Partner Data Sheet: Mimecast | Anomali


Partner Data Sheet: Mimecast

Know Your Adversaries, and the Email They Rode in on

Detect and respond to email-based threats with Anomali and Mimecast

Anomali and Mimecast Joint Solution Features

  • Enhanced detection and remediation with Mimecast threat feed augmenting Anomali Threat Stream and integrated with your existing security estate.
  • High Fidelity indicators of compromise from Mimecast’s global locations, ensuring every region and industry vertical is served.
  • Bi-lateral threat sharing to remove resource constraints through security automation tasks to reduce investigation and triage process.

Immediate Time-to-Value

  • Threat coverage from the number 1 attack vector — email
  • Strengthen risk-based decision making from verified indicators
  • Ingestion of non-email-based threat indicators into Mimecast for pro-active defense

Share Intelligence

Email remains the most common and widely utilized attack vector for the delivery of malware, from commodity mass-delivered to custom-built and highly targeted instances. Mimecast and Anomali have partnered to provide bi-lateral threat sharing of high-fidelity indicators to ensure perimeter technologies are aware of the latest malware-based threats, protecting the organization against infection, lateral spread, associated downtime and potential data loss.

Critical Intelligence

Up to the minute intelligence of the latest email-based threats

Reduced Risk

Protect the security estate as threats are discovered

Proactive Protection

Ingestion of multi-vector threats into email gateway

Malware Delivery


Malware remains the preferred methodology for access to your corporate infrastructure by malicious actors, and it is constantly evolving as attackers attempt to stay ahead of the security ecosystem and their detection capabilities.


Malware-based email threats stopped by Mimecast, are shared across your ecosystem from the endpoint, to network, and cloud solutions.

Customer Benefit:

Increased protection, reduced resource utilization and enhanced malware analysis and knowledge.

Deeper Understanding


Threat correlation is challenging when looking across the vast number of security technologies deployed within an organization. Obtaining a view of the initial deployment methodology, characteristics and subsequent access attempts is time consuming, involves multiple toolsets and requires a high amount of manual effort.


Threat intelligence feeds from external sources, and organizational toolsets combined into a single platform with analysis capabilities to view the entire attack chain, and subsequent vulnerabilities which require remediation.

Customer Benefit:

Reduced risk through enhanced understanding of threats across the security estate including email.

Download Now