TechValidate Research on Mimecast


Mimecast Case Study

Medium Enterprise Media & Entertainment Company & Mimecast Internal Email Protect

Introduction

This case study of a medium enterprise media & entertainment company is based on a January 2019 survey of Mimecast customers by TechValidate, a 3rd-party research service. The profiled company asked to have their name blinded to protect their confidentiality.

Challenges

The business challenges that led the profiled company to evaluate and ultimately select Mimecast:

  • Their primary reason for deploying Mimecast’s Targeted Threat Protection – Internal Email Protect was because they were concerned that they were not sufficiently monitoring their internal or outbound email.
  • In the last 12 months, they confirmed that they have experienced security incidents caused by the actions of careless users who had inappropriately shared via email sensitive data or violated their organization’s security policies.
  • In the last 12 months, they confirmed that they have not been hit by an attack where malicious activity was spread from one infected user to another employee via email.

Use Case

The key features and functionalities of Mimecast that the surveyed company uses:

  • Currently has 1-5 personnel whose primary job function is IT security.
  • Out of their organization’s overall email traffic, they estimate internally generated email (internal to internal and internal to external) accounts for 26-50%.
  • They have encountered threats caused by attackers infiltrating and compromising their users’ email accounts.

Results

The surveyed company achieved the following results with Mimecast:

  • They would agree that they would recommend Mimecast Targeted Threat Protection – Internal Email Protect to their peers.
  • Since deploying Mimecast Targeted Threat Protection Internal Email Protect, they have saved approximately 21-30 hours of IT time per month.
  • They would strongly agree that the email security provided by Microsoft Office 365 on its own (whether you are using it or not) is sufficient.




About This Data

This data was sourced directly from verified users of Mimecast by TechValidate.

TechValidate verifies the identity and organizational affiliation of all participants that contribute to published research data. When research participants so desire, we also guarantee their anonymity so that they may share information honestly and freely.


More Research on Mimecast