You are here


Mimecast makes business email and data safer for more than 21 800 customers and millions of employees worldwide. Founded in 2003, the Company’s next-generation cloud-based security, archiving and continuity services protect email and deliver comprehensive email risk management in a single, fully-integrated subscription service. Mimecast reduces email risk and the complexity and cost of managing the array of point solutions traditionally used to protect email and its data. For customers that have migrated to cloud services like Microsoft Office 365, Mimecast mitigates single vendor exposure by strengthening security coverage, combating downtime and improving archiving. 

Mimecast Email Security protects against malware, spam, advanced phishing and other emerging attacks, while preventing data leaks. Mimecast Mailbox Continuity enables employees to continue using email during planned and unplanned outages. Mimecast Enterprise Information Archiving unifies email, file and instant messaging data to support e-discovery and give employees fast access to their personal archive via PC, Mac and mobile apps.

Lead Sponsors of the 2nd Annual AfriSecure Cyber Security Summit, Mimecast, will be presenting the Anatomy of an Email-Borne Attack.

Where we'll paint the current threat landscape for attacks and demonstrate an actual live 'hack'.

Ever wonder why it's so darn easy for cyber criminals or hackers to attack your organization, steal your data, or hold it for ransom? Let's face it: email is still the biggest entry point into your organization, even in secure environments. Security threats are real and debilitating, and they aren't going away anytime soon.

Join us for a FREE Anatomy of an Email-Borne Attack Conference, where we'll paint the current threat landscape for attacks and demonstrate an actual live 'hack'.

When: 19 October
Time: 07h00 Registration – Coffee & Pastries  Start Time 08h30
Where: Maslow Hotel, Rivonia Road, Sandton

You will learn:

  • Why and how the threat landscape is evolving
  • How your email can be used as an entry point in multiple types of attack
  • Attacker methodologies and the tactics and tools being used to exploit your users
  • How to enhance your email security and thus improve your overall cyber resilience