Story image

Mimecast acquires Solebit to improve threat protection offering

01 Aug 18

Email and data security company Mimecast announced it has acquired security software developer Solebit for approximately US$88million net of cash acquired.

Solebit’s technology is engineered to provide a fast, accurate and computationally efficient approach for the identification and isolation of zero-day malware and unknown threats in data files as well as links to external resources. 

Further improving Mimecast’s cyber resilience platform architecture, Solebit provides threat protection to help customers face today’s broad threat landscape with evasion-aware, signature-less technology. 

According to research Mimecast conducted with Vanson Bourne, more than 80% of global organisations have seen both targeted and untargeted phishing attacks increase or stay the same over the last year.

Additionally, cybercriminals are constantly adapting their attack methods, looking for new ways to bypass security solutions that look for specific behaviours or signature matches.

Solebit has developed a differentiated approach that is engineered to preclude the need for signatures and sandboxes.

It is designed to help customers find advanced threats by recognising when there is a malicious code embedded within active content and data files.

Solebit is built to scan content dynamically as it enters an organisation’s systems to determine whether it is infected with malware in a transient way, avoiding the need for extra hardware and processing time typically required to isolate and detonate content presumed ‘risky.’

Solebit currently provides Mimecast and its customers' insight into what was detected and why it was categorised as a threat.

“Security methods like signature-based antivirus and sandbox detonation are too limited when it comes to today’s most advanced threats,” says Mimecast chief executive officer Peter Bauer.

“It’s time for a more capable, efficient and durable approach.”

“We’re excited to welcome Solebit into the Mimecast family, as it helps us to offer customers a new approach that fundamentally improves their cybersecurity and resilience efficacy in the most efficient way on the market.”

Solebit’s advanced threat detection capabilities are integrated into Mimecast Targeted Threat Protection products.

Combined with the recent acquisition of Ataata in the security awareness and training space, and the recently previewed early adopter web security program, Solebit brings another set of microservices to the Mime|OS platform that all of Mimecast’s unified services are built upon.

Tensions on the rise after Huawei CFO arrest
“Recently our corporate CFO, Meng Wanzhou, was provisionally detained by the Canadian authorities on behalf of the United States of America."
Palo Alto Networks integrates RedLock and VM-Series with AWS Security Hub
AWS Security Hub is designed to provide users with a comprehensive view of their high-priority security alerts and compliance status.
Juniper simplifies data integration to improve threat detection
Updates to the Juniper Advanced Threat Prevention Appliances leverage third-party firewalls and security data sources.
Is mobile shopping compromising your enterprise security?
When employees do their holiday shopping on company resources, security teams have a challenge with the surge in browsing and online transactions.
Different approach to malware detection needed – VMware
Security needs to move away from the traditional approach of chasing after arbitrary forms of malware.
Modernising ERP systems can help organisations comply with GDPR
“Organisations need to look for modern ERP systems that are specifically designed with GDPR in mind."
APRA Prudential Standard CPS 234: How to communicate with the board
The Australian Prudential Regulation Authority’s standard, CPS 234, is aimed at minimising the threat of cyber attacks for APRA-regulated entities.
Cyber attacks develop complexity, target Windows sysad tools - report
The report explores changes in the threat landscape over the past year, uncovering trends and how they are expected to impact cybersecurity in 2019.