Mimecast Acquires Segasec
Mimecast Limited, a leading email and data security company, have this week announced the acquisition of Segasec, a provider of digital threat protection. With this innovative technology, Mimecast customers can better defend against attacks that leverage fake websites and domains for credential harvesting of their customers, employees, partners, and 3rd party vendors within their supply chains. Hackers are using sophisticated techniques to target organizations of all sizes and in all industries by using their brands as bait to launch attacks. With the acquisition of Segasec, Mimecast can provide brand exploit protection using machine learning to identify potential hackers at the earliest stages of an attack. The solution also is engineered to provide a way to actively monitor, manage, block and take down phishing scams or impersonation attempts on the web.
The acquisition of Segasec builds on Mimecast’s Email Security 3.0 approach, which helps customers protect their organizations across three key zones: Zone 1, to defend against security threats trying to penetrate the organizational perimeter; Zone 2, for vulnerabilities and threats that exist inside the perimeter; and Zone 3, for attacks taking place outside the perimeter in the larger cybersphere. Segasec’s integrated solution is designed to enhance Mimecast’s Zone 3 protection platform by providing a comprehensive approach to digital risk protection while also enriching its core perimeter defense systems for Zone 1 with intelligence gained from analysis of threats in the wild.
Integration of Segasec with Mimecast’s email and web security services is engineered to further strengthen Mimecast’s customers’ cyber resilience by enabling them to block any potentially malicious domains quickly. The integrated solution platform is built to allow organizations to implement a comprehensive cybersecurity strategy capable of dealing with modern-day threats surrounding, inside, and beyond the perimeter.
“Every brand is vulnerable to attacks that abuse and threaten the trust that employees, customers, partners and 3rd party vendors have placed in them,” said Peter Bauer, chief executive officer at Mimecast. “Segasec will allow our customers to take a proactive approach to identify -- and even potentially preventing -- attacks that imitate their brands using domains they don’t own, while also offering the visibility required to understand how their brands are being misused for malicious intent. Additionally, Segasec’s solutions strongly complement our recent acquisition of DMARC Analyzer, which simplifies the process of protecting against abuse of domains customers do own and continues to strengthen our Email Security 3.0 approach.”
Segasec’s technology is designed to monitor domains on the internet for suspected malicious activity and continuous surfaces the riskiest ones. By using machine learning and running targeted scans that identify even unknown attack patterns, the solution can help uncover both live attacks and detect upcoming ones at the earliest possible stages, often allowing customers to prevent them altogether. Segasec also offers rapid takedown capabilities for active attacks and technology that can limit the use of stolen data.
“In today’s increasingly digital economy, we rely so heavily on websites and email to interact with businesses in both our professional and personal lives,” said Elad Schulman, chief executive officer and co-founder of Segasec. “As such, brand exploitation has been on the rise, as cybercriminals co-opt the brands we depend on and violate our trust. The powerful combination of Mimecast and Segasec will help customers better protect their brands, customers and other external stakeholders, as well as their own employees.”
The Mimecast Segasec solution is designed to enable organizations to:
- Protect employees, customers, partners and 3rd party vendors from phishing scams attempting to trick them by abusing domains that are similar to their legitimate branding;
- Identify and protect against attacks where cybercriminals have cloned a website for malicious activities against stakeholders;
- Block and take down both suspicious sites and active scams.
Latest Jobs
-
- PCI QSA needed. Discreet Opportunity | London | Client facing
- London
- N/A
-
CH08421 PCI QSA needed. Discreet Opportunity | London | Client facing. Payment Card Industry - Qualified Security Assessor - London Seeking someone looking to accelerate their career, into a variety of interesting clients / projects. Must be happy to be onsite with clients- this is not a fully remote role. You must currently hold a valid CISSP or CISM or ISO27001 lead implementer certification AND one of the following; CISA, GSNA, iso27001 lead Auditor, CIA or IRCA ISMS auditor+ Visa sponsorship not available. Apply today for more information chris.holt@dclsearch.com Use this whatapp link to reach out https://wa.me/message/6USF5RAQBOZIP1
-
- Network / Security Infrastructure Engineer | West London | Permanent
- London
- N/A
-
Network / Security Infrastructure Engineer | West London | Current Config, Install, upgrade experience On prem / Datacetner experience essential. Hands on experience MUST include: Routing, Switching, Network Security (firewall, IDS etc), Microsoft exchange / Exchange 365. Scripting / automation experience wanted. Python, Powershell etc Regular travel to West London is required. Visa sponsorship not available. Apply today for more information chris.holt@dclsearch.com Use this whatapp link to reach out https://wa.me/message/6USF5RAQBOZIP1
-
- Security Operations / information Security Analyst / Engineer. London
- London
- N/A
-
Security Operations / information Security Analyst / Engineer needed for a London opportunity. A technical hands on role to investigate, escalate and proactively work to protect a globally recognised brand. Someone with SOC Analyst / security engineering background would be well suited. This position will join a small team and would suit someone that has broad experience across the security threat landscape. Experience / knowledge across industry GRC standards such NIST, ISO27001 etc very advantageous and a priority. You will work across multiple teams proactively working to secure the business. Must be able to commute to Central London 3 days a week. Visa sponsorship not available Apply today to find out more.
-
- Security Cleared Penetration Tester: United Kindom
- N/A
- N/A
-
Security Cleared Penetration Tester Deliver technical Penetration tests to the NCSC CHECK standard. Active CHECK Member or Leader status desirable either in Web Application or Infrastructure. Reach out to find out more. Whatsapp directly here https://wa.me/message/6USF5RAQBOZIP1 Or apply today