Microsoft 365 Email Security (Powered by Mimecast)

Upgrade Microsoft 365's standard email filtering to an industry-leading, five-star protection system.

Interested in industry-specific solutions? Read more about our IT services for recruitment agencies or law firms.

Benefits to
email security

Email security

We’ve partnered with Mimecast to provide cloud-hosted email threat solutions.

Unlock phishing protection, ransomware prevention and spam filtering. Mimecast Targeted Threat Protection is seamlessly integrated with our UK customers’ email services.

Email is an integral part of how every business operates but it also represents a weak link for organisations due to the prevalance of ransomware attacks and human error. A recent survey found that 90% of businesses have seen an increase in the number of email phishing attacks over the past 12 months and 40% have seen the volume of impersonation attacks increase (source: mimecast.com).

A laptop with an email showing and an exclamation mark over it

How Mimecast works

We have substantial experience in implementing Mimecast email security solutions for Microsoft 365 and Exchange. Every email that your company receives is put through three stages of threat assessment at a speed and detail that human precautions are unlikely to achieve. The three stages of our hosted email filtering service are:

1. Attachment
inspection

We look at any attachments within the email and carry out the following checks:
  • Check for specific file types & macros
  • Run checks against malicious file database
  • Sandbox email attachments and open them in a safe environment to see if they execute as expected

2. Inspection
of URL's

Next we examine any URL’s within the email and perform the following checks:
  • Check any URLs in the message
  • Resolve them through to end destination
  • Check against malicious URL database
  • If the URL downloads a file this is executed in a safe sandbox environment
  • Content on the URL evaluated for spoofed content

3. Email content
checks

Finally we inspect the content of the email for the following:
  • Check against sender blocked/permitted lists
  • Check DNS authentication
  • Check sender reputation (Mimecast Greylisting)
  • Scan for spam (Mimecast Spam Filtering service)
  • Carry out content and impersonation checks (Mimecast Phishing Protection etc.)

Email continuity service

In the event of a cyber attack, our Email Continuity service can allow no interruption in accessing your emails. All emails would fully recoverable due to the continuous sync and recover service. 

Email will remain the main threat posed to organisational security going forward, either through attacks by hackers or user error. 

FAQs

Yes marking email addresses as permitted or banned is easy to do and you have full control.

By default Mimecast allows files up to 200MB (inbound & outbound) but you have total control to limit.

White Atlas Cloud writing with a 15 degree split between the two words

WHY CHOOSE us?

Not just secure, reassuringly secure.

There are two types of IT service provider.

One will do everything possible to secure the technology they’re responsible for. The other will do everything possible to keep their customers’ cyber security risks low.

Atlas Cloud is the second type of provider.

Why does that matter? Read more about us or review our case studies.

Trusted in high-compliance industries

contact us

Make security one less thing to worry about.

Get in touch to schedule a free consultation about assuring your IT provision.

Atlas Cloud Logo

get started

The more information you can provide, the better prepared we can be for your first call with us.

Your data is safe with us and will be used solely for the purpose of this enquiry. See our privacy policy for more.

New Research

Our recent, nationwide research shows what can be learnt from working during lockdown. Download the report today.

Sign up to newsletter?*
Privacy Notice: We won’t sign you up to any marketing mailing lists (unless you ask us to*) but we may email you to make sure you have been able to access the content successfully. View our privacy policy.