Security that works together, in action. ElevateX 2026 brings together our partner ecosystem, CrowdStrike, Zscaler, SentinelOne, Netskope, Arctic Wolf, and Amazon Web Services (AWS), for a day built around real Mimecast integrations and what they mean for your security posture. Register now: https://lnkd.in/eDRAzG8F
About us
Human Risk, Secured Mimecast is transforming the way businesses manage and secure human risk. Its AI-powered, API-enabled connected human risk platform is purpose-built to protect organizations from the spectrum of cyber threats. Integrating cutting-edge technology with human-centric pathways, our platform enhances visibility and provides strategic insight. Our technology safeguards critical data and actively engages employees in reducing risk and enhancing productivity. More than 42,000 businesses worldwide trust Mimecast to help them keep ahead of the ever-evolving threat landscape. From insider risk to external threats, customers get more with Mimecast. More visibility. More agility. More control. More security. For help, please email support@mimecast.com.
- Website
-
https://www.mimecast.com/
External link for Mimecast
- Industry
- Computer and Network Security
- Company size
- 1,001-5,000 employees
- Headquarters
- London, England
- Type
- Privately Held
- Founded
- 2003
- Specialties
- Email Security, Email Continuity, Email Archiving, Services for Microsoft Office 365, Web Security, Cyber Resilience, Awareness Training, and Human Risk Management
Locations
Employees at Mimecast
Updates
-
Everyone's racing to adopt AI. Many are struggling with how to govern it. Which is why we’re excited to announce that Mimecast’s Governance, Compliance & Insights (GCI) platform now integrates with the Claude Compliance API. With this integration, Mimecast customers can preserve, search, produce, and archive Claude Enterprise conversations using the same workflows and legal hold controls they already rely on. No new interface. No retraining. One unified governance layer that now extends to enterprise AI. Read the full announcement here: https://lnkd.in/efG4YZpR
-
-
Where do you start with insider risk management? Our 9-step guide breaks down everything you need to build a program that protects your people and your data. Download now: https://lnkd.in/evSzyBaQ
-
-
Shadow AI. MCP servers. Autonomous agents. Embedded copilots. Is your security stack built to handle any of it? Catch our VP of Product Marketing, Mark Guntrip, at the Gartner Security & Risk Management Summit for a session on securing the AI attack surface and where to start: https://lnkd.in/ec5EAAFA
-
3% to 17%. That's how fast AI-written phishing emails grew in under a year. CISO Leslie Nielsen joined Amanda Razani on Full Tech Ahead Podcast to unpack what our 2026 State of Human Risk Report means for security leaders right now. 🎙️ Full episode here: https://lnkd.in/e8w3qvFh
-
-
Your employees are already using AI. The problem is most of it is happening outside the visibility of IT and security teams. 80% of organizations are concerned about sensitive data leaking through generative AI tools. Yet 60% still have no specific strategy to address it. Find out what Shadow AI is, why it matters, and what to do about it: https://lnkd.in/eXbHD63u
-
What if your biggest security threat isn't coming from outside your organization? 🤔 42% of organizations report a rise in malicious insider threats over the past year. And most aren't equipped to catch it. Matt Johansen breaks down the findings from our 2026 State of Human Risk Report. Watch now: https://lnkd.in/gxjbsis7
The Call is Coming From Inside the House
https://www.youtube.com/
-
The account takeover playbook has changed. Has your defense? Token theft. AitM proxies. QR code phishing. Attackers aren't breaking through. They're going around. Alexander Decarne breaks down what it takes to close the gap: https://lnkd.in/eKYm77Nr
-
The ElevateX 2026 session lineup is live. Fireside chats on human risk and AI-powered threats with Jenny Radcliffe - The People Hacker 🎤🎧🧠, Beth Miller, Sarah Armstrong-Smith, and Matt Saner. Plus partner sessions with Amazon Web Services (AWS), CrowdStrike, Zscaler, Arctic Wolf, SentinelOne, and Netskope covering integrations and the gaps they close in your security posture. Register now: https://lnkd.in/eDRAzG8F
-
80% of employees are using unapproved AI tools at work. More than half have pasted sensitive data into models that retain what they ingest. That is not a future risk. It is happening inside your organization right now. Our latest blog breaks down how to go from shadow AI to governed AI in 30 days, built around the three questions every CISO is being asked. Learn more: https://lnkd.in/ejeXevYr