1
Securing Office 365 As part of your wider network Microsoft’s Office 365: Running on a screen near you Widely adopted by many businesses in the cloud business flexibility & workplace collaboration of companies with Office 365 deployed on… 53% 44% Tablets Smartphones Stores emails, documents & instant messages % Like the rest of your network Office 365 needs STRONG SECURITY... Role-based access control Multi-factor authentication Threat protection across email, endpoint and network Data loss prevention & encryption As with other environments (on-prem, SaaS, cloud), users of Office 365 must consider the following threats: Threats don’t ONLY target Office 365… Email Advanced Persistent Threats 65% 73% 76% Prepare to respond Comprehensive security offers a smart defense + Spoofed emails, spam, phishing, and malware-infected emails are the main attack mechanisms to gain initial access into an organization. 90% of threats estimated to emanate from email Advanced persistent threats or targeted attacks present arguably the most danger to a company Go unidentified for days, weeks, or months Require days, weeks, or months to remediate Take days, weeks, or months to forensically analyze Companies must also respond to the substantial threat posed by Malicous insiders and compromised credentials: Protect your information from data loss or theft by adding security layers on top of, and beyond the Office 365 platform. 37% #1 of companies believe threats originate from internal sources source of successful attack: User Credentials Office 365 Mac Android Cloud Apps Solutions to consider: Data Loss Prevention User Access (DLP) DLP Provides the added layer of security and visibility needed to understand where information lives and how it is used across cloud applications ATP Uncovers, prioritizes and remediates advanced threats across your organizations Authentication Places a layer of protection in front of applications or on single sign-on (SSO) portals for cloud apps to validate users beyond the username and password provided through Microsoft Office 365 SaaS On Prem Office 365 touches the entire network, so your security solution should be complete and cohesive. User Authentication Advanced Protection Monitor Data Email Security Built-in Security Emphasizes user authentication and access Addresses email security Monitors data anywhere it resides not just Office 365 Provides advanced threat protection across all control points All IDC research is © 2016 by IDC. All rights reserved. All IDC materials are licensed with IDC’s permission and in no way does the use or publication of IDC research indicate IDC’s endorsement of Symantecs’s products/or strategies. Enhances the built-in security of Office 365 Look at the whole forest, not just the one tree. Your security solution should encompass areas outside of Office 365 as well. An IDC Infographic, Sponsored By Symantec Learn more about comprehensive solutions for enhancing Office 365’s integrated security features. Download the IDC White Paper “Office 365: Upgrading Enterprise Security” sponsored by Symantec (ATP) Advanced Threat Protection

Securing Office 365 Infographic - image1.cc-inc.comimage1.cc-inc.com/.../symantec/securing-office365-infographic.pdf · Threat protection across email, endpoint and network Data loss

  • Upload
    others

  • View
    13

  • Download
    0

Embed Size (px)

Citation preview

Securing Office 365As part of your wider network

Microsoft’s Office 365:Running on a screen near you

Widely adopted by many businesses

in the cloudbusiness flexibility& workplace

collaborationof companies

with Office 365 deployed on…

53% 44%

Tablets Smartphones

Stores emails, documents &

instant messages

%

Like the rest of your networkOffice 365 needs STRONG SECURITY...

Role-based access control

Multi-factor authentication

Threat protection across email, endpoint and network

Data loss prevention & encryption

As with other environments (on-prem, SaaS, cloud), users of Office 365 must consider the following threats:

Threats don’t ONLY target Office 365…

Email

Advanced Persistent Threats

65% 73% 76%

Prepare to respond

Comprehensive security offers a smart defense

+

Spoofed emails, spam, phishing, and malware-infected emails are the main attack mechanisms to gain initial access into an organization.

90% of threats estimated to emanate from email

Advanced persistent threats or targeted attacks present arguably the most danger to a company

Go unidentifiedfor days, weeks, or months

Require days,weeks, or monthsto remediate

Take days, weeks, or months to forensically analyze

Companies must also respond to the substantial threat posed byMalicous insiders and compromised credentials:

Protect your information from data loss or theft

by adding security layers on top of, and beyond the Office 365 platform.

37%

#1

of companies believe threats originate frominternal sources

source of successful attack: User Credentials

Office 365

MacAndroid

Cloud Apps

Solutions to consider:

Data LossPreventionUser

Access (DLP)

DLPProvides the added layerof security and visibilityneeded to understand where information livesand how it is used acrosscloud applications

ATPUncovers, prioritizes and remediates advanced

threats across your organizations

AuthenticationPlaces a layer of protection

in front of applicationsor on single sign-on (SSO)

portals for cloud apps tovalidate users beyond theusername and password

provided through Microsoft

Office 365

SaaSOn Prem

Office 365 touches the entire network, so your security solutionshould be complete and cohesive.

UserAuthentication

AdvancedProtection

MonitorData

EmailSecurity

Built-inSecurity

Emphasizes user authentication and access

Addresses email security

Monitors data anywhere it residesnot just Office 365

Provides advanced threat protectionacross all control points

All IDC research is © 2016 by IDC. All rights reserved. All IDC materials are licensed with IDC’s permission and in no way does the use or publication of IDC research indicate IDC’s endorsement of Symantecs’s products/or strategies.

Enhances the built-in security of Office 365

Look at the whole forest, not just the one tree. Your security solution should encompass areas outside of Office 365 as well.

An IDC Infographic, Sponsored By Symantec

Learn more about comprehensive solutions for

enhancing Office 365’s integrated security features.

Download the IDC White Paper

“Office 365: Upgrading Enterprise Security”sponsored by Symantec

(ATP)

AdvancedThreat

Protection