Work protected

Work protected

work

protected

Mimecast protects work across email, collaboration, and AI tools for 42,000 organizations.

Mimecast protects work across email, collaboration, and AI tools for 42,000 organizations.

Book a Demo

Mimecast protects work across email, collaboration, and AI tools for 42,000 organizations.

We see the patterns.
We see the human error.

We see the patterns.
We see the human error.

We see the patterns.
We see the human error.

And we see the human potential.

And we see the human potential.

marc van zadelhoff, ceo | mimecast

marc van zadelhoff, ceo | mimecast

And we see the human potential.

marc van zadelhoff, ceo | mimecast

Play Video

Play Video

The leader in Human Risk Intelligence.

The leader in Human Risk Intelligence.

As the leader in Human Risk Intelligence, Mimecast identifies high-risk behaviors and delivers targeted interventions —turning individual vulnerability into collective resilience.

As the leader in Human Risk Intelligence, Mimecast identifies high-risk behaviors and delivers targeted interventions —turning individual vulnerability into collective resilience.

take the human risk score quiz

Human
Risk Score

LOW

Simulated Phishing

Sensitive Data Handling

Agentic AI

Human
Risk Score

LOW

Simulated Phishing

Sensitive Data Handling

Agentic AI

Human
Risk Score

LOW

Simulated Phishing

Sensitive Data Handling

Agentic AI

Featured talk

8% of employees are responsible for 80% of security risk

8% of employees are responsible for 80% of security risk

8% of employees are responsible for 80% of security risk

We don’t just alert you when an attack happens. We move in before the mistake becomes one.

We don’t just alert you when an attack happens. We move in before the mistake becomes one.

We don’t just alert you when an attack happens. We move in before the mistake becomes one.

Explore platform

AI-powered Email Security

AI-powered
Email Security

See live demos of AI-powered email security

See live demos of AI-powered email security

BEC, Phishing,
and Account Takeover

BEC, Phishing, and Account Takeover

Tips on defending against BEC, phishing, and account takeover

Tips on defending against BEC, phishing, and account takeover

Shadow AI

Shadow AI

Learn how to reduce shadow AI use by 30%

Learn how to reduce shadow AI use by 30%

RSA Attendee Resources

Get exclusive RSA attendee
resources

RSA Attendee Resources

Get exclusive RSA attendee resources

Trusted at scale

Trusted at scale

Trusted at scale

0
0

trillion data
points Identified

trillion data
points Identified

0

trillion data
points Identified

0
0

k

k

organizations

defended

organizations

defended

0

k

organizations

defended

0
0

years of category-leading technology

years of category-leading technology

0

years of category-leading technology

0
0

Comprehensive platform
backed by AI

Comprehensive platform
backed by AI

0

Comprehensive platform
backed by AI

Rob Juncker

Rob Juncker

Chief Product Officer, Mimecast

Featured session

AI in the Shadows, Trouble on the Surface: Inside the New Insider Threat

The Agentic Insider: How AI Amplifies Human Risk in Today's Workforce.

The Agentic Insider: How AI Amplifies Human Risk in Today's Workforce.

Join Rob Juncker at RSAC 2026 to learn how to manage complex environments while enhancing protection for M365 and Google Workspace. Secure your surface against Shadow AI and block the next generation of email-borne insider threats.

Join Rob Juncker at RSAC 2026 to learn how to manage complex environments while enhancing protection for M365 and Google Workspace. Secure your surface against Shadow AI and block the next generation of email-borne insider threats.

Join Rob Juncker at RSAC 2026 to learn how to manage complex environments while enhancing protection for M365 and Google Workspace. Secure your surface against Shadow AI and block the next generation of email-borne insider threats.

RSCA,Booth 27


Tuesday at 8:30 AM

Additional talks

Additional talks

Additional talks

Through the Looking Glass: 



How AI Brings Visibility and Context to Governance and Compliance.

Through the Looking Glass: 



How AI Brings Visibility and Context to Governance and Compliance.

Tuesday at 1:00 PM


Wednesday at 2:30 PM


Thursday at 11:00 AM

AI Powered Social Engineering: Defending Against the Next Wave of Attacks.


AI Powered Social Engineering: Defending Against the Next Wave of Attacks.


Tuesday at 4:30 PM


Wednesday at 1:00 PM

A New Frontier of Security Behavior Management: Powering Engagement with Human Risk Insights.

A New Frontier of Security Behavior Management: Powering Engagement with Human Risk Insights.

Tuesday at 2:30 PM


Wednesday at 11:00 AM


Thursday at 1:30 PM

The human risk intelligence

platform with 42,000 businesses

The human risk intelligence

platform with 42,000 businesses

The human risk intelligence

platform with 42,000 businesses