skip to main content
Close Icon

In order to deliver a personalized, responsive service and to improve the site, we remember and store information about how you use it. This is done using simple text files called cookies which sit on your computer. By continuing to use this site and access its features, you are consenting to our use of cookies. To find out more about the way Informa uses cookies please go to our Cookie Policy page.

Global Search Configuration


This research note looks at the importance of protecting Microsoft Office 365 operations, the types of protection needed, and the opportunities available to work with core Microsoft security products as well as third-party alternatives.


  • The upfront security issues of Office 365 include the need to protect cloud-based access to information, secure the high volumes of unstructured data involved, and secure/maintain the ease-of-access model, which is an inherent part of the Office 365 approach.
  • The security considerations for Office 365 include the ability to manage/protect sensitive data. They take into account the location of sensitive information, provide controls over who has access, and include the levels of authentication needed to ensure access is safe.

Features and Benefits

  • Understand the issues/options available when considering the security requirements for Office 365 operations.
  • Identify the benefits of a Microsoft-centric approach to Office 365 security and third-party security vendor alternatives.

Key questions answered

  • What is increasing the need for better security and data protection controls?
  • What has encouraged growth in third-party security tools that deliver extra levels of business protection?

Table of contents

Ovum view

  • Summary
  • Using Office 365 introduces additional security and data protection challenges
  • Office 365 users must ensure that their systems are well protected
  • There are many examples of third-party protection solutions available for Office 365
  • Consider Microsoft as well as mainstream security competitors


  • Further reading
  • Author

Recommended Articles

  • Enterprise Decision Maker, Enterprise IT Strategy and Select...

    2017 Trends to Watch: Big Data

    By Tony Baer 21 Nov 2016

    The breakout use case for big data will be fast data. The Internet of Things (IoT) is increasing the urgency for enterprises to embrace real-time streaming analytics, as use cases from mobile devices and sensors become compelling to a wide range of industry sectors.

    Topics Big data and analytics IoT

  • Consumer & Entertainment Services, World Cellular Informatio...

    Mapping the Future of Enterprise Messaging: SMS, RCS, and Chat Bots

    By Pamela Clark-Dickson

    In this paper, we analyze the results of the Enterprise Messaging Survey 2017, placing the findings in the context of the rapidly evolving business-to-consumer communications market.

  • Consumer & Entertainment Services, Service Provider Technolo...

    FAANG to sink its teeth deeper into TV in 2018

    By Rob Gallagher 14 Dec 2017

    Few trends will be bigger in 2018 than the transformation of TV and video by OTT technology and services. Here we present five Ovum predictions related to the most influential players: Facebook, Amazon, Apple, Google, and Netflix – or FAANG, for short.


Have any questions? Speak to a Specialist

Europe, Middle East & Africa team - +44 (0) 207 017 7700

Asia-Pacific team - +61 (0)3 960 16700

US team - +1 646 957 8878

+44 (0) 207 551 9047 - Operational from 09.00 - 17.00 UK time

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Call us at +44 7770704398 or email us at

Contact marketing -

Already an Ovum client? Login to the Knowledge Center now