• Mimecast Attachment Protect

Mimecast Attachment Protect

Over half of all data breaches contain malware. What’s more, 66% of this is installed via malicious email attachments. This demonstrates that the delivery of malware via email remains the favoured technique of many attackers.

Emails which contain attached files must be inspected for malware. However, malware can take many forms and can run the gambit from broadly distributed, commodity malware at one end of the threat spectrum, to highly targeted, even custom-built varieties that are created and targeted at even just a single organisation.

What is Mimecast Attachment Protect?

Targeted attacks via email have rapidly increased in volume and sophistication; Mimecast Attachment Protect, a feature of Mimecast Targeted Threat Protection, provides:

  • Static file analysis
  • Safe-file conversion
  • Attachment sandboxing

These features offer advanced protection from email-borne malware.

Mimecast Attachment Protect

How does Mimecast Attachment Protect work?

Choose from traditional pre-emptive sandboxing and static file analysis of attachments, innovative instant safe-file conversion, or a mix of the two for different groups of employees or different senders as selected by end users.

Safe-file conversion takes attachments that could contain malicious code (e.g. macros in PDF or Microsoft Office files) in inbound emails and replaces them instantly with safe versions – neutralizing any malicious code by default.

An option in the email can be used to request the original file which is passed through the Mimecast sandbox before being delivered.


  • Multi-layered malicious attachment protection, including static file analysis, conversion to a safe format, and sandboxing.

  • Safe attachments are delivered without traditional sandboxing latency, helping maintain employee productivity and security.

  • A pre-emptive sandbox with static file analysis mode is also available at the option of the administrator and can also be selected by end users for select senders.

  • Granular reporting allows for real-time threat analysis.

  • When used in conjunction with Targeted Threat Protect – URL Protect, URLs which lead directly to file downloads are analyzed before delivery.

  • Protection on and off the corporate network, including mobile devices.


Discover More: