Trustmarque Solutions Limited

TRUSTMARQUE MIMECAST CYBERGRAPH

Mimecast CyberGraph utilizes artificial intelligence (AI) to protect from the most evasive and hard-to-detect email threats, limiting attacker reconnaissance and mitigating human error.

Features

  • AI-powered email tracker prevention.
  • Identity Graph technology powered by machine learning.
  • AI-powered contextual warning banners in suspicious emails.

Benefits

  • Disarms email trackers, halting inadvertent information disclosure.
  • Detects anomalous behaviors.
  • Empower users at risk.

Pricing

£11.60 a user a year

  • Education pricing available
  • Free trial available

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@trustmarque.com. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 13

Service ID

5 6 9 6 0 7 4 1 5 6 2 1 5 6 8

Contact

Trustmarque Solutions Limited Darren Moyes
Telephone: 01904 934435
Email: tenders@trustmarque.com

Service scope

Software add-on or extension
Yes
What software services is the service an extension to
Any application enabled compatible with SMTP routing.
Cloud deployment model
Private cloud
Service constraints
Please refer to Mimcaster Central for further information:
System requirements
A corporate, SMTP-based email system.

User support

Email or online ticketing support
Yes, at extra cost
Support response times
This would be dependent on the Support Package chosen. Further details can be found within the "Mimecast Support Packages" documents attached
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
No
Onsite support
Yes, at extra cost
Support levels
This would be dependent on the Support Package chosen. Further details can be found within the "Service Brief Customer Success Offerings" and the "Mimecast Service Levels and Support Description" documents attached
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Mimecast provides four implementation options; Core Connect (internet based wizard & Email support), Managed Connect (Wizard & Implementation assistance contactable by phone and email), Managed Implementation (Dedicated implementation engineer proactively driving your implementation), Advanced Implementatation (Proactive dedicated implementation engineer, advanced support, project documentation, optional Mimecast project manager).
Service documentation
Yes
Documentation formats
HTML
End-of-contract data extraction
The Email Tracker prevention technology within Cybergraph provides the ability to export logs to CSV format.
End-of-contract process
All features and benefits of the service cease to be available.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Firefox
  • Chrome
  • Safari
  • Opera
Application to install
No
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
None
Service interface
Yes
User support accessibility
WCAG 2.1 AA or EN 301 549
Description of service interface
Single Web Based Administration console allowing access to all required controls and settings.
Accessibility standards
WCAG 2.1 AA or EN 301 549
Accessibility testing
None
API
Yes
What users can and can't do using the API
User management
API documentation
Yes
API documentation formats
HTML
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
Branding, various policies, settings, notifications and disclaimers, authentication requirements options.

Scaling

Independence of resources
Mimecast’s cloud platform is capable of scaling horizontally as far as necessary. Today it handles more than one billion connections for service each day and delivers millions of "clean" messages. The system is scaled, with approximately 20% of capacity allowing for surge scenarios and simultaneous server outages. Mimecast can easily scale overall capacity by adding additional storage and processing resources to the relevant resource pools as required.

Analytics

Service usage metrics
Yes
Metrics types
CyberGraph Dashboards provide data on:

- Dynamic Banners
- Trackers
- Activity Log
Reporting types
Real-time dashboards

Resellers

Supplier type
Reseller (no extras)
Organisation whose services are being resold
Mimecast

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
Up to Developed Vetting (DV)

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
United Kingdom
User control over data storage and processing locations
Yes
Datacentre security standards
Complies with a recognised standard (for example CSA CCM version 3.0)
Penetration testing frequency
At least every 6 months
Penetration testing approach
Another external penetration testing organisation
Protecting data at rest
Physical access control, complying with CSA CCM v3.0
Data sanitisation process
Yes
Data sanitisation type
Explicit overwriting of storage before reallocation
Equipment disposal approach
In-house destruction process

Data importing and exporting

Data export approach
The Email Tracker prevention technology within Cybergraph provides the ability to export logs to CSV format.
Data export formats
CSV
Data import formats
Other

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
Please see details at https://www.mimecast.com/globalassets/documents/termsandconditions/sla_and_support_terms.pdf

Email Delivery Credit Fee
<100% but >=99% 10%
<99% but >=98% 20%
<98% but >=97% 30%
<97% but >=96% 40%
<96% 50% and Customer may terminate the Agreement and receive a pro-rata refund of any unused pre-paid fees.
Approach to resilience
This information is available on request.

In brief, the platform is completely resilient with data replicated across diverse physical locations ensuring no single points of failure
Outage reporting
Public Dashboard / Website announcements

Emails

Other communications including phone and text notification available as required.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Public key authentication (including by TLS client certificate)
  • Identity federation with existing provider (for example Google Apps)
  • Username or password
Access restrictions in management interfaces and support channels
The management interface is granular in allowing access on a per user basis for predefined rights. Authorised users are allowed to log support queries.
Access restriction testing frequency
At least every 6 months
Management access authentication
2-factor authentication

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
At least 12 months
Access to supplier activity audit information
Users have access to real-time audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Certification Europe
ISO/IEC 27001 accreditation date
15/12/21
What the ISO/IEC 27001 doesn’t cover
ISO covers the email security, continuity and archiving cloud services for the protection of personally identifiable information in the cloud and ISO 27001 is globally recognised as the best framework to demonstrate audited and continual improvement and on-going security management.

The ISO covers the platform in operation and support mechanisms.
ISO 28000:2007 certification
No
CSA STAR certification
Yes
CSA STAR accreditation date
25/03/2022
CSA STAR certification level
Level 2: CSA STAR Attestation
What the CSA STAR doesn’t cover
The full certification details can be found here: https://cloudsecurityalliance.org/star/registry/mimecast/
PCI certification
No
Cyber essentials
No
Cyber essentials plus
No
Other security certifications
Yes
Any other security certifications
  • SOC 2 Type 1
  • SOC 2 Type 2
  • ISO 27018
  • ISO 22301

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
Mimecast is accredited with ISO 22301:2012 and ISO 27018:2014 and follows strict policies and procedures to maintain the highest levels of information security.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
Stringent change control procures are in place to maintain operational and service level agreements. All changes are fully documented including roll back procedures.

Updates to the service follow a regular schedule and the impact is communicated to relevant parts of the business and customers. Changes to systems that could impact or compromise existing security and control procedures are subject to review by the Mimecast Information Security Team prior to acceptance.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Mimecast reviews vendor security bulletins and utilise the corporate SIEM system to log and identify any possible issues.

The severity of vulnerabilities are assessed on impact vs likelihood and risks are adjusted accordingly for manual analysis and system events. Critical vulnerabilities can be deployed globally throughout the Mimecast infrastructure within minutes.
Protective monitoring type
Supplier-defined controls
Protective monitoring approach
The entire platform is monitored 24 x 7 and system and network logs are entered into a centralised system. The monitoring platform provides mealtime information as well as automated alerting.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
Mimecast has a formal Incident reporting process activated by monitoring and staff awareness.

User are able to log calls to activate an incident process.

Mimecast use a fully collaborative ticketing system allowing for the production of accurate incidents reports.

Secure development

Approach to secure software development best practice
Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)

Public sector networks

Connection to public sector networks
No

Social Value

Fighting climate change

Fighting climate change

Trustmarque's Environmental Policy and Carbon Reduction Plan include delivering and supporting actions on reducing our carbon footprint and our impact on climate change. Our policies include 'Virtual First 'meetings, energy reduction plans, flexible working. Please contact Trustmarque to discuss the provision of Social Value. Any Social Value deliverable must be agreed with Trustmarque and be proportionate to the contract value and deliverables.
Covid-19 recovery

Covid-19 recovery

Trustmarque can provide re-training for those left unemployed by Covid-19 through skills training, CV and interview workshops. Please contact Trustmarque to discuss the provision of Social Value. Any Social Value deliverable must be agreed with Trustmarque and be proportionate to the contract value and deliverables.
Tackling economic inequality

Tackling economic inequality

Trustmarque tackles economic inequality through operating a diverse supply chain including a large number of SMEs and micro businesses. Our access to a broad range of suppliers ensures both resilience and capacity. Trustmarque is also continuously refining our supply chain to meet the ever-changing needs of our customers and to ensure we can always offer the best solution through capability, capacity and resilience at the best price. Our vendor agnostic approach among suppliers allows us to support innovation and disruptive technologies to deliver lower cost and/or higher quality goods and services to customers. Please contact Trustmarque to discuss the provision of Social Value. Any Social Value deliverable must be agreed with Trustmarque and be proportionate to the contract value and deliverables.
Equal opportunity

Equal opportunity

Trustmarque operates an Equal Opportunities policy that outlines our commitments including creating a workforce that reflects the diversity of our communities. Other initiatives include supporting disabled people to develop skills and supporting in-work progression. Please contact Trustmarque to discuss the provision of Social Value. Any Social Value deliverable must be agreed with Trustmarque and be proportionate to the contract value and deliverables.
Wellbeing

Wellbeing

We align our approach to mental wellbeing to the six standards in the Mental Health at Work commitment, including staff work and wellbeing sessions, flexible working, speak-up policy, etc. Please contact Trustmarque to discuss the provision of Social Value. Any Social Value deliverable must be agreed with Trustmarque and be proportionate to the contract value and deliverables.

Pricing

Price
£11.60 a user a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
Mimecast provides a Proof Of Concept Account where a wide range of features can be tested.
Link to free trial
Details are available on request at: https://www.mimecast.com/company/contact/

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@trustmarque.com. Tell them what format you need. It will help if you say what assistive technology you use.