skip to main content
Close Icon We use cookies to improve your website experience.  To learn about our use of cookies and how you can manage your cookie settings, please see our Cookie Policy.  By continuing to use the website, you consent to our use of cookies.
Global Search Configuration

Introduction

This research note looks at the importance of protecting Microsoft Office 365 operations, the types of protection needed, and the opportunities available to work with core Microsoft security products as well as third-party alternatives.

Highlights

  • The upfront security issues of Office 365 include the need to protect cloud-based access to information, secure the high volumes of unstructured data involved, and secure/maintain the ease-of-access model, which is an inherent part of the Office 365 approach.
  • The security considerations for Office 365 include the ability to manage/protect sensitive data. They take into account the location of sensitive information, provide controls over who has access, and include the levels of authentication needed to ensure access is safe.

Features and Benefits

  • Understand the issues/options available when considering the security requirements for Office 365 operations.
  • Identify the benefits of a Microsoft-centric approach to Office 365 security and third-party security vendor alternatives.

Key questions answered

  • What is increasing the need for better security and data protection controls?
  • What has encouraged growth in third-party security tools that deliver extra levels of business protection?

Table of contents

Ovum view

  • Summary
  • Using Office 365 introduces additional security and data protection challenges
  • Office 365 users must ensure that their systems are well protected
  • There are many examples of third-party protection solutions available for Office 365
  • Consider Microsoft as well as mainstream security competitors

Appendix

  • Further reading
  • Author

Recommended Articles

  • Service Provider Markets, Consumer & Entertainment Services,...

    MWC 2018 Highlights

    By Ronan De Renesse 27 Feb 2018

    Over 20 of our senior Ovum analysts and consultants attended this year’s Mobile World Congress in Barcelona at the end of February. In between meetings, briefings and presentations, our analyst team were blogging and tweeting about key developments, trends and rumors. Have a look through our daily MWC 2018 Highlights to find out what happened.

    Topics 5G AI IoT Cloud Payments SDN/NFV Smart home

  • Enterprise Decision Maker, Enterprise IT Strategy and Select...

    2017 Trends to Watch: Big Data

    By Tony Baer 21 Nov 2016

    The breakout use case for big data will be fast data. The Internet of Things (IoT) is increasing the urgency for enterprises to embrace real-time streaming analytics, as use cases from mobile devices and sensors become compelling to a wide range of industry sectors.

    Topics Big data and analytics IoT

  • Consumer & Entertainment Services

    US pay TV: Is it facing an existential threat?

    By Adam Thomas 28 Mar 2018

    With US pay TV having endured the worst year in its history, thoughts have inevitably turned to the future. The likelihood remains that the immediate future will remain highly uncomfortable for everyone except the scaled multinational digital platforms.

;

Have any questions? Speak to a Specialist

Europe, Middle East & Africa team - +44 (0) 207 017 7700


Asia-Pacific team - +61 (0)3 960 16700

US team - +1 646 957 8878

Email us at ClientServices@ovum.com

You can also contact your named/allocated Client Services Executive using their direct dial.
PR enquiries - Call us at +44 788 597 5160 or email us at pr@ovum.com

Contact marketing - 
marketingdepartment@ovum.com

Already an Ovum client? Login to the Knowledge Center now