Mimecast Presentation


Published on

"Mimecast provides a cost effective and easy to use Software-as-a-Service solution that works seamlessly with an organization\'s existing email server to deliver a ready-to-use, centrally managed archiving solution, enhancing user productivity and enabling organizations to meet legislative and regulatory compliance needs. Mimecast integrates seamlessly with Microsoft Exchange systems, is easy to scale and enables quick search and retrieval of information. \'We\'re thrilled to announce our outstanding growth within the archiving space and look forward to continuing this success for years to come,\' said Mary Kay Roberto, Mimecast\'s SVP and General Manager. \'Mimecast aims to solve organizations\' increasing compliance and e-discovery requirements with cost effective and end user-friendly solutions and we\'re very pleased to have gained recognition from the industry for this achievement.\'"

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Mimecast were founded in 2002 and spent the first couple of years heavily investing in research and development. Mimecast’s original founders are still at the helm of the company focusing the companies efforts on the company’s original goal – to provide a comprehensive Software-as-a-Service offering to solve all customer issues to do with e-mail. Mimecast is funded by private angel funders rather than venture capitalists, this allows Mimecast to focus on long-term scalability and services for its customers rather than being run to be acquired or go public. Mimecast is headquartered in London with offices in North America, South Africa and off-shore in the Cayman Islands. Mimecast maintains local infrastructure in all its locations and provides local timezone support. Mimecast was designed with scalability and performance in mind, the aim was to provide the scalability and redundancy of a carrier network with LAN-like performance. Every single day, Mimecast removes spam, rejects malware and archives millions of e-mails for thousands of customers. Mimecast focuses on e-mail and e-mail only. The aim of Mimecast since its inception has been to provide an end-to-end solution for all customer issues relating to e-mail – no matter how difficult they are to build and implement. Many other anti-virus and anti-spam vendors moved on to easier ways to make money such as Instant Messenging and Web filtering. Mimecast, in contrast, chose to build solutions for continuity, e-mail storage management, content filtration, directory harvest protection, data leak provention, e-mail branding and compliance – all from one platform, with one price and no hardware or software. Mimecast offers a comprehensive solution ‘in-the-cloud’ with the flexibility and configurability of local software. As a result Mimecast has customers in almost all vertical market segments. Mimecast is particularly strong in professional services, with over 35% of the top 100 law firms in the UK using our service. As you can imagine, lawyers are some of the most demanding customers in terms of due diligence and scrutiny of service level agreements. Mimecast maintains the world’s largest on-line archiver of e-mail, providing our customers with 24 x 7 access to their historical e-mail via the the Web or natively within Microsoft Outlook. E-mail is a changing environment, with new legislation to comply with, new ways of access the data and ever changing usage profiles. Mimecast constantly adds new features every quarter, rolled out free of charge to Mimecast’s existing customers. By buying Mimecast you not only solve your current issues, but you future proof yourself by already having a solution to solve issues you don’t even know you have yet. Mimecast’s simple one cost pricing module allows you to take the service and roll out the various unified features as you need them, with no additional cost.
  • Mimecast provides organisations with every possible e-mail service apart from actually hosting the e-mail server itself. This frees an organisation from the burden of managing potentially dozens of disparate solutions, each with their own platform to update and patch, each with their own management interface to configure policy, users, groups and report from. Mimecast aims to solve all an organisation’s issues related to e-mail both now and in the future. Unlike Managed Service providers who OEM products from third parties and tie them together, Mimecast is based on custom built software components designed to work together in a cohesive manner. Due to this, Mimecast maintains strong chains-of-custody for each mail from when it is first accepted to decades later when it is purged from the archive. Mimecast uses a cryptographic algorithm and single instance storage to ensure that data is immutable and secure once stored. Comprehensive role-based access control and auditing further ensures a data’s confidentiaity. Mimecast is deployed as Software-as-a-Service, there is no hardware to continually upgrade and migrate data from and there is no software to deploy and patch. Mimecast can be deployed in a matter of hours, solving all of an organisation’s e-mail security, continuity and archiving needs. By reducing the number of platforms needed to support e-mail services – e-mail firewalls, denial of service protection, archiving software, hierarchical storage management, intrusion protection, disclaimer management, e-mail marketing, clustering, etc – Mimecast reduces the administrative burden and management costs. Mimecast is a single platform with a single interface.
  • Mimecast supports 5 core operational areas: Security & Policy Continuity E-mail Storage Management Compliance & E-Discovery Data Leak Prevention & Content Filtration These services are provided from Mimecast’s carrier grade infrastructure based on multiple geographically dispersed data centres – each one containing a grid of hundreds of servers. These services are accessed over a secure connection through either a Web browser or from within a user’s Microsoft Outlook client – no need to retrain users or change the way they work.
  • If we take a peek inside the Mimecast cloud…. Mimecast is built upon a series of modules there are designed from the ground up to work together in a cohesive manner. Incoming e-mail is run through a series of scanning engines, each of which return a confidence value to a centralised policy engine. This engine makes a decision based on the aggregate of the values from the scanners. This analysis happens ‘in protocol’ or ‘on the wire’ with the decision and rejection being made without even accepting the e-mail. An instant standards-based rejection is sent back to the send giving reasons for the rejection, this provides instant feedback as opposed to using quarantining where messages may sit in quarantine for several hours before being acted upon. This removes the burden of dealing with quarantine, provides instant feedback for time critical e-mails and reduces an organisation’s bandwidth utilisation. Some of the techniques Mimecast use to provide protection include: Local Reputation : Mimecast maintains a reputation index for each party you communicate with. Known good parties with good reputation can avoid future spam analysis (but will always be virus scanned). Each Local Reputation database is unique to each customer, allowing Mimecast to adapt to each individual customer’s e-mail profile. Global Reputation : Mimecast takes feeds about known bad communicating parties from the Local Reputation service and shares this information among Mimecast subscribers. This allows Mimecast to reject e-mails from these parties immediately, providing pre-emptive protection from attacks such as those from botnets. Firewall and Intrusion Prevention : Mimecast offers firewall and intrusion prevention capabilities to ensure malicious content is not propagated via e-mail. Mimecast intrusion prevention does deep application level analysis of all e-mail traffic. Directory Harvest Protection : Due to Mimecast’s tight integration with Active Directory, Mimecast is able to protect against directory harvest attacks. All e-mail to accounts that do not exist are immediately rejected. Sandbox : E-mails may contain malicious scripting or may attempt to take advantage of e-mail protocols, by using sandboxing Mimecast separates e-mails into its constituent parts. Each component is then examined in a ‘sandbox’ that is designed to identify malicious content. The e-mail is then reassembled to compare it against its original form to detect protocol anomalies. Anti-virus : Mimecast puts each external e-mail through multiple different commercial, open source and custom developed anti-virus engines. Once a policy engine accepts an e-mail, it is forwarded simultaneously to the organisation’s e-mail server and three separate geographically dispersed storage grids. E-mail between internal users on Microsoft Exchange servers are forwarded to the and three separate geographically dispersed storage grids using Exchange journaling.
  • The Mimecast storage grid is spread across three geographically disparate data centres. Within each data centre commodity servers, each containing up to 4 processors and up to 8 750 Gb drives, work together in a similar way to RAID disks but contain both a storage and processing capability. Within Mimecast’s current data centres there are 63 rows of these stripes. An algorithm is used to distribute customer’s e-mail across as many different stripes to optimise the later retrieval of their data. Every e-mail entering Mimecast is stored striped across 9 different machines within 3 different data centres – ensuring optimum performance and multiple levels of resilience. The cost of maintaining the Mimecast storage grid is reduced by using commodity servers in a stripe, instead of using monolithic SAN-based storage, Mimecast is able to bring a new stripe on-line and migrate portions of the data within an impact on service quality. The Mimecast grid can be expanded horizontally by adding more servers to each stripe, or vertically by adding more stripes. All data within the Mimecast grid is cryptographically hashed and encrypted using AES 256 bit encryption. Each customer has a unique key known only to them, Mimecast maintains no interface to gain access to data stored on the grid. All transactions, including searches are recorded in a immutable audit log.
  • As I mentioned earlier when explaining the processing grid, Mimecast security is provided ‘in protocol’ without the need for quarantine. Mimecast’s Local Reputation database ensures that legitimate e-mail from known good parties flow freely into your organisation. Mimecast offers a 100% virus protection SLA and no claim has ever been made under it. Due to Mimecast’s tight integration with Active Directory, Mimecast is able to protect against directory harvest attacks. All e-mail to accounts that do not exist are immediately rejected. Because Mimecast’s processing grid is based on a grid architecture designed to process dozens of millions of e-mails a day and reject malicious attacks in protocol, Mimecast protects organisations from e-mail borne denial of service attacks.
  • E-mail is a mission critical application but is often not treated as such by the organisation. It is only when there is an outage that people realise how critical it has become. Employees, partners and customers like the asynchronous nature of e-mail, as well as the record of the communication and it remains the preferred method of communication for many people. Bounced messages increase the sender’s workload and increase their frustration. Bounced e-mails to partners and customers damages the reputation of your organisation – if you can’t keep an email server up can you build a good product/run a good service. In some industries, records must be kept of transactions. Often these are submitted via some form of e-mail workflow. Not being able to record these e-mails would breach this legislation. E-mail is often an intrinsic part of ordering workflow, orders that come in during downtime remain unfulfilled and the customer unsatisfied. Even worse they may be lost forever, pushing business to your competitors. With the rise of handheld e-mail devices and 3G data cards, downtime of a mail server is now more visible than ever. Even worse, now users can call you to complain from the very device they can no longer receive e-mail on. Even a short outage may generate dozens of calls to deal with at the time where IT departments should be concentrating on solving the issue. E-mail system are some of the most utilised servers within any organisation and require upgrading and patching. Continuity is important not just to handle unforeseen events, but also to continue to provide e-mail services while enabling IT departments to undertake serving of the mail platform without the need to do this at weekends or have to rushed to complete upgrades. Mimecast can provide service while you maintain your email service, automatically resyncing email to your server once it is back online – senders while not even notice the outage and your users need only click a different folder in Outlook. So how does Mimecast work in continuity scenarios?
  • Mimecast provides several flexible ways to access your e-mail in continuity environments. Mimecast provides access to both incoming new and historical e-mail via a secure Web-based interface, users can read, forward and reply to incoming e-mail using nothing more than their Webbrowser. In fact, if you only use Microsoft Outlook Web Access for e-mail, Mimecast provides a more secure platform for remote Web-based e-mail as you remove the need to run an Internet Information Server with API connections back to your Exchange server from within your DMZ. What really separates Mimecast from all other continuity vendors is that we offer Mimecast + Services for Outlook – a plug-in for Microsoft Outlook 2003 and 2007, using Microsoft proprietary Exchange protocols (rather than other solutions that just render a Webpage within Outlook). This allows users to access incoming e-mail in continuity scenarios simply from within Outlook, users also have the ability to see and search all of their historical e-mail directly within Outlook – providing a bottomless mailbox with no hardware or software to manage. Users do not need to retrain users, or constantly retrain users, as they forget how to use complex multiple in-house software solutions – Mimecast provides access to your e-mail, old and new, in a way you know from within an application you know. If you ingest your existing PST files, you now have the ability to search any of your e-mail from within Outlook. Our experience is once you provide users with easy to use access to all of their historical e-mail their efficiency goes up as they can reuse their parts of previous work in their day-to-day work. Mimecast’s POP3 service always provides access to a rolling window of 110 days worth of e-mail from any standards-based e-mail client, from desktop to mobilee device. Mimecast continuity does not need to be invoked, it is always working 24 x 7, always on.
  • So why pick Software-as-a-Service to provide e-mail storage management compared with doing this in-house? In house archiving is complex and involves multiple tiers of storage hardware (Fibre Channel Host Bus Adapters to connect servers to the Storage Area Network, Fibre Channel fabric switches, fibre interconnections between all of the components, disk arrays along with the disks inside, tape backup as well if the customer is implementing some form of hierarchical storage management), if redundancy is required for high-availability purposes this needs to be duplicated and interconnected in at least two sites. On top of the hardware, multiple tiers of software needs to be installed, managed and patched (Host Bus Adapter drivers, archiving software, Fibre Shortest Path First routing protocol on the Fibre Channel fabric, storage array management and reporting and hierarchical storage management software). It is very hard to plan what the required volume is for future e-mail storage, how many users will you have in two years, how large will e-mail attachments be in 2009, with this unpredictable growth what is the total volume of your e-mail store containing each aggregate year’s worth of e-mail in 2015? This normally results in businesses overspending on unutilised storage capacity or constantly having to add additional storage when space becomes tight. If the SAN is provided by a different business unit, you may have to go cap-in-hand continually to the SAN administrator to request additional space. The SAN may be shared with mission critical applications such as ERP and CRM, e-mail archiving needs to compete with these services for both space and utilisation of the SAN. Mimecast removes all of the tiers involved in archiving in house, every single e-mail coming into your organisation is archived automatically ‘in-the-cloud’, internal e-mails are automatically archived from Microsoft Exchange servers. The Mimecast storage grid provides unlimited high-performance storage on a massively redundant infrastructure. The biggest issue of all is caused by using an in-house solution to maintain a long term store of data….
  • As we saw in the previous slide, in-house archiving involves lots of software and hardware. Archiving is a long-term issue, you may have the internal resources to manage all of this complexity now – but what about in 3, 6 years as we enter an economic downturn? Decisions made now will need to be justified over the entire lifecycle of the archiving project – we is typically endless and continually rolling. A typical life of storage hardware is 3 or 4 years, so in a 7 year retention scenario the data will need to be initially migrated onto the archiving solution, then migrated every 3 years – 3, 6, 9, 12, 15 ….. eternally. As well as migrating the physical bits from one storage platform to another, the format of the data needs to be converted to support the latest version of the messaging platform, the archiving product, the storage management software, etc. So a 7 year retention period has a continual management over head which massively increases every 3 – 4 years with a large capital expenditure to renew the storage hardware, add to this the significant impact of having to migrate the data from one platform to another. There has to be a better way…
  • With Mimecast your data is archived automatically, no hardware and no software to renew, no data to migrate, with one fixed cost. Mimecast is designed to perform and offer the same granular configuration as an in-house solution. The Mimecast archiving solution is designed to work as a part of the Mimecast Unified E-mail Management portfolio – providing strong chains-of-custody on immutable storage. Mimecast is able to ingest e-mail from your existing e-mail server or existing .PST files, providing an instant centralised searchable store. By reducing the size of inboxes stored on e-mail servers increases their performance and responsiveness. Users continue to use their Outlook clients, with their historical e-mail appearing as a folder. Users can search across decades of e-mails, including inside attachments, at speeds rivaling or exceeding those of data stored on a local SAN.
  • Mimecast provides instant compliance for a whole host of legislative compliance and internal governance requirements. The ability to maintain proper records of e-mails is critical not just for compliance, but also for mounting prosecutions or organising a defence from a prosecution. Often, in our continually increasingly litigious society it is often the party that has the strongest evidence that wins a legal action. Having evidence with better chains-of-custody than the opposing side can curtain months of costly and disruptive legal action. Mimecast looks after every e-mail during its entire life – from the moment a connection is negotiated with the sending server to the moment you choose to purge the data from the archive. Each part of the Mimecast platform is designed to tightly integrate with the other components, this combined with rule-based access control, forensic level auditing and the use of an immutable storage platform ensure the integrity of any e-mail stored within Mimecast is rock-solid.
  • The reality of trying to deploy email retention solutions for compliance or other means usually differs wildly from the ideal. Retention is just one aspect of running a successful messaging platform – throughput, availability, usability, blocking of inappropriate or dangerous content all have their part to play. In typical environments these functions are achieved by the use of several independent point solutions, often manufactured by different vendors. All of these point solutions can act on the incoming and outgoing messages independently of one another. Most of these point solutions are not designed with retention in mind and no provision is made within them to retain both the original message acted on and the result of the action. So often within email archives we have a message retained that bears no resemblance to the one originally sent, making its use as evidence limited. Another issue of using several point solutions is it is very hard to integrate the requirements of security, continuity and retention. Almost certainly organisations will incorporate e-mail systems into business continuity plans, but will fail to provision comprehensive security and retention solutions in the event of invocation. Thus when an organisation invokes, the organisation’s threat profile increases and they breach compliance regulations. The cost of ongoing management of several different point solutions, each with different user interfaces and platforms, can be significant. The typical three or four year lifecycle for appliances and hardware requires a constant migration of data onto the new platforms while trying to maintain the availability and integrity of the data retained.
  • Mimecast is committed to continually pushing the boundaries of what a Software-as-a-Service company can offer with regards e-mail solutions. Mimecast is the first vendor to offer any kind of true data leak prevention in the cloud. Mimecast content filtration policies can filter inappropriate from both entering and leaving your organisation. Mimecast data leak prevention aims to stop internal content leaving the organisation, or restricting the transmission to approved partners or via encrypted links. Mimecast doesn’t like to tout features that it does not have in the market, but Mimecast’s commitment to data leak prevention means we don’t mind talking about some of the features you’d see as a Mimecast customer over the next couple of quarters. Remember this additional functionality is rolled out free of charge to existing Mimecast customers. Weighted dictionaries allow organisations to allocate specific values to words or phrases, each e-mail are then through rules that check whether thresholds for the aggregate value of each dictionary have been met. The ability to search phrases, as well as individual words, massively increases the context of the content. Intelligent Identifiers put known patterns through several layers of analysis to distinguish known types of content – such credit card numbers for PCI compliance, Social Security numbers for HIPAA compliance and UK National Insurance numbers. The multiple levels of analysis including length, pattern, proximity, known starting values and checksuming aim to eliminate false positives. Moving forward, Mimecast will launch a plugin that can be installed on fileservers that will crytographically hash each document stored and take note of the directory structure. Policy can then be set within Mimecast to prevent the leakage of documents from particular directories, ensure documents for other directories are only sent to specific parties or ensure that documents from another directory are always sent in an encrypted format.
  • Mimecast Presentation

    1. 1. [email_address] +27(0)41 3640264 +27(0)711647617
    2. 2. <ul><li>20 Slides </li></ul><ul><li>30 Minutes </li></ul><ul><ul><li>- Mimecast Company Introduction </li></ul></ul><ul><ul><li>- Introduction to Mimecast UEM </li></ul></ul><ul><ul><li>- Email and “chains of custody” w.r.t compliance </li></ul></ul><ul><ul><li>- Customer Case Study </li></ul></ul><ul><li>Questions </li></ul>Agenda
    3. 3. <ul><li>UK based with global operations </li></ul><ul><li>300% year on year growth </li></ul><ul><li>Protects and stores millions of email everyday </li></ul><ul><li>100% focus on email </li></ul><ul><li>Coverage in all vertical markets </li></ul><ul><li>Largest on-line archive client </li></ul><ul><li>Recognised innovation in SaaS Unified Email Management (UEM) </li></ul><ul><li>#1 Software + Services (SaaS) vendor </li></ul><ul><li>99% client retention </li></ul><ul><li>Over 1,200 customers (200+ in RSA) </li></ul>About Mimecast
    4. 4. Software + Services (SaaS) <ul><li>Software + Services vs. SaaS </li></ul><ul><ul><li>LAN based software is not dead </li></ul></ul><ul><ul><li>A hybrid strategy probably makes sense </li></ul></ul><ul><li>End user / IT manager </li></ul><ul><ul><li>Is more consistent with existing Microsoft investment </li></ul></ul><ul><li>Solution Provider (reseller) </li></ul><ul><ul><li>Extends their Microsoft LOB nicely </li></ul></ul><ul><ul><li>Creates “services drag” revenue opportunity </li></ul></ul>
    5. 5. RSA Clients Include
    6. 6. <ul><li>Exchange Server </li></ul><ul><li>Exchange failover server </li></ul><ul><li>Email marketing </li></ul><ul><li>Anti - virus </li></ul><ul><li>Anti – spam Appliance </li></ul><ul><li>Disclaimers </li></ul><ul><li>Hygiene Gateway </li></ul><ul><li>Encryption </li></ul><ul><li>Archive Index Server </li></ul><ul><li>Archive storage volume </li></ul><ul><li>Archive data backup </li></ul><ul><li>Archives SQL Server </li></ul>The Corporate email problem
    7. 7. Despite best efforts <ul><li>75% likelihood of unplanned email downtime in a given year </li></ul><ul><li>14% likelihood of planned downtime in a year </li></ul><ul><li>Average downtime is 32.1 hours </li></ul><ul><li>29% between 4 and 24 hours </li></ul><ul><li>43% lasted > 24 hours </li></ul><ul><li>Reasons </li></ul><ul><li>Server Hardware failure – 35% (18.1 hours) </li></ul><ul><li>Connectivity loss – 19% (27.4 hours) </li></ul><ul><li>Database corruption – 16% (9 hours) </li></ul><ul><li>SAN corruption – 16% (25.5 hours) </li></ul><ul><li>Natural disaster – 14% (60.8 hours) </li></ul><ul><li>Theft - 2% (48 hours) </li></ul>
    8. 8. LAN versus MSP versus Mimecast LAN MSP/ISP Mimecast Pros Pros Pros <ul><li>Control </li></ul><ul><li>Resilient infrastructure </li></ul><ul><li>Software+SaaS alternative </li></ul><ul><li>Proactive management </li></ul><ul><li>No capital outlay </li></ul><ul><li>Real-time control </li></ul><ul><li>Responsive management </li></ul><ul><li>No ongoing maintenance </li></ul><ul><li>Highly resilient utility grid </li></ul><ul><li>Off-site </li></ul><ul><li>Off-site, geographical diversity </li></ul><ul><li>Fast to deploy </li></ul><ul><li>Best of both LAN & MSP/ISP </li></ul>Cons Cons Cons <ul><li>Single POF </li></ul><ul><li>Little or no control </li></ul><ul><li>Less customization options </li></ul><ul><li>Clustering still fails </li></ul><ul><li>Aggregation of solutions </li></ul><ul><li>Bandwidth </li></ul><ul><li>1 st Line of Defense </li></ul><ul><li>Primarily security focused </li></ul><ul><li>Capital expenditure </li></ul><ul><li>Still requires on-premise </li></ul><ul><li>Management overhead </li></ul><ul><li>Clustering still fails </li></ul><ul><li>Complexity </li></ul><ul><li>Often legacy technology </li></ul><ul><li>Time to deploy </li></ul><ul><li>ISP lock-in </li></ul>
    9. 9. Market shifts to SaaS <ul><li>By 2011, 25 % of new business software will be delivered via SaaS. </li></ul><ul><li>Software as a Service will be the business model of choice by 2008 </li></ul><ul><li>Most organizations now recognize that e-mail is as critical to the well being of the firm as the phone and consequently want to provide full redundancy, as they would with any other mission-critical system. This has created a need for off-site redundancy in the case of a catastrophic failure. </li></ul><ul><li>Source: Gartner </li></ul>
    10. 10. Introducing ‘Unified Email Management™’ <ul><li>Security and Policy Enforcement </li></ul><ul><li>Continuity </li></ul><ul><li>E-mail Storage Management </li></ul><ul><li>Compliance & E-Discovery </li></ul><ul><li>Data Leak Prevention & Content Filtration </li></ul><ul><li>Everything for the inbox - All ancillary services for email </li></ul><ul><li>Total control, visibility and end-to-end management </li></ul><ul><li>Software-as-a-Service: no software or hardware to implement </li></ul><ul><li>Suitable for organisations of all sizes </li></ul><ul><li>Connect in hours </li></ul><ul><li>Reduce costs by up to 75% </li></ul>
    11. 12. Protects existing investments <ul><li>Coming Q3 2008 </li></ul>
    12. 15. Security <ul><li>Spam protection, no quarantine required </li></ul><ul><ul><li>- Unique Ect compliant approach </li></ul></ul><ul><ul><li>Zero content based False Positives </li></ul></ul><ul><li>Prioritisation of legitimate email </li></ul><ul><li>100% virus protection record </li></ul><ul><li>Directory harvest attack protection </li></ul><ul><li>Denial of Service protection </li></ul>Mimecast Security success:
    13. 16. Continuity <ul><li>Email is mission critical </li></ul><ul><ul><li>- Employee, partner and customer aggravation </li></ul></ul><ul><ul><li>- Lost employee productivity </li></ul></ul><ul><ul><li>- Damage to reputation </li></ul></ul><ul><ul><li>- Regulatory breaches </li></ul></ul><ul><ul><li>- Lost trade </li></ul></ul><ul><li>Downtime is more visible than ever </li></ul><ul><li>Outage both scheduled & unscheduled </li></ul>
    14. 17. Mimecast keeps your users working during an outage <ul><li>During an outage, Mimecast enables work to continue with: </li></ul><ul><li>Incoming: access new incoming email that can't be delivered to primary email servers </li></ul><ul><li>Historic: Run rapid searches and access historic email (up to 10 years of data) </li></ul><ul><li>Create new messages , read, reply, forward </li></ul>
    15. 18. Drivers for Email Retention <ul><li>Continuity of access to historical email </li></ul><ul><li>Corporate Governance </li></ul><ul><li>- Acceptable Use Policy </li></ul><ul><li>Potential litigation </li></ul><ul><li>Compliance </li></ul>
    16. 19. Email storage Management <ul><li>Archiving the hard way: In house (DIY). </li></ul><ul><li>Consider: </li></ul><ul><li>Fast growing & unpredictable data volumes </li></ul><ul><li>Software management costs </li></ul><ul><li>SAN management </li></ul>
    17. 20. Handling Data Migration
    18. 21. <ul><li>“ Bottomless” mailbox </li></ul><ul><li>Search & retrieved archived email in seconds </li></ul><ul><ul><li>- LAN like speed with carrier-grade infrastructure </li></ul></ul><ul><ul><li>- Tamper-proof immutable storage </li></ul></ul><ul><li>Unified email management™ – single interface, one cost </li></ul><ul><li>Ingest existing email – take your pain away immediately </li></ul><ul><li>Both external and internal email archived </li></ul><ul><li>Single point of control for global email data </li></ul>Archiving the easy way. Mimecast
    19. 22. Compliance & e-discovery <ul><li>Meet legislative and compliance requirements </li></ul><ul><li>Strong chains of custody </li></ul><ul><ul><li>- “Cradle-to-grave ownership” </li></ul></ul><ul><ul><li>- Complete email data set to support litigation </li></ul></ul><ul><ul><li>- Forensic level auditing </li></ul></ul><ul><li>Immutable storage – write once </li></ul><ul><ul><li>- Tamper proof </li></ul></ul><ul><ul><li>- Deletion proof </li></ul></ul><ul><li>Affordable fixed-cost bottomless compliant archive </li></ul><ul><li>Role based access and accountability </li></ul>
    20. 23. Retention for Compliance <ul><li>CIA Triad </li></ul><ul><ul><li>Confidentiality of email must be ensured </li></ul></ul><ul><ul><li>Integrity of email must be ensured </li></ul></ul><ul><ul><li>Availability of archive must be maintained </li></ul></ul><ul><li>All permutations of the email must be archived </li></ul><ul><li>Strong chains-of-custody required </li></ul><ul><li>Must provide quick and easy discovery </li></ul>Confidentiality Integrity Availability
    21. 24. Retention Reality <ul><li>Retention is just one link in the email chain </li></ul><ul><ul><li>Firewall; Denial of Service prevention; anti-spam; anti-virus; anti-phishing; email routing; Intrusion Prevention; disclaimer management; continuity; email marketing… </li></ul></ul><ul><li>Links not integrated </li></ul><ul><ul><li>Weak chains-of-custody: Integrity </li></ul></ul><ul><ul><li>Each component may alter or generate messages: Integrity </li></ul></ul><ul><ul><li>Independent logs: Confidentiality </li></ul></ul><ul><ul><li>Total resilience difficult: Availability </li></ul></ul><ul><li>Maintaining long term archive storage is expensive </li></ul><ul><ul><li>Migrations risk to integrity and decrease availability </li></ul></ul>
    22. 25. Data leak prevention & content filtering <ul><li>Detect inappropriate content </li></ul><ul><li>Keep internal content internal </li></ul><ul><li>Weighted dictionaries </li></ul><ul><li>Intelligent identifiers </li></ul><ul><ul><li>- Credit card numbers </li></ul></ul><ul><ul><li>- National Insurance numbers </li></ul></ul><ul><li>Prevention of leakage of documents from file shares </li></ul>
    23. 26. Case Study: Transnet Group <ul><li>Transnet Group </li></ul><ul><ul><li>- 16,500 end users, multiple offices </li></ul></ul><ul><li>Original Configuration 2005: Developing Email Management </li></ul><ul><ul><li>Exploring Managed Service AV/AntiSpam, On-premise email hygiene gateway, </li></ul></ul><ul><ul><li>No email archiving system, Tape backup for email continuity </li></ul></ul><ul><ul><li>- Aware of need to implement a cost effective strategy </li></ul></ul><ul><li>New Mimecast configuration: </li></ul><ul><ul><li>- Unified Email Management </li></ul></ul><ul><ul><li>- Started with Mimecast for security </li></ul></ul><ul><ul><li>- Phased in continuity services </li></ul></ul><ul><ul><li>- Turned on archiving in 1 day </li></ul></ul><ul><ul><li>- Annual cost savings close to 55% </li></ul></ul><ul><ul><li>- Radical reduction in risks and downtime </li></ul></ul>
    24. 27. Case study: Growth-Point Properties <ul><li>Largest JSE listed property group (ex Investec Properties) </li></ul><ul><li>Original Configuration: “Fragmented” email architecture shared with Investec Private Bank </li></ul><ul><ul><li>Managed Service AV/AS, On-premise email hygiene gateway, & email archiving system, Backup to tape, DR Site for email continuity </li></ul></ul><ul><ul><li>Each application causing some degree of difficulty </li></ul></ul><ul><ul><li>Expensive & lengthy process to duplicate Investec infrastructure </li></ul></ul><ul><li>New Mimecast configuration: </li></ul><ul><ul><li>Unified Email Management, all key requirements in one solution </li></ul></ul><ul><ul><li>Continuity platform for Exchange 2007 & while migrating from 2003 </li></ul></ul><ul><ul><li>Unlimited offsite email storage with triple redundancy </li></ul></ul><ul><ul><li>Strong “chain of custody” </li></ul></ul><ul><ul><li>CID standardisation </li></ul></ul><ul><ul><li>Annual cost savings close to 60% </li></ul></ul>
    25. 28. Case study: Innovation Group <ul><li>Multination solution providers to the global insurance industry </li></ul><ul><li>Original Configuration: “Fragmented” email architecture, embarked on a modernization project </li></ul><ul><ul><li>On-premise email hygiene gateway </li></ul></ul><ul><ul><li>Tape for DR strategy, no email archiving </li></ul></ul><ul><ul><li>Each application causing some degree of difficulty </li></ul></ul><ul><li>New Mimecast configuration: </li></ul><ul><ul><li>Unified Email Management™, all key requirements in one solution </li></ul></ul><ul><ul><li>Instant deployment </li></ul></ul><ul><ul><li>Continuity platform for Exchange 2003 & load-shedding </li></ul></ul><ul><ul><li>Improved email security with zero management overhead </li></ul></ul><ul><ul><li>Unlimited offsite email storage with triple redundancy </li></ul></ul><ul><ul><li>CID standardisation </li></ul></ul>
    26. 29. Recap <ul><li>Mimecast delivers: </li></ul><ul><ul><li>All ancillary email services, one interface and one cost </li></ul></ul><ul><ul><li>Strong chains-of-custody </li></ul></ul><ul><ul><li>No hardware, no software to manage, upgrade, patch and replace </li></ul></ul><ul><ul><li>Performance and granularity of a local solution </li></ul></ul><ul><ul><li>Massively parallel secure data centres </li></ul></ul><ul><ul><li>Protection from spam and malware in protocol with no quarantine </li></ul></ul><ul><ul><li>Always on access to email from within Outlook </li></ul></ul><ul><ul><li>Access decades worth of historical email within Outlook </li></ul></ul><ul><ul><li>Keep inappropriate content out and intellectual property in </li></ul></ul><ul><li>Mimecast reduces costs, complexity and management overhead while solving key technological challenges.... </li></ul>
    27. 30. Recap <ul><ul><li>Mimecast #1 Software + Services(SaaS) vendor </li></ul></ul><ul><ul><li>Mimecast is 100% focused on Unified Email Management (UEM) </li></ul></ul><ul><ul><li>Global footprint </li></ul></ul><ul><ul><li>Operating in South Africa since 2004 </li></ul></ul><ul><ul><li>Over 1,200 customers (over 200 in RSA) </li></ul></ul><ul><ul><li>Largest SaaS Email Archiving client globally </li></ul></ul><ul><ul><li>Mimecast is a channel focused company (90% of our revenue) </li></ul></ul><ul><ul><li>1 st local SaaS vendor to offer ZERO bandwidth costs </li></ul></ul><ul><li>Mimecast reduces costs, complexity and management overhead while solving key technological challenges.... </li></ul>
    28. 31. Questions ?