Bob Adams is a Cyber Security Strategist at Mimecast. Originally joining Mimecast nearly four years ago as a Sales Engineer, Bob was recruited to Product Management after developing various unique ways of investigating cyber attacks and highlighting Mimecast's services. Bob now continues to use his time to help educate companies on protecting themselves against advanced cyber threats.
Hello Mimecast administrators! I’m pleased to introduce a new blog series tailored just for you. As a follow-up to my Top 10 Ways to Optimize Mimecast Targeted Threat Protection (TTP) Guide, I wanted to share my thoughts on why I wrote it and provide additional insight into the topics discussed.
My goal is to help Mimecast admins evaluate their current security settings and get the most out of their Mimecast services. It’s important to remember that Targeted Threat Protection and its product updates are not enabled by default, as there are numerous settings that will vary from organization to organization.
Whether you still need to configure your TTP settings, want to review and update them, or are interested in learning more about the various features, this guide is for you.
When reading it, first review the Before You Start section to ensure your organization is at a proper baseline before making any changes. TTP is an evolving suite of services, and this guide is designed to help you perform a review of your current environment, and learn about best practices and recent product enhancements.
Throughout this series, each blog will introduce several tips and highlight different options for best customizing Targeted Threat Protection for your environment. For example, did you know that Mimecast can prevent attackers from impersonating external organizations you work with?
Additionally, since Mimecast is built to have its services work together, I will also shed some light on how certain settings interact with other aspects of Mimecast’s services. For example, we recently launched Mimecast Web Security. If you use Mimecast as your Secure Email Gateway with Targeted Threat Protection, and use Mimecast Web Security, you’ll find that some features from URL and Attachment Protect are available to help protect your Web Security as well.
I’ll explain all of this in more detail when I cover those features and settings in the coming blogs – stay tuned and get involved! I hope this will be an engaging series, and am looking forward to your feedback. Please feel free to comment on the optimization guide, this post, or on the coming blogs.
Read the next blog in the series: Optimizing Targeted Threat Protection Part 2: Understanding Domain Detection and Impersonation