14 Jul
2016

Office 365 Beefs up Security With Advanced Security Management

Sixty-five percent of companies still have security concerns when migrating to the cloud, according to the Netwrix Cloud Security Survey. In an effort to combat cloud-based security concerns, Microsoft unveiled its Office 365 Advanced Security Management that features threat detection and identification of high-risk or abnormal usage. There’s also an enhanced granular control panel that determines what security policies your IT department should take to allow and restrict access.

Instead of stopping at security, Advanced Security Management also offers insights into Office 365 usage and shadows IT that can help with investment decisions. Here’s a look at how each benefit works and how it impacts the businesses adopting it.

 

Enhanced Security Protocols

It can prove difficult for IT departments to see how Office 365 interacts with a company’s third-party applications. Advanced Security Management helps detect failed login attempts and behavioral triggers. From there, administrators can suspend specific accounts or take a look at vulnerabilities between applications.

For example, Microsoft offers an Enterprise Mobility platform with a single sign-on to SaaS apps like Salesforce and Workday. Advanced Security Management takes a look at what kind of data and what type of regularity is being sent to an app like Salesforce or third-party storage like Dropbox. If the information is deemed sensitive, IT teams can suspend those accounts or revoke access.

 

More Network Visibility

Advanced Security Management also provides usage statistics and transparency, which helps businesses’ bottom lines and maximizes investments in various applications. For example, instead of investing in an app employees say they’re using and find helpful, companies can monitor exactly what type of apps are being used, how they’re being used and what data is being sent to OneDrive for business. From there, businesses can make more informed choices about what apps they purchase and which prove to be the most effective. This also enables IT departments to see how sensitive data is being shared on these apps and set access limitations as appropriate.

Related Posts: