Securing Office 365 As part of your wider network Microsoft’s Office 365: Running on a screen near you Widely adopted by many businesses in the cloud business flexibility & workplace collaboration of companies with Office 365 deployed on… 53% 44% Tablets Smartphones Stores emails, documents & instant messages % Like the rest of your network Office 365 needs STRONG SECURITY... Role-based access control Multi-factor authentication Threat protection across email, endpoint and network Data loss prevention & encryption As with other environments (on-prem, SaaS, cloud), users of Office 365 must consider the following threats: Threats don’t ONLY target Office 365… Email Advanced Persistent Threats 65% 73% 76% Prepare to respond Comprehensive security offers a smart defense + Spoofed emails, spam, phishing, and malware-infected emails are the main attack mechanisms to gain initial access into an organization. 90% of threats estimated to emanate from email Advanced persistent threats or targeted attacks present arguably the most danger to a company Go unidentified for days, weeks, or months Require days, weeks, or months to remediate Take days, weeks, or months to forensically analyze Companies must also respond to the substantial threat posed by Malicous insiders and compromised credentials: Protect your information from data loss or theft by adding security layers on top of, and beyond the Office 365 platform. 37% #1 of companies believe threats originate from internal sources source of successful attack: User Credentials Office 365 Mac Android Cloud Apps Solutions to consider: Data Loss Prevention User Access (DLP) DLP Provides the added layer of security and visibility needed to understand where information lives and how it is used across cloud applications ATP Uncovers, prioritizes and remediates advanced threats across your organizations Authentication Places a layer of protection in front of applications or on single sign-on (SSO) portals for cloud apps to validate users beyond the username and password provided through Microsoft Office 365 SaaS On Prem Office 365 touches the entire network, so your security solution should be complete and cohesive. User Authentication Advanced Protection Monitor Data Email Security Built-in Security Emphasizes user authentication and access Addresses email security Monitors data anywhere it resides not just Office 365 Provides advanced threat protection across all control points All IDC research is © 2016 by IDC. All rights reserved. All IDC materials are licensed with IDC’s permission and in no way does the use or publication of IDC research indicate IDC’s endorsement of Symantecs’s products/or strategies. Enhances the built-in security of Office 365 Look at the whole forest, not just the one tree. Your security solution should encompass areas outside of Office 365 as well. An IDC Infographic, Sponsored By Symantec Learn more about comprehensive solutions for enhancing Office 365’s integrated security features. Download the IDC White Paper “Office 365: Upgrading Enterprise Security” sponsored by Symantec (ATP) Advanced Threat Protection