the human firewall is on fire - data connectors · what do you do when the smoke clears? the human...

Post on 06-Aug-2020

5 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

What Do You Do When The Smoke Clears?

The Human Firewall Is On Fire

John Kousch – Mimecast Account Manager

2

33

Say Hi To Your User For Today

44

Email: The Ultimate AppWith demanding business and user requirements

24 X 7 Email Availability

ContinuousMission-critical Mobile

© 2017 Mimecast.com All rights reserved.4

© 2017 Mimecast.com All rights reserved.5

How sure are you of your environment’s availability?

What happens when things go wrong?

© 2017 Mimecast.com All rights reserved.6

Email Security Risk Assessment (ESRA)

8

It’s cheap, ubiquitous, global, flexible, anonymous, trusted by users, integral to so many business processes

Why do attackers rely on email?

© 2018 Mimecast. All rights reserved.

225BBusiness Emails Sent Every Day

6.3BEmail Mailboxes in 2017, growing to

7.7B by 2021

O365 Cloud Service by

User Count

#1

© 2017 Mimecast.com All rights reserved.9

It Only

Takes One.

10

Introducing: Your Users

Confidential |

What do you notice?

121212© 2018 Mimecast. All rights reserved.

Impersonating Legitimate Websites

That “Apple.com” URL is really xn--80ak6aa92e.com

© 2017 Mimecast.com All rights reserved.13

Mimecast Targeted Threat Protection+ User Awareness Training:

© 2017 Mimecast.com All rights reserved.14

URL Protect

© 2017 Mimecast.com All rights reserved.15

URL Protect

© 2017 Mimecast.com All rights reserved.16

URL Protect

17

18

19

© 2017 Mimecast.com All rights reserved.20

MIMECAST CONFIDENTIAL – INTERNAL ONLY

Confidential |

Impersonation Attacks

Confidential |

Supply Chain Impersonation

23

Granular Attachment Inspection

Analyze inbound attachments with multiple AV engines + static file

analysis + behavioral sandboxing + Safe file conversion

24

Attachment Protect

25

Attachment Protect

26

Attachment Protect

27

SO WE’VE GOT INDUSTRY LEADING THREAT PROTECTION TECHNOLOGY & WE’RE TRAINING OUR USERS BUT… What if something still

gets compromised? What if you go down? What if data is lost?

© 2017 Mimecast.com All rights reserved.28

CompromisedInsider

CarelessInsider

MaliciousInsider

2929

The Smoke Clears

30

© 2017 Mimecast.com All rights reserved.31

• Effective Automated Security Controls

• Leverage global threat intelligence

• Incident / Response Dashboard

• Constantly monitor and re-check status of all file attachment fingerprints globally

Enhanced Threat Remediation

© 2017 Mimecast.com All rights reserved.32

Sync & Recover for Exchange and Office 365

• Automated Exchange Data Recovery

• No hardware or software required

• Unified administration for security, archiving, continuity, and data protection

Email

FoldersCalendars

Contacts

Mime|OS API Mime|OS API

© 2017 Mimecast.com All rights reserved.33

BeforeMimecast

ANTI-SPAM/VIRUS DLPENCRYPTION STATIONERY

ARCHIVEANTI-SPAM/VIRUS

ENCRYPTION

STATIONERY

DATA LEAK PREVENTION

ARCHIVE

AND/OR

HA

© 2017 Mimecast.com All rights reserved.34

WithMimecast

AND/OR

© 2017 Mimecast.com All rights reserved.35

Cyber Resilience for email

Threat Protection

Durability

AdaptabilityRecoverability

36

Name | Contact Info

Thank you

© 2018 Mimecast. All rights reserved.

John Kousch – Account Manager jkousch@mimecast.com978-505-6443

Thank you!!

top related