var breeze_prefetch = {"local_url":"https:\/\/emailexpert.com","ignore_remote_prefetch":"1","ignore_list":["\/cart\/","\/checkout\/","\/my-account\/","\/big-list-of-email-vendors-and-email-service-providers\/","wp-admin","wp-login.php"]};
var wc_add_to_cart_params = {"ajax_url":"\/wp-admin\/admin-ajax.php","wc_ajax_url":"\/?wc-ajax=%%endpoint%%","i18n_view_cart":"View cart","cart_url":"https:\/\/emailexpert.com\/cart\/","is_cart":"","cart_redirect_after_add":"no"};
var MyListing = {"Helpers":{},"Handlers":{},"MapConfig":{"ClusterSize":35,"AccessToken":"pk.eyJ1IjoiYWdlbmN5Y20iLCJhIjoiY2pxZThoaWt4NGNxODQ4bGNhdDIzZ3c4ZSJ9.7D0heKBc8apZRySQBXQI2g","Language":false,"TypeRestrictions":[],"CountryRestrictions":[],"CustomSkins":{}}};
Mimecast has announced the acquisition of Elevate Security, a cybersecurity firm specialising in human risk management, in a move that signals a deepening focus on mitigating user-centric threats within email security. While the financial terms remain undisclosed, the acquisition is framed by Mimecast as a step toward advancing its vision of a “human risk layer” within its broader cybersecurity portfolio.
Founded in 2017, Elevate Security has carved a niche in quantifying and reducing human risk by analysing user behaviour and tailoring controls accordingly. Its platform leverages behavioural data across a range of systems, email, identity, endpoint and web, to profile individual risk levels and automate policy enforcement. With phishing and social engineering attacks continuing to bypass traditional defences by targeting human users, this type of risk-adaptive approach has garnered growing interest across the industry.
Industry Context: Human Risk at the Forefront
The acquisition comes amidst a broader trend in enterprise security where human error is increasingly acknowledged as the weakest link in digital defences. Email remains a primary vector for threats such as phishing, business email compromise (BEC), and credential theft. Traditional email gateways and content filters, while necessary, are insufficient in isolation. As adversaries become more adept at exploiting human psychology, risk-based user profiling and adaptive policy enforcement have gained traction.
Mimecast, known for its robust Secure Email Gateway (SEG) and integrated cloud-based email security services, joins a cohort of vendors pivoting towards user-centric defences. Competitors such as Proofpoint have already made significant inroads in this area; its acquisition of ObserveIT in 2019 bolstered insider threat detection through behavioural analytics. Similarly, Tessian has focused on contextual AI to flag anomalous user actions in real time.
Strategic Implications for Mimecast
For Mimecast, the integration of Elevate Security represents a tactical expansion beyond reactive security postures into proactive user risk management. This aligns with the company’s 2022 acquisition by private equity firm Permira, which signalled an intent to accelerate innovation and market differentiation in a crowded cybersecurity landscape.
Elevate Security’s capabilities could enhance Mimecast’s detection and response mechanisms by layering user-specific insights atop existing threat intelligence. This has potential implications not only for email defence but for broader identity and access management strategies, particularly in regulated industries where user accountability and compliance are paramount.
What This Means for the Email Industry
For stakeholders in the email ecosystem, particularly those managing enterprise-scale security infrastructures, the move underscores a critical industry shift: securing the channel is no longer sufficient; securing the user is now equally vital.
Integrating behavioural analytics into email security may enable more granular risk policies, such as adjusting access or authentication levels based on a user’s historical behaviour or susceptibility to threats. This opens pathways to more dynamic, intelligent threat prevention, albeit with potential concerns around user privacy and the accuracy of behavioural modelling.
Moreover, this acquisition adds pressure on other email security vendors to evolve beyond static filtering models and embrace risk-aware, user-adaptive paradigms. For MSSPs, IT leaders, and CISOs, the message is clear: a modern email security strategy must account not just for what threats are coming in, but who the threats are targeting, and how those users are likely to respond.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
We use cookies to optimize our website and our service.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
var elementorFrontendConfig = {"environmentMode":{"edit":false,"wpPreview":false,"isScriptDebug":false},"i18n":{"shareOnFacebook":"Share on Facebook","shareOnTwitter":"Share on Twitter","pinIt":"Pin it","download":"Download","downloadImage":"Download image","fullscreen":"Fullscreen","zoom":"Zoom","share":"Share","playVideo":"Play Video","previous":"Previous","next":"Next","close":"Close","a11yCarouselPrevSlideMessage":"Previous slide","a11yCarouselNextSlideMessage":"Next slide","a11yCarouselFirstSlideMessage":"This is the first slide","a11yCarouselLastSlideMessage":"This is the last slide","a11yCarouselPaginationBulletMessage":"Go to slide"},"is_rtl":false,"breakpoints":{"xs":0,"sm":480,"md":768,"lg":1025,"xl":1440,"xxl":1600},"responsive":{"breakpoints":{"mobile":{"label":"Mobile Portrait","value":767,"default_value":767,"direction":"max","is_enabled":true},"mobile_extra":{"label":"Mobile Landscape","value":880,"default_value":880,"direction":"max","is_enabled":false},"tablet":{"label":"Tablet Portrait","value":1024,"default_value":1024,"direction":"max","is_enabled":true},"tablet_extra":{"label":"Tablet Landscape","value":1200,"default_value":1200,"direction":"max","is_enabled":false},"laptop":{"label":"Laptop","value":1366,"default_value":1366,"direction":"max","is_enabled":false},"widescreen":{"label":"Widescreen","value":2400,"default_value":2400,"direction":"min","is_enabled":false}},"hasCustomBreakpoints":false},"version":"3.29.1","is_static":false,"experimentalFeatures":{"e_font_icon_svg":true,"additional_custom_breakpoints":true,"e_optimized_markup":true,"e_local_google_fonts":true,"theme_builder_v2":true,"landing-pages":true,"editor_v2":true,"home_screen":true,"cloud-library":true,"e_opt_in_v4_page":true},"urls":{"assets":"https:\/\/emailexpert.com\/wp-content\/plugins\/elementor\/assets\/","ajaxurl":"https:\/\/emailexpert.com\/wp-admin\/admin-ajax.php","uploadUrl":"https:\/\/emailexpert.com\/wp-content\/uploads"},"nonces":{"floatingButtonsClickTracking":"a6499cb2ee"},"swiperClass":"swiper","settings":{"page":[],"editorPreferences":[]},"kit":{"active_breakpoints":["viewport_mobile","viewport_tablet"],"global_image_lightbox":"yes","lightbox_enable_fullscreen":"yes","lightbox_enable_zoom":"yes","lightbox_title_src":"title","lightbox_description_src":"description","woocommerce_notices_elements":[]},"post":{"id":31638,"title":"Mimecast%20Announces%20Acquisition%20of%20Elevate%20Security%20%C2%BB%20emailexpert","excerpt":"","featuredImage":false}};
var wc_order_attribution = {"params":{"lifetime":1.0e-5,"session":30,"base64":false,"ajaxurl":"https:\/\/emailexpert.com\/wp-admin\/admin-ajax.php","prefix":"wc_order_attribution_","allowTracking":true},"fields":{"source_type":"current.typ","referrer":"current_add.rf","utm_campaign":"current.cmp","utm_source":"current.src","utm_medium":"current.mdm","utm_content":"current.cnt","utm_id":"current.id","utm_term":"current.trm","utm_source_platform":"current.plt","utm_creative_format":"current.fmt","utm_marketing_tactic":"current.tct","session_entry":"current_add.ep","session_start_time":"current_add.fd","session_pages":"session.pgs","session_count":"udata.vst","user_agent":"udata.uag"}};
var wc_cart_fragments_params = {"ajax_url":"\/wp-admin\/admin-ajax.php","wc_ajax_url":"\/?wc-ajax=%%endpoint%%","cart_hash_key":"wc_cart_hash_599f4bb86163e70d6e64c10a3b27c2a0","fragment_name":"wc_fragments_599f4bb86163e70d6e64c10a3b27c2a0","request_timeout":"5000"};
var ElementorProFrontendConfig = {"ajaxurl":"https:\/\/emailexpert.com\/wp-admin\/admin-ajax.php","nonce":"cc57502ad8","urls":{"assets":"https:\/\/emailexpert.com\/wp-content\/plugins\/elementor-pro\/assets\/","rest":"https:\/\/emailexpert.com\/wp-json\/"},"settings":{"lazy_load_background_images":false},"popup":{"hasPopUps":true},"shareButtonsNetworks":{"facebook":{"title":"Facebook","has_counter":true},"twitter":{"title":"Twitter"},"linkedin":{"title":"LinkedIn","has_counter":true},"pinterest":{"title":"Pinterest","has_counter":true},"reddit":{"title":"Reddit","has_counter":true},"vk":{"title":"VK","has_counter":true},"odnoklassniki":{"title":"OK","has_counter":true},"tumblr":{"title":"Tumblr"},"digg":{"title":"Digg"},"skype":{"title":"Skype"},"stumbleupon":{"title":"StumbleUpon","has_counter":true},"mix":{"title":"Mix"},"telegram":{"title":"Telegram"},"pocket":{"title":"Pocket","has_counter":true},"xing":{"title":"XING","has_counter":true},"whatsapp":{"title":"WhatsApp"},"email":{"title":"Email"},"print":{"title":"Print"},"x-twitter":{"title":"X"},"threads":{"title":"Threads"}},"woocommerce":{"menu_cart":{"cart_page_url":"https:\/\/emailexpert.com\/cart\/","checkout_page_url":"https:\/\/emailexpert.com\/checkout\/","fragments_nonce":"c8bd20b081"}},"facebook_sdk":{"lang":"en_US","app_id":""},"lottie":{"defaultAnimationUrl":"https:\/\/emailexpert.com\/wp-content\/plugins\/elementor-pro\/modules\/lottie\/assets\/animations\/default.json"}};