Mimecast Advanced Email Security Explained.
Overall Satisfaction with Mimecast Advanced Email Security
The most common daily problems are spam and malware protection and Mimecast's advanced security filters, which block unwanted emails before they are sent to the recipient's mailbox. The second problem we face is Phishing and Spear-Phishing Attacks. Hence, email filtering and threat detection mechanisms also help to prevent malicious emails from reaching employees within our environment.
Pros
- Impersonation Protection.
- Attachment Sandboxing.
- URL Scanning and Link Protection.
- Regulatory Compliance.
Cons
- Reporting and Analytics Limitations.
- Complex Licensing Structure.
- Limited Features in Continuity Mode.
- Taking time to escalate to IT to release known incoming emails.
- Potential for False Positives.
- Complexity of Setup and Management.
Do you think Mimecast Advanced Email Security delivers good value for the price?
Yes
Are you happy with Mimecast Advanced Email Security's feature set?
Yes
Did Mimecast Advanced Email Security live up to sales and marketing promises?
Yes
Did implementation of Mimecast Advanced Email Security go as expected?
Yes
Would you buy Mimecast Advanced Email Security again?
Yes
Mimecast Advanced Email Security Feature Ratings
Using Mimecast Advanced Email Security
240 - Finance, Operations & Project Management, Human Resources, Legal & Compliance, Sales & Marketing, Information Technology, Quality Control & Assurance.
2 - You will need this types of people: Experienced IT Support & Helpdesk Technicians, Network and Systems Administrator's, Mimecast Administrators to configure and optimize Mimecast's security features.
- Malware Detection and Defense
- Spam & Email Filtering
- Email Continuity & Resilience
- Data Retention
- Protection against Impersonation Attacks
- Enhancing Security Awareness Training
- Protecting Third-Party Vendor Communication
- Enforcing strict access controls based on user behavior and risk scores
- Deep Integration with Zero trust security Frameworks
- Enhancing real-time anomaly detection for more proactive security responses


Comments
Please log in to join the conversation