Mimecast Email Incident Response

Email protection, made radically easy

Email Incident Response Frees You to Focus on High-Priority Alerts

Email users have become part of organizations’ defenses against sophisticated, targeted email threats. Awareness training, phishing simulation exercises and warning banners in emails combine to engage and empower them. The result is that IT teams and SOCs are becoming inundated with user reported suspicious emails. Unfortunately, 90% of these are benign, and this noise is diverting analysts from investigating other potentially more dangerous alerts.

Leveraging Mimecast Intelligence

  • Mimecast crowd sources data from almost 40,000 customers. When an email is reported suspicious, it is first inspected using the latest threat intelligence, which is used to enrich the email metadata, along with contextual information. E.g. the reporter’s past reporting accuracy, numbers of reports of similar emails and email risk score.

Automation Driven by Artificial Intelligence

  • Emails ready for analysis are automatically triaged and prioritized, enabling Mimecast’s expert analysts to rapidly classify threats and remediate all instances across your business. These classification decisions are fed back into the automation process, reinforcing machine learning models to strengthen future decisions. Finally, threat intelligence is updated, and future instances of the same threat will now be blocked by Mimecast Email Security before they reach your users.

Realize a Low Total Cost of Ownership

  • Mimecast’s scale and investment in email threat analysis automation and tooling allow us to deliver Email Incident Response at a price point few enterprises could hope to achieve for a comparable service. It removes the requirement for yet another console. There is no installation, configuration or training required, and you are still in complete control—empowered by incident forensics and a dashboard that provides full visibility of service performance.

Effective Communications Engage Users and Inform Your Analysts

  • Communications are built into each stage of the incident investigation workflow to ensure users are positively encouraged to report suspicious emails. Your security and IT teams are also part of the workflow communications and receive valuable forensic information when an incident is closed, to help with any further internal investigation.