user.v1YcBgOpe0

New Capabilities in URL Protect and Impersonation Protect

Blog Post created by user.v1YcBgOpe0 Employee on Sep 29, 2017

Matthew Gardiner is a Senior Product Marketing Manager at Mimecast and is currently focused on email security, phishing, malware, and cloud security.

 

It is no secret that attackers are not stopping their innovative push in pursuit of their goals: money, politics, fame...take your pick. And if anything, email as an attack vector is becoming more popular. What other "attack platform" provides the reach, low cost, and flexibility of email

 

Security customers of Mimecast can rest assured that we are not resting in our drive to clamp down on email-borne attacks. I want to highlight three recent advances that you can configure and deploy right now, depending on which Mimecast grid you're hosted:

 

  • Impersonation Protect - Policy Changes: Provides greater flexibility (block/hold/warn/bypass) in the resulting actions, depending on the specific indicators of spoofing found in a given email.
  • Impersonation Protect - Custom Targeted Threat Dictionary: Have you ever wanted to add your own keywords to complement the Mimecast managed threat dictionary? Now you can. If you have key business processes, projects, or sensitive data that attackers seek and could potentially ask for by name, you can add those to your organization's own threat dictionary, and have Impersonation Protect hunt for them in email messages.
  • URL Protect - Links in Attachments: In the category of "attackers will try and get into your organization anyway that they can," I am happy to report that URL Protect will now inspect links in attachments in much the same way that it inspects links in the body of an email. This capability, combined with the sandboxing service in Attachment Protect, provides a world-class defense against malicious attachments.

 

Check out some of Matthew's other Mimecaster Central posts:

 

New Threat Research from Mimecast: The ROPEMAKER Exploit 

Get Your Threat Data Here! 

Using DNS Authentication to Defend Against Impersonation Attacks 

Outcomes