Mimecast Solutions for the Public Sector

  • Secure Your Email

    Email security solutions that are smarter, easier, faster and more proactive

  • Secure Microsoft 365

    Your must-have email security & resilience companion for Microsoft 365

  • Ransomware

    The ransomware solution that’s complete, unified – and effective

  • Business Email Compromise

    Align people, process and technology to prevent costly BEC fraud

  • Data Governance

    Tame complexity, reduce costs and mitigate risk with GRC solutions

  • Brand Impersonation

    Defend your brand and your customers

  • Cyber Awareness

    Integrate unforgettable fun, unprecedented realism and actionable data in employee awareness training

  • Spotlight

    On-Demand, aggregated insights on behaviors like sentiment and activity across the entire organization, groups, topics and more.

  • Signal

    Continuous analysis of content based on a configurable, AI powered policy engine that allows for immediate alerting, review, and automated actions of contextual events.

  • Search & Discover

    Historical retrieval of content and context based on user, keyword, channel, People Set or DM conversation with the ability to view, filter and export conversation content. 

  • Data Hold

    Ability to contextually hold content in the Aware Data Platform from being removed by a Retention Policy based on author, Signal Rule or People Set.

  • Retention

    Create automatic data retention policies that allow for a systematic approach to removing data from the Collaboration Platform and/or the Aware Data Platform.

  • User Data Removal

    Dynamically remove data from the Collaboration Platform and the Aware Data Platform for a specific user/author.

    Platform Default Capabilities also include Foundational AwareIQ modelsSentiment NLPToxic Speech NLP, Info Quality NLPTheme Extraction, Image: NSFW, Image: Software ScreenshotLanguage Detection NLP, Behavior Indicator, Role Based AccessAudit LogsCustomer Managed EncryptionUp to 20 Aware UsersCustom Email Sender Domain and SOC2 and ISO Certification.

  • Aware Add-On Capabilities
    • Generative AI. AwareIQ Generative Summaries in Spotlight, Signal and any other future applications.
    • Image OCR Analyzer. Extract text off images (like Screenshots and other digitally rendered images) to be evaluated and indexed.
    • Bot Content Analyzer. Ingest, analyze and index content created by content platform system or third-party bots.
    • Customer Managed Keys. Allows customers to manage their own encryption keys from a third-party system like Azure Key Vault or AWS.
    • People Set Labels. Allows customer to add directory or other people attribute labels (location, department, etc.) to data ingested by Aware to be leveraged by Apps across the platform.
    • File Content Analyzer. Ingest, analyze and index files that get upload with messages from content platforms.
    • Data Assess Sets. Allow granular Data Access Sets for specific roles in Aware.
    • URL Classification. Allow for URL classifications as a condition trigger in Signal Rules for phishing and link reputation tracking.
    • Full Context API Access. Gives customers full access to Aware’s developer APIs – allowing them to build extensible workflows to and from Aware.
    • RiskIQ Package.  Includes Risk NLP classifiers (Password, Sensitive Data, Code Detection, File Names, Language, Tombstone/Delete Action
    • Aware User Expansion. Allow for expansion to future business units but controlling how many Aware users are part of the license.
  • Aware Privacy Capabilities
    • Data Access Sets Allow granular Data Access for analysis in Aware. Example: Only allow analysis from this specific Workspace Public Channel.
    • Role-Based Access. Create and assign specific users to specific Roles allowing full control of the application capability and data access a user has in Aware. Example: Grant a access to Spotlight with view only permissions, ensuring they only have access to aggregated and anonymized reporting.
    • Reporting and Rule Alerts by People Sets. Within the applications, users can include/exclude certain data by People Sets. This acts as another layer to ensure analysis is only done on the appropriate data set for the business use-case. Example: A user wants to set up an alerting rule but they want to exclude analyzing content from certain users from a certain region
    • Username Obfuscation. Anonymized usernames by default in context views where content is surfaced. Example: A user just cares about the content being shared and the employee posting it is not relevant to the use-case
    • Audit Logs. Users activity in Aware is audited and accessible by an Aware admin via Settings or Aware’s API Example: A system admin wants visibility into the behavior of Aware users and what capability they are accessing and when
    • Data Retention. Customers have full control over their data retention in Aware by setting up retention policies in the interface. These can be tailored by Source, Workspace or Channel
    • Encryption Control. Aware gives customers full control over their encryption and connection with Slack Tenant content is stored using our encryption system which support BYoK. All metadata, configuration, and Aware generated content is stored using disk level encryption.