Mimecast - email security services
Mimecast offers cyber security services for email. Block email-based threats with AI-powered security from Mimecast. Email is a top attack vector
Bridgeall provide a full range of Mimecast advisory, implementation and support services.
Features
- Mimecast is advanced email security
- Mimecast offers comprehensive phishing protection
- Advanced Business email compromise protection
- Protect users with deep url scanning
- AI powered malware protection with Mimecast
- Secure Email gateway (SEG) service available with Mimecast
- Fully integrate with M365, Google workspace and on-premise
- Reduce spam and ramsonware attacks with Mimecast
- Bridgeall is a leading provider of Mimecast services
Benefits
- Mimecast is a market leader in email security
- Mimecast outperforms Microsoft defender
- Mimecast works for all email setups
- Block the number 1 attack vector with Mimecast
- Fully customise the level of security to suit you
- Supports meeting email compliance standards
Pricing
£450 to £1,650 a unit a day
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
5 0 8 3 1 3 9 6 2 0 7 8 9 7 0
Contact
Bridgeall Limited
Andrew Hart
Telephone: 01412126400
Email: tenders@bridgeall.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Community cloud
- Hybrid cloud
- Service constraints
- Our Mimecast services have no known constraints
- System requirements
- https://community.mimecast.com/s/article/data-retention-mimecast-synchronization-engine-requirements
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Within 15 mins
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- WCAG 2.1 AAA
- Phone support
- Yes
- Phone support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), Monday to Friday
- Web chat support accessibility standard
- WCAG 2.1 AAA
- Web chat accessibility testing
- Microsoft Teams & Skype have been developed to meet accessibility standards.
- Onsite support
- Yes, at extra cost
- Support levels
-
Mimecast services are available 24 x 7
99.9% availability
Our SLA’s can be tailored and agreed to customer requirements, and flexed on a daily bases, as business requirements dictate - Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Mimecast onboarding is tailored to customer’s requirements
- Service documentation
- Yes
- Documentation formats
- End-of-contract data extraction
- Tailored to customer’s requirements
- End-of-contract process
- Tailored to customer’s requirements
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- No
- Service interface
- No
- User support accessibility
- WCAG 2.1 A
- API
- Yes
- What users can and can't do using the API
- Mimecast comes with API services
- API documentation
- Yes
- API documentation formats
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- You can fully configure Mimecast to suit your needs.
Scaling
- Independence of resources
- Mimecast backup guarantees a 99.99% SLA across a global infrastructure.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Mimecast analytics
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Reseller providing extra features and support
- Organisation whose services are being resold
- Mimecast solutions
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- No
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with CSA CCM v3.0
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Encryption of all physical media
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
-
- Explicit overwriting of storage before reallocation
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Mimecast provides a flexible data export approach
- Data export formats
-
- CSV
- ODF
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- Private network or public sector network
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Bonded fibre optic connections
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Legacy SSL and TLS (under version 1.2)
Availability and resilience
- Guaranteed availability
- Mimecast guarantee 99.99% global availability.
- Approach to resilience
- https://www.mimecast.com/company/mimecast-trust-center/certification-and-attestation/resilience/#:~:text=Mimecast%20has%20created%20a%20resilience,to%20maintain%20and%20periodically%20review
- Outage reporting
-
Public dashboard, API, email alerts, SMS
Via the service status portal
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
- Access restrictions in management interfaces and support channels
- Active Directory Services and Azure AD Connect
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Identity federation with existing provider (for example Google Apps)
- Limited access network (for example PSN)
- Dedicated link (for example VPN)
- Username or password
Audit information for users
- Access to user activity audit information
- Users have access to real-time audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- Users have access to real-time audit information
- How long supplier audit data is stored for
- User-defined
- How long system logs are stored for
- User-defined
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- UKAS
- ISO/IEC 27001 accreditation date
- 09 May 2024
- What the ISO/IEC 27001 doesn’t cover
- NA
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- ISO 9001
- Subject to the Return on Investement model ROI
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Information security policies and processes
- ISO27001 and Cyber Security
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
-
The CMDB data is maintained by leveraging the request and change management processes, dedicated modules in the Service Desk suite, which are fully integrated into the CMDB. There is a dedicated change management module within the Bridgeall Service Desk, integrated with the configuration, knowledge base, incident and service request modules. The process provides the following core activities through the ITILV3 Service Desk:
• Initiate change request
• Validate change request including security
• Assess and plan change (operational)
• Approve change implementation
• Execute and complete change
• Status reporting
• Review post implementation and close change. - Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
-
Follow the ITIL process for Vulnerability Management processes, as well as applying our Quality ISO9001 and Security ISO27001 processes. Bridgeall will coordinate and perform regular IT health checks and audits, that provide the interface for vulnerability management. The process shall provide the following core activities:
• Preparation
• Vulnerability scan
• Define remediating actions
• Implement remediating actions
• Rescan
We utilise several proprietary tools provided by Nessus, Qualys and Verisign and work with CREST approved NCC Group. - Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
-
Environments are monitored extensively for both the application and infrastructure covering system availability, performance and automated system jobs.
Automatic monitoring is conducted at regular intervals depending. Alerts are raised by email with customisable multi-user notification escalations available.
Critical Alerts
• Ping/Port Availability Checks
• HTTP on all sites
• SMTP Service Check
• Database Service Check
• URL Availability Check
Trend Alerts
• CPU Usage
• Memory Usage
• Storage Capacity
• Disk I/O
• Disk Read/Write Times
URL Response/Wait Times - Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
-
Our ITIL V3 Service Desk manages incidents and escalations until resolution. The Service Desk acts as the end user single point of contact for incident restoration, including requests for information and issues. The Service Desk monitors outstanding trouble tickets or records until they are resolved.
We provide the following activities:
Detection and recording
Classification and initial support
Investigation and diagnosis
Resolution and recovery
Tracking and communication.
Major Incident Process:
Follow procedures
Communication
Defines incident severities,
Escalations
Roles and responsibilities - internal and external organisations
Review process and issue a report - actions taken, lessons learned.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- Yes
- Connected networks
-
- Public Services Network (PSN)
- NHS Network (N3)
- Scottish Wide Area Network (SWAN)
- Health and Social Care Network (HSCN)
Social Value
- Social Value
-
Social Value
- Tackling economic inequality
- Equal opportunity
Tackling economic inequality
Bridgeall is dedicated to addressing economic inequality, recognising the importance of inclusive growth and equal opportunities. Our approach is multifaceted, focusing on creating employment opportunities, investing in skills development, and supporting local communities.
Our initiatives contribute to economic equality, such as our apprenticeship programs that offer valuable training and experience to young people, our partnerships with local educational institutions (Digital Critical Friends - 3 Bridgeall technical team members are mentors for Teachers in schools across Scotland. Their responsibility is around consulting, advising, supporting, and promoting, IT and computing amongst younger groups.), and our commitment to fair and ethical business practices that ensure the prosperity of the communities we serve.
Our procurement policies are designed to support small and medium-sized enterprises where possible, promoting local economic development and sustainability.
We are an accredited Living Wage Employer and support the Living Wage movement, valuing fair wages to attract and retain top talent while boosting staff morale and productivity. We oppose Exploitative Employment Practices like Zero Hours Contracts
Our commitment to fighting economic inequality is not only a moral imperative but also a strategic business decision that enhances our competitiveness and aligns with our values of integrity, respect, and social responsibility.
Bridgeall's commitment to social responsibility also extends to supporting local communities, as evidenced by our monthly food/money donations to the Glasgow Northeast foodbank. We have also supported them by providing IT resources for specific projects to assist them. This initiative is part of our broader efforts to address economic inequality and support those in need. Our contributions to the foodbank help provide essential supplies to families and individuals affected by economic hardship, reinforcing our pledge to foster a more equitable society. Through actions like these, Bridgeall not only demonstrates corporate citizenship but also strengthens community ties and supports sustainable development goals.Equal opportunity
Bridgeall's equal opportunities ethos is reinforced by our proactive measures to prevent discrimination and promote equality in all aspects of our employment and service delivery. We abide by the Equality Act 2010 and have established a diverse workforce that reflects the communities we serve. Our policies ensure fair treatment for all, with a particular focus on supporting disabled individuals through career development and tailored training programs.
Our commitment to fair work practices is evident in our status as a signatory to the Scottish Government's Scottish Business Pledge and our accreditation as a Living Wage Employer. We believe that fair compensation is crucial for attracting and retaining top talent, boosting morale, and enhancing productivity. Investing significantly in staff development, we prioritise continuous learning and growth, tailoring training based on annual appraisals, and offering various resources for advancement.
Bridgeall has made significant progress in improving employee retention over the past few years. The retention rates have steadily increased from 82% in 2021 to 98% in 2023.
To ensure a consistent team with minimal turnover we adopt numerous practices across the entire business, which includes; Investing in Employee Development, Competitive Compensation and Benefits, Work-Life Balance, Flexible Working, Transparent Communication, Recognising and Celebrating Achievements, Addressing Employee Concerns, Promoting Mental Health & Well Being, Collaboration and Team-Building Exercises, Career Growth Opportunities, Exit Interviews and Analysis, Annual Reviews and Recognition Program.
Bridgeall's dedication to equal opportunities is not just a policy but a core principle that guides our actions and decisions, ensuring a workplace where everyone can thrive.
Pricing
- Price
- £450 to £1,650 a unit a day
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Limited time access to Mimecast available as a trial.
- Link to free trial
- TBA