governance function and map policies, processes and technology controls accordingly. In her session at 15th Cloud Expo, Evelyn de Souza, Data Privacy and Compliance Strategy Leader at Cisco Systems, will focus on how to set up a cloud data governance program and s...
Mar. 6, 2015 04:15 PM EST Reads: 1,143
Roberto Medrano, Executive Vice President at SOA Software, had reached 30,000 page views on his home page - http://RobertoMedrano.SYS-CON.com/ - on the SYS-CON family of online magazines, which includes Cloud Computing Journal, Internet of Things Journal, Big Data Journal, and SOA World Magazine. He is a recognized executive in the information technology fields of SOA, internet security, governance, and compliance. He has extensive experience with both start-ups and large companies, having been involved at the beginning of four IT industries: EDA, Open Systems, Computer Security and now SOA.
Mar. 6, 2015 04:00 PM EST Reads: 1,598
The industrial software market has treated data with the mentality of “collect everything now, worry about how to use it later.” We now find ourselves buried in data, with the pervasive connectivity of the (Industrial) Internet of Things only piling on more numbers. There’s too much data and not enough information. In his session at @ThingsExpo, Bob Gates, Global Marketing Director, GE’s Intelligent Platforms business, to discuss how realizing the power of IoT, software developers are now focused on understanding how industrial data can create intelligence for industrial operations. Imagine ...
Mar. 6, 2015 03:15 PM EST Reads: 1,624
We certainly live in interesting technological times. And no more interesting than the current competing IoT standards for connectivity. Various standards bodies, approaches, and ecosystems are vying for mindshare and positioning for a competitive edge. It is clear that when the dust settles, we will have new protocols, evolved protocols, that will change the way we interact with devices and infrastructure. We will also have evolved web protocols, like HTTP/2, that will be changing the very core of our infrastructures. At the same time, we have old approaches made new again like micro-services...
Mar. 6, 2015 02:30 PM EST Reads: 3,279
Every innovation or invention was originally a daydream. You like to imagine a “what-if” scenario. And with all the attention being paid to the so-called Internet of Things (IoT) you don’t have to stretch the imagination too much to see how this may impact commercial and homeowners insurance. We’re beyond the point of accepting this as a leap of faith. The groundwork is laid. Now it’s just a matter of time. We can thank the inventors of smart thermostats for developing a practical business application that everyone can relate to. Gone are the salad days of smart home apps, the early chalkb...
Mar. 6, 2015 02:15 PM EST Reads: 899
Operational Hadoop and the Lambda Architecture for Streaming Data Apache Hadoop is emerging as a distributed platform for handling large and fast incoming streams of data. Predictive maintenance, supply chain optimization, and Internet-of-Things analysis are examples where Hadoop provides the scalable storage, processing, and analytics platform to gain meaningful insights from granular data that is typically only valuable from a large-scale, aggregate view. One architecture useful for capturing and analyzing streaming data is the Lambda Architecture, representing a model of how to analyze rea...
Mar. 6, 2015 02:00 PM EST Reads: 1,595
Today’s enterprise is being driven by disruptive competitive and human capital requirements to provide enterprise application access through not only desktops, but also mobile devices. To retrofit existing programs across all these devices using traditional programming methods is very costly and time consuming – often prohibitively so. In his session at @ThingsExpo, Jesse Shiah, CEO, President, and Co-Founder of AgilePoint Inc., discussed how you can create applications that run on all mobile devices as well as laptops and desktops using a visual drag-and-drop application – and eForms-buildi...
Mar. 6, 2015 01:45 PM EST Reads: 3,502
SYS-CON Events announced today that Vitria Technology, Inc. will exhibit at SYS-CON’s @ThingsExpo, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Vitria will showcase the company’s new IoT Analytics Platform through live demonstrations at booth #330. Vitria’s IoT Analytics Platform, fully integrated and powered by an operational intelligence engine, enables customers to rapidly build and operationalize advanced analytics to deliver timely business outcomes for use cases across the industrial, enterprise, and consumer segments.
Mar. 6, 2015 01:45 PM EST Reads: 1,489
Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 16th Cloud Expo at the Javits Center in New York June 9-11 will find fresh new content in a new track called PaaS | Containers & Microservices Containers are not being considered for the first time by the cloud community, but a current era of re-consideration has pushed them to the top of the cloud agenda. With the launch of Docker's initial release in March of 2013, interest was revved up several notches. Then late last...
Mar. 6, 2015 01:00 PM EST Reads: 1,228
SYS-CON Events announced today that Dyn, the worldwide leader in Internet Performance, will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Dyn is a cloud-based Internet Performance company. Dyn helps companies monitor, control, and optimize online infrastructure for an exceptional end-user experience. Through a world-class network and unrivaled, objective intelligence into Internet conditions, Dyn ensures traffic gets delivered faster, safer, and more reliably than ever.
Mar. 6, 2015 01:00 PM EST Reads: 1,141
In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect at GE, and Ibrahim Gokcen, who leads GE's advanced IoT analytics, focused on the Internet of Things / Industrial Internet and how to make it operational for business end-users. Learn about the challenges posed by machine and sensor data and how to marry it with enterprise data. They also discussed the tips and tricks to provide the Industrial Internet as an end-user consumable service using Big Data Analytics and Industrial Cloud.
Mar. 6, 2015 12:30 PM EST Reads: 3,544
Performance is the intersection of power, agility, control, and choice. If you value performance, and more specifically consistent performance, you need to look beyond simple virtualized compute. Many factors need to be considered to create a truly performant environment. In his General Session at 15th Cloud Expo, Harold Hannon, Sr. Software Architect at SoftLayer, discussed how to take advantage of a multitude of compute options and platform features to make cloud the cornerstone of your online presence.
Mar. 6, 2015 12:00 PM EST Reads: 3,791
The explosion of connected devices / sensors is creating an ever-expanding set of new and valuable data. In parallel the emerging capability of Big Data technologies to store, access, analyze, and react to this data is producing changes in business models under the umbrella of the Internet of Things (IoT). In particular within the Insurance industry, IoT appears positioned to enable deep changes by altering relationships between insurers, distributors, and the insured. In his session at @ThingsExpo, Michael Sick, a Senior Manager and Big Data Architect within Ernst and Young's Financial Servi...
Mar. 6, 2015 12:00 PM EST Reads: 1,542
Even as cloud and managed services grow increasingly central to business strategy and performance, challenges remain. The biggest sticking point for companies seeking to capitalize on the cloud is data security. Keeping data safe is an issue in any computing environment, and it has been a focus since the earliest days of the cloud revolution. Understandably so: a lot can go wrong when you allow valuable information to live outside the firewall. Recent revelations about government snooping, along with a steady stream of well-publicized data breaches, only add to the uncertainty
Mar. 6, 2015 11:15 AM EST Reads: 1,001
Mar. 6, 2015 10:30 AM EST Reads: 2,895
PubNub on Monday has announced that it is partnering with IBM to bring its sophisticated real-time data streaming and messaging capabilities to Bluemix, IBM’s cloud development platform. “Today’s app and connected devices require an always-on connection, but building a secure, scalable solution from the ground up is time consuming, resource intensive, and error-prone,” said Todd Greene, CEO of PubNub. “PubNub enables web, mobile and IoT developers building apps on IBM Bluemix to quickly add scalable realtime functionality with minimal effort and cost.”
Mar. 6, 2015 10:00 AM EST Reads: 5,050
Docker is an excellent platform for organizations interested in running microservices. It offers portability and consistency between development and production environments, quick provisioning times, and a simple way to isolate services. In his session at DevOps Summit at 16th Cloud Expo, Shannon Williams, co-founder of Rancher Labs, will walk through these and other benefits of using Docker to run microservices, and provide an overview of RancherOS, a minimalist distribution of Linux designed expressly to run Docker. He will also discuss Rancher, an orchestration and service discovery platf...
Mar. 6, 2015 10:00 AM EST Reads: 1,068
Sensor-enabled things are becoming more commonplace, precursors to a larger and more complex framework that most consider the ultimate promise of the IoT: things connecting, interacting, sharing, storing, and over time perhaps learning and predicting based on habits, behaviors, location, preferences, purchases and more. In his session at @ThingsExpo, Tom Wesselman, Director of Communications Ecosystem Architecture at Plantronics, will examine the still nascent IoT as it is coalescing, including what it is today, what it might ultimately be, the role of wearable tech, and technology gaps stil...
Mar. 6, 2015 09:45 AM EST Reads: 1,208