office 365

Results 76 - 100 of 287Sort Results By: Published Date | Title | Company Name
Published By: OneLogin     Published Date: Oct 24, 2017
SaaS has fundamentally changed security requirements. We used to just go into work, and everything—corporate applications, sensitive customer data, employee health records, etc.—was within the “safe” four walls of the corporate network behind a firewall. Now employees work remotely and use mobile devices, including unmanaged, personal devices. They access SaaS apps that live in the cloud without any sort of firewall that IT can use to monitor and manage access. Prominent examples include Salesforce.com, Google Apps, Office 365, Box, and many others. As employees use these SaaS apps, they are creating proprietary company data, often confidential in nature, that exists outside the control of IT, creating new challenges for security teams. In this new world, IT needs to track sensitive corporate data in third-party SaaS apps, and ensure that only the right people have the right level of access to it. In this whitepaper, we’ll explain ten steps on how to do that
Tags : 
    
OneLogin
Published By: Darktrace     Published Date: Jun 17, 2019
The self-learning capability of Darktrace’s Enterprise Immune System allows TruWest to stay ahead of today’s sophisticated attackers, affording the credit union and its clients confidence in the integrity of their data and in the security of their assets. And with Darktrace’s coverage of Office 365, TruWest’s entire digital environment is protected by world-leading cyber AI.
Tags : 
    
Darktrace
Published By: Mimecast     Published Date: Jun 22, 2015
So, your organization has chosen to move to Office 365. Good choice. But how do you implement it and deal with the following issues:
Tags : 
microsoft office 365, offline emails, cloud backup, email security, data in the cloud, cyber attacks, networking
    
Mimecast
Published By: Mimecast     Published Date: Jun 22, 2015
Read the report now to get the knowledge you need to plan the perfect enterprise-class Office 365 environment.
Tags : 
limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity, compliance, control, data management
    
Mimecast
Published By: Mimecast     Published Date: Jun 22, 2015
Moving to an Office 365 environment can open the door to a wide range of business benefits. But what about continuity?
Tags : 
email continuity, microsoft office 365, mimecast, continuity plans, email downtime, business technology
    
Mimecast
Published By: Mimecast     Published Date: Jun 22, 2015
Mimecast commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying its Unified Email Management solution.
Tags : 
unified email management, uem, mimecast, microsoft office 365, email providers, email security, archiving, continuity
    
Mimecast
Published By: Mimecast     Published Date: May 09, 2018
Der Mimecast ESRA Report (E-Mail Security Risk Assesment) beleuchtet die Leistungsfähigkeit verschiedener E-Mail Security Lösungen. Der ESRA Report wird quartalsweise durchgeführt und auch der aktuelle Report stellt Lücken bei vielen Systemen im Schutz von Unternehmen gegen bösartige Dateitypen, Ransomware, Phishing und weiteren Angriffsversuchen über E-Mail fest. Fast ein Viertel der "unsicheren" E-Mails werden an die Posteingänge der Benutzer übermittelt. Erfahren Sie in dem Report, wie Sie Ihre Cyber Resilience für E-Mails erhöhen und mit einem mehrschichtigen Ansatz für Ihre Office 365 Umgebung deutlich die Sicherheit für Ihr Unternehmen steigern.
Tags : 
    
Mimecast
Published By: Okta     Published Date: Jul 27, 2016
Microsoft is making a massive push to the cloud, and as a result Office 365 is taking off. However, Office 365 is unlike any other cloud app in its complexity. Read this eGuide to learn about industry trends and best practices for rolling out Office 365 with maximum user adoption.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: Okta     Published Date: Aug 03, 2016
Microsoft is making a massive push to the cloud. As a result Office 365 is taking off. But in its complexity, Office 365 is unlike any other cloud app. Often this causes impactful deployment delays. Instead of relying on legacy tools Microsoft gives away, learn to remove the identity barriers for your Office 365 migration while building a foundation from which to launch your entire future cloud strategy. This webinar will discuss: • The basic identity management requirements for an Office 365 deployment • Microsoft’s existing identity management tools • The role of identity management in building a diverse cloud strategy
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications.
    
Okta
Published By: VMware     Published Date: May 10, 2017
As a cloud-based business services suite, Microsoft® Office 365™ provides organizations with access to web, mobile and desktop versions of traditional Office software tools, cloud storage space for enterprise file sharing, and hosted services for communication and social. By making these services available across desktop, mobile, and web platforms, Microsoft is experiencing increased adoption from both consumers and businesses while expanding the possibilities for anytime-anywhere collaboration. Yet for all its promise, Office 365 poses a meaningful adoption and security challenges for the IT organization. Download this whitepaper to discover how VMware Workspace ONE™ brings together the power of VMware AirWatch® and VMware Identity Manager™ to accelerate and secure Office 365 deployments.
Tags : 
    
VMware
Published By: Cyren     Published Date: Oct 17, 2018
An Osterman Research Survey Report
Tags : 
office 365, it security, cybersecurity, web security, phishing, microsoft office
    
Cyren
Published By: Mimecast     Published Date: May 15, 2014
This report aims to provide a fair and balanced analysis of Microsoft Office 365, its advantages, disadvantages and limitations that can be managed through third party services.
Tags : 
limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity, compliance, control
    
Mimecast
Published By: Mimecast     Published Date: May 15, 2014
A report into the downtime in email systems, its impacts and the relevant solutions.
Tags : 
email continuity, microsoft office 365, mimecast, continuity plans, email downtime
    
Mimecast
Published By: Mimecast     Published Date: May 15, 2014
A Forrester total economic impact study of Mimecast's UEM solution.
Tags : 
unified email management, uem, mimecast, microsoft office 365, email providers, email security, archiving, continuity
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
"Learn Office 365™ Migration Risks and How to Avoid a SaaS Monoculture. When considering a move to Office 365, organizations must be aware of several significant risks to their email infrastructure. The cloud may seem like a simple, cost-effective alternative to on-premises email, but continuity and security issues cannot be overlooked. Download the E-book to learn more about how to avoid cloud email headaches."
Tags : 
office 365, email security, cloud, cloud security, email infrastructure
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
Mimecast research finds that Office 365 adoption is growing quickly around the globe with 87% of respondents already using Exchange Online or planning to use it within the next twelve months. The survey also finds that email is an important communication channel with over 85% viewing email as critical to the organization. Whether your organization is already on Office 365, executing or planning a migration, this report reveals insights that can help make email more secure and resilient.
Tags : 
mimecast, office 365. email communication, email security, client communication
    
Mimecast
Published By: Mimecast     Published Date: Aug 22, 2017
The right third party solution can ensure that email is protected against advanced cyberattacks and guarantee service availability SLA – all while leveraging your investment in Office 365. But, what are the three key areas of concern around Office 365 email that you should be aware of? Read what Microsoft Office Servers and Services MVP, J. Peter Bruzzese has to say about the key features and functions you need to address security, data assurance and continuity for Office 365 email – and what to look for in a single solution that does it all.
Tags : 
office 365, risk mitigation, geek book, sla, cyberattacks
    
Mimecast
Published By: Mimecast     Published Date: Aug 22, 2017
Although many organizations are switching email accounts to Microsoft Office 365, they may well be exposing themselves to a wide range of security risks, data loss, and business continuity issues. This white paper explores how to use Microsoft Office 365 while protecting organizations from various security risks. Discover: • What to look for in third-party solutions • How to protect archived data • How to ensure business continuity
Tags : 
office 365, security, email security, archived data
    
Mimecast
Published By: Mimecast     Published Date: Aug 22, 2017
An Email Security Risk Assessment conducted this year by Mimecast re-examined more than 40 million emails that had been OK’d by various security solutions, including Office 365. Of those, more than 19,000 were found to be “dangerous file types,” infected with malicious malware attachments or cleverly disguised impersonation attacks. This expert white paper explores how you can close Office 365 email security gaps. Learn considerations for evaluating security services that can bolster your email security.
Tags : 
office 365, email security, risk assessment, security services, malware, security solutions
    
Mimecast
Published By: VMware AirWatch     Published Date: Nov 13, 2015
AirWatch Support for Office 365 (This infographic is in Japanese)
Tags : 
airwatch, emm, office365, cloud, security, it management, wireless, platforms, data management, business technology
    
VMware AirWatch
Published By: Microsoft     Published Date: May 04, 2017
If you’re looking for a simpler, less costly approach to phone and business communications, E5’s voice capabilities can help you reduce office space, host larger meetings and collaborate more effectively. Here’s an overview of the benefits.
Tags : 
microsoft office, 365, enterprise, business communications, collaboration
    
Microsoft
Published By: Box     Published Date: Jun 11, 2014
Box, the leader in Enterprise Content Collaboration, helps businesses integrate these applications and in particular add secure mobile collaboration to Microsoft Office 365. This whitepaper best practices for integrating two common enterprise applications – content creation and collaboration – with Box and Office 365. It provides a guide for business making the transition to the cloud and key use cases for collaboration.
Tags : 
box, enterprise transformation, enterprise content collaboration, office 365, microsoft, api integration, content creation, content collaboration, networking, it management, enterprise applications
    
Box
Published By: Okta     Published Date: Nov 09, 2015
One of the biggest challenges when migrating to Office 365 from your existing Exchange infrastructure, is that of Active Directory integration. Watch this demo to learn how to easily connect your Office 365 environment back to Active Directory without any new servers in your data center.
Tags : 
okta, office 365, directory sync, active directory, software development, it management, platforms, data management
    
Okta
Published By: Okta     Published Date: Mar 01, 2017
Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. We’re seeing it in how Okta customers are using Okta to connect to Office 365 in increasing numbers.
Tags : 
    
Okta
Published By: Okta     Published Date: Mar 01, 2017
Customers that are migrating to Microsoft Office 365 or on-boarding other cloud apps have complex requirements, particularly when it comes to the security of the service. Over the last 20 years, cyber security has evolved and now dominates the headlines. More than ever, users are accessing their messaging and productivity tools from untrusted networks, devices and workstations and providing multi-factor and analytics has never been more critical.
Tags : 
    
Okta
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee