Story image

Mimecast acquires Solebit to improve threat protection offering

01 Aug 2018

Email and data security company Mimecast announced it has acquired security software developer Solebit for approximately US$88million net of cash acquired.

Solebit’s technology is engineered to provide a fast, accurate and computationally efficient approach for the identification and isolation of zero-day malware and unknown threats in data files as well as links to external resources. 

Further improving Mimecast’s cyber resilience platform architecture, Solebit provides threat protection to help customers face today’s broad threat landscape with evasion-aware, signature-less technology. 

According to research Mimecast conducted with Vanson Bourne, more than 80% of global organisations have seen both targeted and untargeted phishing attacks increase or stay the same over the last year.

Additionally, cybercriminals are constantly adapting their attack methods, looking for new ways to bypass security solutions that look for specific behaviours or signature matches.

Solebit has developed a differentiated approach that is engineered to preclude the need for signatures and sandboxes.

It is designed to help customers find advanced threats by recognising when there is a malicious code embedded within active content and data files.

Solebit is built to scan content dynamically as it enters an organisation’s systems to determine whether it is infected with malware in a transient way, avoiding the need for extra hardware and processing time typically required to isolate and detonate content presumed ‘risky.’

Solebit currently provides Mimecast and its customers' insight into what was detected and why it was categorised as a threat.

“Security methods like signature-based antivirus and sandbox detonation are too limited when it comes to today’s most advanced threats,” says Mimecast chief executive officer Peter Bauer.

“It’s time for a more capable, efficient and durable approach.”

“We’re excited to welcome Solebit into the Mimecast family, as it helps us to offer customers a new approach that fundamentally improves their cybersecurity and resilience efficacy in the most efficient way on the market.”

Solebit’s advanced threat detection capabilities are integrated into Mimecast Targeted Threat Protection products.

Combined with the recent acquisition of Ataata in the security awareness and training space, and the recently previewed early adopter web security program, Solebit brings another set of microservices to the Mime|OS platform that all of Mimecast’s unified services are built upon.

Story image
12 Dec
Three cybersecurity vendors outline 16 industry predictions for 2020
With 2019 coming to a close, Ping Identity, Attivo Networks, and LogRhythm’s experts share what 2020 holds in store for cybersecurity. More
Story image
11 Dec
Acronis makes strategic acquisition to strengthen security portfolio
Acronis will integrate 5nine’s technology into the Acronis Cyber Platform, making new services available through the Acronis Cyber Cloud Solutions portal.More
Story image
05 Dec
Cyberattacks becoming increasingly targeted in nature, research finds
The number of unique cyber incidents have increase for third quarter of 2019, according to a new report on the cybersecurity threatscape.More
Story image
05 Dec
The BYOD juggling act: balancing security, privacy and mobility
Left unmanaged, personal devices and unmanaged cloud applications can lead to data loss, but if managed too strictly, the IT team risks a backlash from unhappy employees, Bitglass says. More
Story image
14 Nov
Lack of PCI DSS compliance putting payment security at risk
Organisations across Asia Pacific are demonstrating stronger payments security compliance compared to other parts of the world, however global trends indicate that payments security compliance has dropped for the second year in a row.More
Story image
13 Dec
FireEye rolls out threat intelligence platform for industrial systems
Now industrial control systems (ICS), operational technology (OT), internet of things devices, and other equipment used to manage interconnected physical processes, can be secured from cyber threats.More