Mimecast - Unique Features: Products
Mimecast offers a cyber resilience platform that is unique in that it allows complex routing scenarios, large file sharing, and perpetual retention, features sandboxing, and is built on a multi-product, multi-tenant, and cloud-native architecture that is capable of providing micro services. It has other newly launched unique features such as the Mimecast Threat Intelligence and the Mimecast Threat Center. These features are unique because they were described as such by Mimecast, third-party analysts, customers, and business software reviewers.
Complex Routing Scenarios
- According to research platform Expert Insights, Mimecast's email security solution, unlike that of its key competitor Proofpoint, is capable of complex routing. This means that with Mimecast, customers with several mail servers distributed across the globe have the option to direct user messages to the user's local mail server.
- Mimecast's complex routing feature makes it the better option for enterprises with multiple mail servers that are distributed across the globe. Expert Insights says Mimecast is clearly the best choice for enterprises, as it is capable of handling more granular filtering policies and more sophisticated routing scenarios.
Large File Sharing and Perpetual Retention
- According to Expert Insights, Mimecast is unique because, unlike its rival Proofpoint, it offers large file sharing and perpetual email retention.
- Expert Insights says large file sharing is one of the unique features of Mimecast.
- It also reports that unlike Proofpoint, which offers email retention of at most ten years only, Mimecast gives customers the option of upgrading at a later date to perpetual email retention.
- According to SC Media, a media company focusing on cybersecurity, Mimecast has a unique sandbox technology through which customers can run email attachments to verify if they are safe.
- Business software discovery platform Crozdesk says Mimecast's sandboxing technology is Mimecast's flagship feature.
- Mimecast's sandboxing technology creates a virtual environment where email messages are first opened and examined. In this virtual environment, email messages undergo full security examination. An email message is delivered to the intended recipient only when it is determined that the email message is absolutely clean and safe.
- Mimecast's cloud architecture is often described as unique. In Mimecast's earnings call for the fourth quarter of fiscal year 2019, Peter Bauer, chairman and chief executive officer of Mimecast, specifically said that its unique cloud-native, multi-tenant architecture enables Mimecast to deliver all its offerings "as part of a contiguous suite on a common underlying code base."
- In an article published by Seeking Alpha, a content service provider for financial markets, it was highlighted that Mimecast's solutions are constructed on a unique architecture that enables Mimecast to provide better experiences than those offered by its competitors.
- In Mimecast's earnings call for the second quarter of fiscal year 2020, Bauer highlighted Mimecast's unique architecture again. He said that Mimecast's unique cloud architecture is the reason Mimecast is able to protect its customers better than its competitors.
- SC Media says the fact that Mimecast's cloud solution sits between email endpoints makes it easy to understand how Mimecast is able to maintain an outstanding success rate.
- In explaining why organizations should choose Mimecast, Mimecast highlights on its website that it unifies the management and delivery of security, data protection, and continuity in a single, easy-to-use cloud platform.
- Mimecast, in its latest investor presentation, notes that its architecture is unique because it is the only multi-product, multi-tenant, cloud-native platform in the market. This architecture enables Mimecast to offer an integrated, scalable solution for its customers.
Mimecast Threat Intelligence
- This new community-based and tailored service, which was launched in August 2019 and comprises Threat Remediation, a Threat Dashboard, and Threat Feed with Threat Intelligence and Threat Remediation APIs, was designed to provide customers with a more granular perspective of the attacks Mimecast has detected and stopped.
- The insights and increased visibility that the new service provides enables users to respond and react more easily to malicious files and threats.
- Thomas Cronkright II, chief executive officer of wire fraud prevention platform provider CertifID, describes the new service as "a unique, incredibly easy to use value-added service."
- The Threat Remediation feature, which can be accessed right from the Mimecast Administration Console, enables users to remove or restore messages as necessary.
- The Threat Dashboard displays malware detections, malware forensics, malware origin via geo-location, the most at-risk end-users, and Indicators of Compromise (IoCs).
- The Threat Feed, through the Threat Remediation API, allows users to integrate Mimecast Threat Intelligence into their respective security ecosystems, which may consist of security information and event management (SIEM) systems, security orchestration, automation, and response (SOAR) systems, end-point protection, and next-generation firewalls.
- The Threat Feed, through the Threat Intelligence API, facilitates detection and remediation by offering users aggregated threat data from around 35,000 Mimecast accounts. The data provides benchmarks against which users can compare themselves.
Mimecast Threat Center
- The Mimecast Threat Center, which was announced in March 2019, offers Mimecast customers a unique view of the email-based threat landscape and informs them of the latest email security tactics, procedures, and techniques.
- Through the Threat Center, a team of cybersecurity experts led by Joshua Douglas, Mimecast's vice president for threat intelligence, provides customers actionable threat intelligence insights and reports to help them manage their email security better. Among the insights and reports the Threat Center provides are email security risk assessments (ESRAs), and research and analysis on vulnerabilities, targeted malware, targeted threats.
- The insights that the center provides are unique because of the amount of data Mimecast has access to. Mimecast has access to billions of emails across the globe, and each day, Mimecast blocks over one billion malicious or suspicious emails, including spam, directory harvest attacks, phishing emails, and malware emails.
- The Threat Center unveils new email-related bugs and vulnerabilities, and continuously researches attack methodologies and techniques.
In identifying the unique features of Mimecast's products in the email security space, we utilized a number of strategies. First, we checked what Mimecast itself says is unique about its products and services. We did this by examining Mimecast's website, press releases, reports, and presentations, and by checking what Mimecast has to say about why organizations should choose Mimecast.
Second, we looked at what third parties say is unique about Mimecast. Articles about Mimecast that were published by Seeking Alpha, The Motley Fool, and SC Media were the sources we found helpful. Both Seeking Alpha and The Motley Fool offer investing advice, while SC Media focuses on providing insights about cybersecurity.
Third, we looked for comparisons of email security solutions with the hope that these comparisons highlight the unique features of each email security solution. In this regard, the comparisons offered by Expert Insights and Crozdesk proved useful. We learned through these comparisons that Proofpoint is Mimecast's key competitor.