As the world’s most widely used SaaS platform, Office 365 is used by over a million companies worldwide, with over 600,000 companies in the United States alone using the office suite software. Office 365 is the brand name used by Microsoft for a group of software applications providing productivity-related services to its subscribers. Office 365 applications include Outlook, OneDrive, Word, Excel, PowerPoint, OneNote, SharePoint, and Microsoft Teams.
Office 365 for many organisations is vital as it is responsible for company email and data, which makes it a high-value target for any attacker. The common mistake for many organisations is that they believe Office 365 is secure out of the box. Office 365 is safe as a platform but how you control access to and from the data and its resources is your responsibility.
Microsoft offers a full range of security and mobility services, but most organisations and IT companies can become overwhelmed with the licensing and what is available. They also may not have the skillset available to deploy, configure and monitor the technology.
The modern security perimeter now extends beyond an organisation’s network to include user and device identity. Organisations can utilise these identity signals as part of their access control decisions. Many organisations do not have conditional access due to not having correct licensing or not entitled to the full conditional access functionality, which includes risk-based conditional access.
Conditional access is the tool to bring signals together, to make decisions, and enforce organisational policies. Conditional access is at the heart of the new identity-driven control plane. Organisations that do not use conditional access are limited in options to secure access to their Office 365 tenancy. The ability to block risky sign-in behaviours, building trusted locations, requiring MFA for users and requiring specific trusted devices to have access to particular applications.
Cloud App Security is a Cloud Access Security Broker. It provides rich visibility, control over data travel, and sophisticated analytics to identify and combat cyber threats across all your Microsoft and third-party cloud services. Cloud App Security natively integrates with leading Microsoft solutions.
Cloud App Security is used to control the use of Shadow IT. Shadow IT is the use of information technology systems, devices, software, applications, and services without explicit IT department approval. It has grown exponentially in recent years with the adoption of cloud-based applications and services. While Shadow IT can improve employee productivity and drive innovation, it can also introduce serious security risks to your organization through data leaks, potential compliance violations, and more.
Attackers will cross multiple domains like email, identity, endpoints, and applications, to find the point of least resistance. Today’s defence solutions have been designed to protect, detect, and block threats for each domain separately, allowing attackers to exploit the seams and threshold differences between solutions—leaving the business vulnerable to attack. While one facet of an attack may be caught and blocked in email, the same threat actor may have also compromised identities by exploiting weak passwords or leaked credentials, or by fooling people into providing their passwords or authorization tokens.
Threat Protection provides the built-in intelligence, automation, and integration to coordinate protection, detection, response, and prevention by combining and orchestrating into a single solution the capabilities of Advanced Threat Protection (ATP) (endpoints), 365 ATP (email), Azure ATP (identity), and Cloud App Security (apps).