escloud for saas: office 365 ·...
TRANSCRIPT
GAIN CRITICAL VISIBILITY WITH ALWAYS-ON THREAT MONITORING
Industry-leading tech illuminates O�ce 365 activity and empowers eSentire Security Operations Center (SOC) analysts to hunt threats 24x7.
RAPIDLY IDENTIFY MALICIOUS AND SUSPICIOUS ACTIVITY
Machine learning and predictive analytics make sense of expected and unexpected behavior, accelerating investigation of potential threats.
MINIMIZE THREAT ACTOR DWELL TIME
Integrated response enables lock down and isolation of threats with full remediation support that hardens your O�ce 365 environment against future attack.
EXCEED REGULATORY REQUIREMENT
Co-managed model with customized reporting lets your team generate alerts, meet compliance requirements and investigate events alongside eSentire SOC analysts.
1,2 2018 Cybersecurity Insiders Cloud Security Report3 Office 365 IT Pros, 2019 4 2018 Cybersecurity Insiders Cloud Security Report
5 Oracle and KPMG Cloud Threat Report 20196 2019 Cybersecurity Insider Cloud Security Report7 Oracle and KPMG Cloud Threat Report 2019
8 2019 Cybersecurity Insider Cloud Security Report9 Oracle and KPMG Cloud Threat Report 201910 2018 Nuix Black Report
11 Definitive Guide to O365 Data Protection, McAfee12 https://www.trendmicro.com/vinfo/hk-en/security/news/cybercrime-and-digital-threats/ new-report-finds-25-of-phishing-attacks-circumvent-office-365-security
eSentire, Inc., the global leader in Managed Detection and Response (MDR), keeps organizations safe from constantly evolving cyberattacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), sta�ed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business disrupting events. Protecting more than $6 trillion AUM, eSentire absorbs the complexity of cybersecurity, delivering enterprise-grade protection and the ability to comply with growing regulatory requirements. For more information, visit www.esentire.com and follow @eSentire.
esCLOUD for SaaS: Office 365Collaborate with confidence
OFFICE 365 ADOPTION IS ACCELERATING
OFFICE 365 OFFERS BUSINESS BENEFITS, BUT THEY COME WITH ADDITIONAL RISK
WHERE OFFICE 365 SECURITY RESPONSIBILITIES LIE
While Microsoft is accountable for the security of the cloud, your responsibility is protecting access and the data within.
RESOURCE RESTRICTIONS AND COMPLEXITY INCREASE CONFUSION
AS A RESULT, CYBERATTACKERS EXPLOIT BLIND SPOTS WITH RECORD SPEED AND PRECISION
THE SOLUTION
ABOUT eSENTIRE
of organizations use O�ce 3652
• O�ce Suite • Exchange Online • Sharepoint
• Power BI • Sway
• Skype for Business • Delve • Yammer
• OneDrive • Azure Active Directory
Most widely adopted Software as a Service (SaaS) application1
71
• Accessibility to applications and data anytime, anywhere
• Enables collaboration with multi-user access
• Simplifies information exchange
• Increases productivity with document and file sharing
• Application and data centralization
• Unauthorized access
Data classification
and accountability
Microsoft End-User/Customer
Client and
endpoint protection
Identity and
access management
Applicationlevel
controls
Network controls
Host infrastructure
Physical security
• Hijacking of accounts
• External sharing of data
• Malicious insiders
• Malware and ransomware
monthly O�ce 365 users3
180Mof organizations use Microsoft Exchange4
33
Realm of Responsibility
O�ce 365
Microsoft O�ce 365 o�ers your organization access to critical information and enables collaboration anywhere, anytime on any device. While native O�ce 365 security features provide your organization with a groundwork layer of protection, threat actors are demonstrating the ability to bypass these controls with speed and precision, leaving your organization at risk.
#1
Adoption Benefits
Risks
Attacker Speed10
esCLOUD for SaaS. Full threat visibility. Rapid detection. Focused response.
71 25
41
report limited expertise and training6
of organizations have at least one compromised O�ce 365 account
each month11
of phishing attacks bypass O�ce 365’s built-in security12
organizations can analyze 75% + of their cloud security events7
express confusion of shared security responsibility5
only1in1054
1-5 Hours 5-10 Hours 10-15 Hours >15 Hours
Probability of exploit increases as more time passes
15 20 1946