350 likes | 370 Views
Cyber Resilience for Email in the Cloud. Our Vision and Mission.
E N D
Our Vision and Mission The Mimecast VisionTo make the world more resilient. The Mimecast MissionTo help customers protect their employees, intellectual property, customer data, and brand reputations by providing security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization.
Cyber Resilience for Email Ensuring predictable outcome through comprehensive security controls before, continuityduring, and automated recoveryafteran attack.
Staying Safe in a Modern World places bad block people things allow good
Security Incidents Skyrocketing • 68% of Breaches Take months or longer to discover * $3.86 Million Average cost of a breach * 90+% of Breaches Involve employee error **
The Landscape: Convergence of Risk for Email End User Fatigue Advanced Threats GDPR Data Archiving @ Impersonation Attacks Ransomware Migration to Office 365
Why we feel like we are failing at Cyber Security Defense Arms Race Evolution of attacks from spamming, viruses, malware, phishing, weaponized attachments, impersonation attacks, inside attacks, supply chain attacks, creating a no win game. Data Recovery Skills Deficiencies The need for recovery when email is damaged, accidentally deleted, or your data is held hostage by ransomware? Lack of people with skills to analyze threats and respond efficiently or adapt technologies. Attacks also happen because users are making choices that expose your business. Business Disruptions You will also need to be prepared to ensure durability of your systems for your organization following a security event.
Defense In Arms Race Why it is a Defense In Arms Race 225B 6.3B 91% Emails sent everyday Email Mailboxes in 2017, growing to 7.7B by 2021 Security Threats Enter Environment through Email
Defense In Arms Race 2001 1988 1992 1999 2001 Antivirus Protection Malware Protection Spam Protection URL Protection Impersonation Protection 1987 – Vienna Virus 1988 – AV technology Today – Signature-less 1988 – Internet Worm 1992 – OS proliferation Today – Ransomware 1987 – Identified 2001 – Threat Use Today – 76% Affected 1994 – Commercial 1999 – Threat Use Today – 66% Email 1994 – Identified 2001 – Threat Use Today – Most advanced
Human Error is involved in over 90+% of all security incidents. We need to reduce risk at the source! “But it looked so real.” “I didn’t send those emails.” “All I did was click.” “That resume was from a friend.” The Consequences • Stolen company/customer data • Loss of revenue/customers • Damage to your brand • Fines, legal fees, etc. • Less productive workforce A significant breach can change your company’s entire trajectory
Improving the Skills Deficiency Where are there deficiencies? 1.5M 1.5Yrs -10% Unfilled IT positions in Technology Field in US Alone Average career term for IT Administrator Role Continuous Decline in STEM candidates meaning reduced pipeline
Improving the Skills Deficiency Education Ensuring that IT team and employees are educated and continuously aware of risk Technology Enforcing security capabilities and driving more automation to the vendors Staffing Optimizing resources to best facilitate network and security operations requirements
Threat Protection A multi‐layered inspection system that is effective against both widely used commodity attacks as well as customized and highly targeted attacks Recoverability Adaptability Mimecast simplifies and automates the process of recovering email and other data held within your corporate email environment. Leverage third‐party threat intelligence, optimizing and deploying leading technologies, conducting ongoing threat analysis, automating remediation services, and delivering inline user education. Durability Mimecast provides an email system that remains 100% available while ensuring the integrity of the data stored within.
Email Security • Phishing attacks • Ransomware • Malware • Malicious URLs • Anti-spam & virus • Inbound, Internal and Outbound Secure Email Gateway Targeted Threat Protection Internal Email Protect URLProtect Attachment Protect Impersonation Protect Data Leak Protection & Content Control Expanded Security Options Email Continuity Sync & Recover Secure Messaging Large File Send
Mimecast Targeted Threat Protection URL Protect with URL rewriting and dynamic user awareness Evolving and comprehensive protection, achieved simply in the cloud. Internal Email Protect Detection and remediation of internal security threats Plus inspection of outbound emails Attachment Protect With safe-file conversion, on-demand and pre-emptive sandboxing Impersonation Protect with dedicated detection of email impersonation and malware-less phishing
Impersonation Identifiers Name is one of my users Domain is like one of my domains Keyword dictionary Newly observed domain Reply-to mismatch Domain reputation services to check on mail flow seen in the last 7 days. VIP user list
Compromised Insider Careless Insider Malicious Insider
Compromised Accounts Attacker uses stolen user credentials to spread attack internally and/or externally Internal Email Threats Careless Users “Oops, I sent it to the wrong person…again.” Malicious Insiders Purposely distributing malware or malicious URLs 60% 59% 61% Of email traffic is internal, employee to employee and outbound. Of organizations will suffer a negative business impact from an email-borne attack this year. Attacks where malicious activity spread from one infected user to other employees via email. Global research from Vanson Bourne, commissioned by Mimecast, 2018.
Mitigating Business Disruption How do you measure uptime? 23Days 27% $3.6M Average time to resolve a ransomware attack Likelihood of a recurring data breach over the next 2 years Average cost of a data breach ($141 of cost per lost data record)
MIMECAST SOLUTION Business Continuity • Seamless always-on access to email via Outlook • Mobile device access • 100% continuity SLA • Recovery time objective = 0 • Security Monitoring & Reporting • Security policies maintained during downtime
Eliminate the impact of downtime Continuous email flow with advanced security • Keep business moving • Continuous access to email from anywhere, on any device • Online authentication ensures employee access even if AD is unavailable • Ensures both inbound and outbound DLP policies are in place during an attack. • Maintain employee productivity • Continued email flow with access to inbox and folders and personal archives • 100% uptime SLA. • Security team can triage attacks while systems remain online. • Monitoring, alerting and response • Out of band notifications for admins and employees • Near-zero recovery time (RTO) and recovery point (RPO) • Contains lateral movement off attacks and remediates threats
Awareness Training • Engaging, proven training • Phish testing • Predictive risk scoring • Individualized training Awareness Training Engaging Training Phish Testing Risk Scoring Targeted Remediation
Mimecast Security Awareness Training Over 35 Training Modules Risk Scoring Dashboard Engaging Training Videos Combines effective, modern video training techniques with predictive analytics to solve for your company's vulnerability to human error. The first complete model for measuring employees' security knowledge, sentiment, and engagement, and using that data to build individual risk profiles Topics ranging from phishing, passwords, PCI Compliance, Ransomware, CEO/Wire Fraud and GDPR. Attack simulations can test employee security efficacy. Human error is involved in 95% of all breaches
And when your employees don’t like it… Don’t Learn The Right Thing To Do Not Engaged Or Paying Attention Dismissive Attitude Towards Security
Cloud Archive Cloud Archive • Multi-purpose solution • Data archive, backup and recovery • E-Discovery, compliance, end user search • Leader in Gartner MQ, four years' running E-Discovery Compliance End User Search Expanded Archiving Options Supervision Sync & Recover Long Term Retention
Compelling Need For Archiving IT COMPLIANCE LEGAL • E-discovery • Investigations • Early case assessment • Regulatory Compliance • Audits • Fines • Backup /Recovery • End-user search • Reduce costs, satisfy • users
Want to learn more about Mimecast? Visit us at: www.Mimecast.com Mimecast Security Blog: https://www.mimecast.com/blog/ Mimecaster Central KB Community: https://community.mimecast.com/