娇色导航

Our Network

Mimecast Cloud Integrated expands security across communication channels

Overview

While email remains one of the main vectors by which hackers attack companies, a growing number of other communication channels have become vulnerable to attack, requiring additional layers of security. , global field CTO of Mimecast, demonstrates key features of the , which includes protection for email and other collaboration platforms, as well as data analytics about the most targeted employees in a company, and where major attacks are coming from.

This episode is sponsored by Mimecast, an advanced email and collaboration security company. Find out more at Mimecast.com

For a free threat scan with Mimecast's advances security, powered by AI, visit https://www.mimecast.com/free-trial/

Register Now

Transcript

Hi everybody. Welcome to DEMO, the show where companies come in and show us their latest products and services. Today, I'm joined by Edwin Moreno, he is the global field CTO at Mimecast. Welcome to the show, Edwin. ?

Thank you for having me. ?

So, what are you showing us today here? ?

So today I'll be going through our Mimecast Cloud Integrated platform. So this is actually one of our newer solutions that we've released. We've really transitioned from our traditional cloud gateway offering to this gateway solution we're very excited to show you. ?

Who within a company is this really designed for? Is it IT? Is it the email security folks? Big enterprises, small businesses, everybody? ?

This solution is really meant to be an additional layer of security for anyone that's using Microsoft. A lot of the people that are using this, whether it's the email security teams as infrastructure security, but it's really those individuals that are looking for that extra layer of protection.

Maybe Microsoft's not giving them natively. ?

What problems are you solving with this that might not have been solved before? What have companies done previous to this where they really need this product? ?

What we really see is there's a lot of companies out there that are using native offerings, Microsoft does have some of these capabilities out of the box, but typically what they'll come to us because there's threats that they were expecting should be stopped that are just getting through, right?

This is where I think of us as a security tailored organization. We're looking for phishing emails. We're looking for business email compromise. We're looking for malware where Microsoft has a platform, fantastic, , but we're going to help them when it comes to extra security controls. ?

Were a lot of companies using appliances and on-premise software or on-premise hardware to do a lot of these email security things? Why is cloud better than maybe some of these on premise tools? ?

Traditionally, organizations that did want extra security, they were going with security gateway. So SAGs, whether that was on premise or even cloud offerings there.

Really, what we see, though, is a lot of people don't want to actually make the transition of an MX redirect, which is what a SAG requires.

So really, what they want to do is get full capabilities out of Microsoft, whether using E3, E5 keep that stuff enabled, , but then just add Mimecast as an additional layer there. ?

All right, so stick around until the end of the show, because we've got a cool surprise for you. But Edwin, let's just jump right into the DEMO. ? Fantastic.

What you're seeing here is our cloud integrated console, right? The goal here, though, is because who's using this as you asked previously, they're typically security organizations sophisticated, but maybe they don't have all the resources or the people to spend on a full blown solution, right?

So they're looking for a simple setup, cloud integrated, because it doesn't require an MX redirect. Typically, it's deployed within five minutes. And then we also have the ability of doing things like historical scan. So what you see here is all the detections that we've seen this environment.

As an administrator, I don't know people will log in. Simple dashboard. Is there anything for me to do? You have a good idea of being to see trends. Are you seeing more or less threats over time? But let's start to get into some of the good stuff.

Where are these attacks actually coming from? Because you might want to get to a point where you have geographical restriction controls if you're not actually doing legitimate business with China, for example. Why are you even allowing those IPs, right?

And then let's actually look at the other graph, which is admin login by origin. Imagine if we don't have any administrators that I know that are actually out of South Africa, right? And I start to see three logins. There is someone compromise, that's definitely raising a red flag.

I want the easy ability of being to log in first screen to be able to see this, but let's continue showing you more. ? We know that users are inherently risky, but do you have an idea in terms of who's being most targeted?

A lot of organizations don't, right? So here we're going to show your top five targeted recipients, whether they're receiving malware, phishing, untrustworthy emails.

And then if you want to even go deeper into this, you can always click on that user and see all the emails that that person received. ?

Now is that just received or clicked on ? ?

So both, there's different categories, as you can see. So malware is typically inbound. Phishing is something that they've usually clicked on or they received. If you want, let me go into an example here. OK, so down below you'll see all the recent detections.

One of the biggest areas, though, where I know Mimecast is going to be bringing in that extra layer that Microsoft just isn't doing, it's around business email compromise. So this is really leveraging large language models, where you start to comprehend how people communicate.

Who sends you emails, who typically do you respond back to? Then, if all of a sudden they're starting to ask for wire transfers or direct deposit information, you might want to challenge that a little bit, right?

As an administrator, the goal here is show you all relevant information immediately. This thing has been analyzed as a phishing attack, so its current status is quarantined, so we know this wasn't delivered, right? You know the policy that's triggering it.

But as a security professional, I want to be able to look into this message and see what about this email is actually classified as potentially phishing, right? So if I look at this email, a couple things already in the subject line, there's some urgency component here.

So I already know that whatever this person's emailing me about, they want me to do something immediately. OK, I should probably be a little wary of that, right? Also look at the subject line. There's already a direct deposit update, so they're asking for me to change payroll, right?

Let's keep going. Marc van Zadelhoff, who's our CEO. Why is he emailing me from a personal email address? Oh, OK, and why is this the first time that I've ever received an email from the CEO? ?

That just doesn't that generates all these other red flags for the user, right? ?

But let's go even deeper into the body here. What about this though? What's critical is the way that our technology works is so we're leveraging both social graphing capabilities, which tracks this stuff above, who do you send emails to? Do they reply back?

Is it coming from a personal email address? But then, NLP, natural language processing then takes it further, right? So now here in this email, they're changing banks. It's direct deposit, and there's an urgency of the case, uprising before the next payroll period. ?

So this email would have been spoofing your CEO, correct? Wow, that's amazing. And you were telling me before the show that because I was asking you about how important is email? Are hackers still going in through email?

Because we hear about voice AI and text message attacks and things like that, but email is still a really big problem for a lot of companies. ?

It’s insane that the stats start, there is about 91% of threats still initiate via email. I think it's because it's pretty easy to set up random email servers out there and just start emailing people and mask and it’s typically the first form of an attack.

And if I can compromise you, I can get your credentials, for example, I can now probably pivot on that attack. So what's also interesting about cloud integration is, not only are we focused on email, we're also focused on collaboration channels.

Because if I was able to compromise you, what if I went through Teams, and what if I actually started to send malicious URLs or malicious attachments to other individuals? ?

If you could click on it, if you could get in and spoof me, then all of a sudden, I'm now asking, and I'm dropping in links. Everyone thinks it's me, and then it turns out it's not me. ?

In a lot of conversations that I'm having with customers, email is typically the first thing comes to mind, but they always say, ever since Covid, people have been more of a remote workforce. They're not having to be tied to email. ?

So do you offer protection layers across our other communications? Because now I'm worried about that. And you've got some other things too. There's, there's some awareness, I think you bring up some of the other things you have, other than just the scanning.

Because I think the whole key thing here is you can have the best technology in the world be proactive, but you're going to have those risky humans, right? So what are you doing to focus on that human element? ?

We have a solution here, which is our awareness training tool, where we're going to capture all those risk indicators. Are they failing for phishing simulations? Are they actually clicking on real life phishing attacks? Are they watching those videos that we're mandating?

But let's actually take this thought and move it forward. We should actually train people based off their risk, not treat everyone the same. So we're going to be releasing, very shortly, adaptive training. ?

And you've shown me a lot of stuff here. I'm sure you've got a ton of other features. So where can people go for more details and more information? ?

So if people go to Mimecast.com/free-trial, this is the special offer we were talking about earlier. So you'll land on this page. What we're offering right now is a free threat scam.

For organizations that want low impact, zero impact, to their to their environment, that they just want to know, hey, are there threats that I should know about, especially dormant threats.

Not only can Mimecast offer you that historical scan, we'll actually go ahead and clean up those messages there for you. And if you want to continue protecting Day Zero moving forward, have at it. ?

Edwin Moreno from Mimecast, thanks again. Thanks for the DEMO. That's all the time we have for today's episode. Don't forget to like the video, subscribe to the channel, add any thoughts you have below. Join us every week for new episodes of DEMO. I'm Keith Shaw, thanks for watching.