CDW Limited

CDW Mimecast Secure Email Gateway - M3R

Mimecast helps companies protect their employees, intellectual property, customer data, and brand reputations by providing comprehensive, cloud-based security and compliance solutions that mitigate risk and reduce the cost and complexity of creating a cyber-resilient organization

Features

  • Anti Virus; Anti Spam
  • URL Protection
  • Attachment Protection; Impersonation Protection
  • Internal Email Protect
  • Threat Remediation
  • Stationary (branding, signatures and disclaimers)
  • Data Leak Prevention Tools
  • Email Continuity; Email Synchronisation and Recovery

Benefits

  • Detection and protection against known cyber security threats
  • Advanced threats launched from URLs, Attachments, Impersonation
  • Consistent stationary aligned to your business and organisation
  • Data Loss Prevention and content examination to secure information
  • entering, exiting, and moving within an organization.
  • Protects inbound, outbound and internal email flow
  • Enables mail flow when Primary mail service is offline
  • Enables synchronisation of email and recovery of individual,
  • folder and mailboxes. These can be restored, exported and
  • point in time snapshot.

Pricing

£36.00 a user a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@uk.cdw.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 12

Service ID

4 3 6 0 5 1 2 3 8 8 0 8 2 5 5

Contact

CDW Limited Andy Wood
Telephone: 0161 837 7744
Email: tenders@uk.cdw.com

Service scope

Software add-on or extension
Yes
What software services is the service an extension to
Exchange, Office 365, G-Suite
Any application enabled compatible with SMTP routing.
Cloud deployment model
Private cloud
Service constraints
S2 supports inbound and outbound mail flow along with internal mail flow.
System requirements
  • Mainly browser compatibility but other pre-requisites are listed
  • On Mimecaster Central https://community.mimecast.com/s/

User support

Email or online ticketing support
Email or online ticketing
Support response times
This would be dependent on the Legendary Customer Success Package chosen. Further details can be found within the "Service Brief Customer Success Offerings" and the "Mimecast Service Levels and Support" documents attached
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
None or don’t know
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
This would be dependent on the Legendary Customer Success Package chosen. Further details can be found within the "Service Brief Customer Success Offerings" and the "Mimecast Service Levels and Support Description" documents attached
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Mimecast provides four implementation options; Core Connect (internet based wizard & Email support), Managed Connect (Wizard & Implementation assistance contactable by phone and email), Managed Implementation (Dedicated implementation engineer proactively driving your implementation), Advanced Implementatation (Proactive dedicated implementation engineer, advanced support, project documentation, optional Mimecast project manager).
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
Mimecast provides exgestion/extraction services along with the ability for administrators to export content directly from the Administration Console in pdf, csv or xls and Emails and attachments can be exported from the Archive in Zipped EML or PST formats.
End-of-contract process
All customer data is deleted from the Mimecast Cloud service.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 10
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari 9+
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
  • Windows Phone
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
NONE
Service interface
Yes
Description of service interface
Single Web Based Administration console allowing access to all required controls and settings.
Accessibility standards
None or don’t know
Description of accessibility
Supports WCAG 2.0 System Interfaces
Accessibility testing
None
API
Yes
What users can and can't do using the API
Update polcies, users, block lists, integrate with 3rd party systems such as SIEM and SOAR
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
No
Customisation available
Yes
Description of customisation
Branding, various policies, settings, notifications, email signatures and disclaimers, authentication requirements options.

Scaling

Independence of resources
There are a number of operational level agreements that include acceptable response times for search as an example. As well as a number of service level agreements.

Analytics

Service usage metrics
Yes
Metrics types
Emails processed, rejected emails, and communication flows; for outbound, inbound and internal, as well as email bandwidth and rejected traffic; sent, rejected, and the data volumes being transmitted;
Reporting types
  • API access
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Mimecast

Staff security

Staff security clearance
Other security clearance
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Supplier-defined controls
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Other
Other data at rest protection approach
As above and least priviledge models.
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
A third-party destruction service

Data importing and exporting

Data export approach
Mimecast provides exgestion/extraction services along with the ability for administrators to export content directly from the Administration Console in pdf, csv or xls and Emails and attachments can be exported from the Archive in Zipped EML or PST formats.
Data export formats
Other
Other data export formats
  • PDF, csv and EML.
  • XLS, ejf; zipped eml and pst
Data import formats
Other
Other data import formats
  • EML
  • XLS, CSV

Data-in-transit protection

Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Legacy SSL and TLS (under version 1.2)
  • Other
Other protection between networks
TLS Encryption (version 1.2 or above), A combination of TLS, SSL (HTTPS), LDAPS, SMTPS is used as well to secure all types of data in transit.
Data protection within supplier network
  • TLS (version 1.2 or above)
  • Other
Other protection within supplier network
TLS Encryption, encryption of data at rest, encryption of all physical media, physical access controls.
All customer data is independently encrypted and Mimecast operates with least priviledge model.

Availability and resilience

Guaranteed availability
"Please see details at https://www.mimecast.com/globalassets/documents/termsandconditions/sla_and_support_terms.pdf

Email Delivery Credit Fee
<100% but >=99% 10%
<99% but >=98% 20%
<98% but >=97% 30%
<97% but >=96% 40%
<96% 50% and Customer may terminate the Agreement and receive a pro-rata refund of any unused pre-paid fees."
Approach to resilience
"This information is available on request.

In brief, the platform is completely resilient with data replicated across diverse physical locations ensuring no single points of failure."
Outage reporting
"Public Dashboard / Website announcements
Emails
Other communications including phone and text notification available as required."

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Username or password
  • Other
Other user authentication
Users may interact with an authentication form requring username and password input and optionally a second factor. Integrated Windows Authentication requires no interaction by the end user. Public key authentication usually requires no interaction by end users. SAML can vary based on a customer's own deployment as this is a third party product brokering the authenticaiton but usually SAML products primarily authenticate using username and password prompt.
Access restrictions in management interfaces and support channels
The management interface is granular in allowing access on a per user basis for predefined rights. Authorised users are allowed to log support queries.
Access restriction testing frequency
At least every 6 months
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
User-defined

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Certification Europe
ISO/IEC 27001 accreditation date
02/08/2017
What the ISO/IEC 27001 doesn’t cover
N/A
ISO 28000:2007 certification
No
CSA STAR certification
Yes
CSA STAR accreditation date
01/09/2012
CSA STAR certification level
Level 1: CSA STAR Self-Assessment
What the CSA STAR doesn’t cover
The full certification details can be found here: https://cloudsecurityalliance.org/star/registry/mimecast/
PCI certification
No
Other security certifications
Yes
Any other security certifications
  • SOC 2 Type I and Type II,
  • ISO 27018, ISO 22301,
  • Www.mimecast.com/company/mimecast-trust-center/

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
  • ISO/IEC 27001
  • Other
Other security governance standards
ISO 27018, and 22301
Information security policies and processes
Mimecast is accredited with ISO 22301:2012 and ISO 27018:2014 and follows strict policies and procedures to maintain the highest levels of information security.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Stringent change control procures are in place to maintain operational and service level agreements. All changes are fully documented including roll back procedures.

Updates to the service follow a regular schedule and the impact is communicated to relevant parts of the business and customers. Changes to systems that could impact or compromise existing security and control procedures are subject to review by the Mimecast Information Security Team prior to acceptance.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
"Mimecast reviews vendor security bulletins and utilise the corporate SIEM system to log and identify any possible issues.

The severity of vulnerabilities are assessed on impact vs likelihood and risks are adjusted accordingly for manual analysis and system events. Critical vulnerabilities can be deployed globally throughout the Mimecast infrastructure within minutes."
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
The entire platform is monitored 24 x 7 and system and network logs are entered into a centralised system. The monitoring platform provides mealtime information as well as automated alerting.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Mimecast has a formal Incident reporting process activated by monitoring and staff awareness.

User are able to log calls to activate an incident process.

Mimecast use a fully collaborative ticketing system allowing for the production of accurate incidents reports.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Pricing

Price
£36.00 a user a year
Discount for educational organisations
No
Free trial available
No

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@uk.cdw.com. Tell them what format you need. It will help if you say what assistive technology you use.