Skip navigation
All Places > The Mimecaster Central Blog > Blog > Authors user.W5wIBL9gRo

Achmad Chadran is Senior Product Marketing Manager, Archiving, at Mimecast. He's been in awe of the brilliance, patience, and tolerance of his coworkers since coming on board in April of 2016.


This morning, we announced an exciting new product, Sync & Recover for Exchange and Office 365.

As with so many of our products and capabilities, we owe you, our community, tremendous thanks for participating in our beta testing program, for giving us your invaluable feedback, and indeed for asking for this capability at the outset!


The new feature bundle leverages archive data to fill a major functionality gap in Office 365, which offers no backup and recovery service. Until now, you needed to back up Office 365 data to an on-prem infrastructure (essentially undoing the advantages of migrating to the cloud), deploy a cloud-based point solution (adding operational and vendor management complexity), or do nothing...and hope for the best.


Sync & Recover for Exchange and Office 365 lets you derive even greater value from your archive data by simplifying the restoration of Exchange data that’s been lost or corrupted. True to its name, the product lets you support Exchange Server, Office 365, and hybrid environments, and so can help simplify your migration to the cloud.


With Sync & Recover, you can enjoy all the benefits of Office 365 without having to manage numerous point solutions, haggle with multiple vendors, or even install hardware or software.


This announcement marks a significant expansion in our ability to help you architect for email cyber resilience. General availability is scheduled for late August.


See more information about Sync & Recover for Exchange and Office 365.


Once again, thank you for being part of the community!

Achmad Chadran is Senior Product Marketing Manager, Archiving, at Mimecast. He's been in awe of the brilliance, patience, and tolerance of his coworkers since coming on board in April of 2016.


There’s been some discussion on Mimecaster Central lately about the forthcoming General Data Protection Regulation (GDPR).


When implemented, its impact will be far-reaching, since any organization anywhere in the world that retains or processes EU residents’ personal data will be subject to its provisions. The regulation places EU residents squarely in control of their own personal data. The heavy burden placed on organizations as a result comes primarily from two processes: Subject Access Requests (SARs) and so-called “Right to be Forgotten” (RTBF) requests.


GDPR and Cybercrime                                                          


Surprisingly, little has been said about the challenges of overhauling privacy in the current era of phishing and ransomware. The combination of growing regulatory burdens and the increasingly volatile threat landscape put organizations in a double bind. The GDPR emerged in part as a response to the growing cybercrime threat, yet its directives to retool organizational policies, processes, and structures stand to compound the burdens of well-intentioned organizations.


Email at the Epicenter


Over 90 percent of phishing cybercrime exploits begin with email, making it the single biggest threat vector to organizations and the data they manage. Furthermore, not only are emails a common vehicle to share and exchange personal data, email servers are prime repositories for such data as names, email addresses, and associated contact information.


Managing GDPR risk starts with securing your data and infrastructure against the litany of email threats mentioned above. In addition, to suit GDPR mandates for reporting on and deleting personal data upon request, your email infrastructure needs to streamline search and e-discovery.


Finally, every user in your domain must be vigilant against the onslaught of email-based attacks, and play a vital role in notifying your Data Protection Officer (DPO) of any suspected privacy breaches.


To help guide your journey to GDPR compliance, download the Osterman Research whitepaper, GDPR Compliance and its Impact on Security and Data Protection Programs.


Additionally, to help you be successful in the GDPR era, we’ve set up a solution page on our website, GDPR for Email, with a mix of third-party materials and our own Solution Brief. We fully anticipate adding to this page in the coming months!

Achmad Chadran is Senior Product Marketing Manager, Archiving, at Mimecast. He's been in awe of the brilliance, patience, and tolerance of his coworkers since coming on board in April of 2016.


With November now behind us, let me be the first to say, “’Tis the Season!”Ripples in water, waves of change....


No, I don’t mean the holiday season; the Big Box retail community announced that occasion the day after Halloween!


I’m referring to the archiving analysis season. Forrester Research published its The Forrester WaveTM: Information Archiving Cloud Providers, Q4 2016 several weeks ago, and Gartner just this week released its 2016 Magic Quadrant for Enterprise Information Archiving. In addition, IDC published Mimecast — Archiving Software Capabilities, back in September.


When considered as a set, these three reports paint a picture of archiving in a state of transformation.


A Vendor Melting Pot


The most interesting insights come from a comparison of the Forrester and Gartner industry surveys. Not surprisingly, the mix of vendors included in the two analyses differs somewhat. Tech consultancies like these need to define their markets in their own terms. Among other benefits for doing this, these firms need to: address the concerns of their buyer-side clients, leverage the expertise of their analyst authors, and set proper expectations among their readership.


But both reports include wide vendor diversity, including former records management specialists, instant messaging platform providers, and content management system developers. These vendors also arose from a mixed bag of vertical markets as well, including the legal, finance, and call center segments.


What brings us together as a vendor community? The primacy of email. Email is a vital enabler for virtually all functions within an organization. Reliance on email also sweeps across virtually every organization, no matter what vertical it serves or what product or service it provides.


Email’s ubiquity makes it a source of corporate knowledge and lore, as well as a running documentary of an organization’s past, present, and future. This drives the need to protect and preserve emails, which in turn makes cloud-based archiving solutions strategically essential.


New Use Cases


This same ubiquity has had a transformative impact on how organizations can leverage their archives, too. Make no mistake: Archiving remains mission-critical for organizations that need to satisfy regulatory compliance requirements, as well as more broadly to mitigate legal risk. What’s more, the growing list of legal cases seems involve a limitless range of scenarios, some of which may relate only tenuously with an organization’s core business.


But with continued growth in email volumes and growing variety of file attachment types, cloud-based archiving now serves numerous other business needs, including enhanced mobility for end-user enablement and layered protection against email-borne malware and social engineering assaults. Finally, with spiraling growth, cloud-based archiving can offer tremendous benefit for streamlining mailbox management and reducing the burden of email-related trouble ticketing on IT departments.


Reflecting on a Mimecast Milestone


It seems as much a fact of coincidence as of destiny that this reflection comes on the heels of Mimecast’s one-year anniversary as a publicly traded company. We attribute a great deal of our success to the cross-currents shaping the email and archiving markets. All the same, it’s critical for us to continue to monitor these markets for shifts in direction and the emergence of new needs, use cases, and modes of doing business.


We’re in this for the long haul. These reports provide a sort of pointillist snapshot of the market space we live in, and the myriad needs of our community. While we’re gratified to have come this far, we can savor our successes only for a fleeting moment before diving back into the work at hand.


The Forrester Wave™ is copyrighted by Forrester Research, Inc. Forrester and Forrester Wave™ are trademarks of Forrester Research, Inc.


The Magic Quadrant for Enterprise Information Archiving, © 2016 Gartner, Inc. All rights reserved. Gartner is a registered trademark of Gartner, Inc.

Achmad Chadran is Senior Product Marketing Manager, Archiving, at Mimecast. He's been in awe of the brilliance, patience, and tolerance of his coworkers since coming on board in April of 2016.


Rampant, despicable, and devastatingly effective, ransomware attacks continue to grab headlines and drain bank accounts. How best to protect against this threat?


The prevailing advice among IT security experts is to adopt a remediation strategy using a backup-and-recovery solution. This is based on the fast-evolving nature of these threats: to thwart security software, cybercriminals change their ransomware tactics and software constantly. Eventually, these experts argue, even the most comprehensive and up-to-date frontline defenses will be breached.


I happen to disagree with this position. Why, you may ask? Let me share a personal trauma I experienced many years ago.


A Personal Growth Story


I got the career opportunity of a lifetime while in my late twenties, which came with an exciting relocation from my hometown Washington DC to New York City. Once I found a suitable bachelor’s pad, I took out renter’s insurance, on the advice of thoughtful friends. True, the concept was simple and compelling: for a couple hundred bucks a year, if I was to lose any of my personal property in the event of fire or theft, I was covered for the full cost of replacing it.


I took to my new career chapter, my exciting new life, with gusto. I was all set. Or so I’d thought until a few months later: I came home from work one night to find my apartment had been ransacked. At some point that day, a burglar casually climbed up the fire escape and broke in. I had left my kitchen window unlocked.


Where Remediation Falls Short


What about my renter’s insurance? I was covered, wasn’t I?


It turns out I was and I wasn’t. For starters, my claim took over six weeks to process. Second, I was reminded that certain losses - photos, personal gifts, a running list of Hollywood screenplay ideas – simply couldn’t be replaced, no matter how much coverage I paid for. Finally, because the burglar (or burglars) turned my place inside-out, I needed to stay with friends, and do cleanup and remediation on nights and weekends.


The Ransomware Parallel


How does this relate to ransomware?


Well, as with backup solutions, taking out my renter’s insurance policy was the right thing to do. My costly mistake lie in carelessly leaving that window unlatched. In other words, remediation without prevention. The price I paid for that error: the lengthy recovery process and the irreplaceable valuables I had accumulated over time.


But there was also the cost of temporarily sleeping on friends’ sofas. Even as I took care of remediation, I needed to vacate my flat for a few weeks. This is a lot like the downtime companies often suffer during and after a ransomware attack.


It’s all about layers


In a nutshell, this is the thinking behind the layered approach that Mimecast advocates for ransomware protection. We recommend our customers deploy a combination of preventative, remedial, and continuity measures to achieve a more complete level of safety against ransomware. At the preventative layer, a defense like our Targeted Threat Protection can apply several techniques to block email-borne ransomware, including Impersonation Protect, URL Protect, and Attachment Protect technologies. (We see countless remnants of ransomware attacks – fully neutralized – in our cloud grid by the way, every day.)


To cover for the rare event that an attack manages to breach this line of defense, we recommend our customers use an email archive to rebuild their email states as they existed in the moments prior to incursion. Finally, we recommend an email continuity service to help sustain operations during the attack’s onslaught, as well as during system recovery.


History doesn’t have to repeat itself


I’ve long since left New York for a more pastoral, small-town, family-friendly central Massachusetts life. Not only do I have a good homeowner’s insurance policy; I also have a home alarm system, with sensors on my doors and windows. I learned a valuable lesson all those years ago through this ordeal, a lesson that’s still relevant today.


I hope you’ll take my experience and its implications into consideration as you architect your own ransomware protection solution. (Of course, you should feel free to contact us if you need any help.) Whatever you do, please take precautions before the unthinkable strikes. And make sure those windows stay latched.