Skip navigation
All Places > The Mimecaster Central Blog > Blog > 2018 > November

Dan Sloshberg is the Product Marketing Director at Mimecast, taking the lead on the Mimecast API, GDPR and market intelligence. A Mimecaster since 2013 and over 20 years in tech, he is a frequent speaker on all things cloud, security, cyber resilience and GDPR.


We are delighted to announce yet another integration with leading SIEM solution IBM QRadar. This follows our recent announcement of Mimecast for LogRhythm and the latest update to our Splunk app.IBM Security Logo


Combating the rapidly evolving threat landscape is a constant struggle, with email remaining the number one attack vector and threats becoming more stealthy, sophisticated and evasive to detection. The Mimecast for IBM QRadar app offers organizations better detection and alerting before, during and after an attack.


Integrating Mimecast data into the QRadar system through the Mimecast data logging API allows email security data to correlate against other data sources, and be included in behavioral anomaly detection, helping to identify indicators of advanced threats that would otherwise go unnoticed.


Joint Mimecast and IBM customers can better predict and prioritize what vulnerabilities to remediate through improved visibility of attacks with highly focused alerts. The impact of an attack can be minimized through faster response times made possible by using one single system for threat intelligence and response.


Access the Mimecast for IBM QRadar application through IBM’s Security App Exchange. You can also find out more through Mimecast’s developer portal.


We also encourage all of you to share your own integration ideas here now in the community!

Bob Adams is a Cyber Security Strategist at Mimecast. Originally joining Mimecast nearly four years ago as a Sales Engineer, Bob was recruited to Product Management after developing various unique ways of investigating cyber attacks and highlighting Mimecast's services. Bob now continues to use his time to help educate companies on protecting themselves against advanced cyber threats.


Hello Mimecast administrators! I’m pleased to introduce a new blog series tailored just for you. As a follow-up to my Top 10 Ways to Optimize Mimecast Targeted Threat Protection (TTP) Guide, I wanted to share my thoughts on why I wrote it and provide additional insight into the topics discussed.


My goal is to help Mimecast admins evaluate their current security settings and get the most out of their Mimecast services. It’s important to remember that Targeted Threat Protection and its product updates are not enabled by default, as there are numerous settings that will vary from organization to organization.


Whether you still need to configure your TTP settings, want to review and update them, or are interested in learning more about the various features, this guide is for you.


When reading it, first review the Before You Start section to ensure your organization is at a proper baseline before making any changes. TTP is an evolving suite of services, and this guide is designed to help you perform a review of your current environment, and learn about best practices and recent product enhancements.


Throughout this series, each blog will introduce several tips and highlight different options for best customizing Targeted Threat Protection for your environment. For example, did you know that Mimecast can prevent attackers from impersonating external organizations you work with?


Additionally, since Mimecast is built to have its services work together, I will also shed some light on how certain settings interact with other aspects of Mimecast’s services. For example, we recently launched Mimecast Web Security. If you use Mimecast as your Secure Email Gateway with Targeted Threat Protection, and use Mimecast Web Security, you’ll find that some features from URL and Attachment Protect are available to help protect your Web Security as well.


I’ll explain all of this in more detail when I cover those features and settings in the coming blogs – stay tuned and get involved! I hope this will be an engaging series, and am looking forward to your feedback. Please feel free to comment on the optimization guide, this post, or on the coming blogs.


Read the next blog in the series: Optimizing Targeted Threat Protection Part 2: Understanding Domain Detection and Impersonation