A Guide to Protecting Microsoft Office 365 from Security Threats 2
© 2018 by The Enterprise Strategy Group, Inc. All Rights Reserved.
• In 2013, 61% of SaaS users delivered no more than 20% of their applications via SaaS. Today, nearly two-
thirds (63%) report that SaaS currently accounts for more than one out of five of their business
applications.
• More than one-third of all organizations surveyed in 2017 said that they currently used cloud-based email
(39%) and/or office productivity software (37%).
Microsoft is aggressively migrating companies to O365—inclusive of Exchange email, OneDrive (file sharing and
storage), and SharePoint/Sites/Teams/Groups/Yammer (collaboration)—and also transforming the way IT
services (inclusive of security) are delivered. As a result, businesses are finding themselves investigating ways to
embrace and protect O365 along with a plethora of other cloud-based applications and data. For instance, O365
users are enrolled in Azure Active Directory, which provides identity and access management for cloud services.
While some may see this move as a simple way to authenticate 0365, others will choose to integrate third-party
authentication or single sign on solutions for all their SaaS choices, including O365, and, a lesser recognized
benefit, the ability to sign on to cloud applications from Windows, Mac, Android, and iOS devices.
As companies (willingly or not) adopt cloud-based applications, they need to consider their broad ecosystem of
applications and cloud providers as well as the implications of O365. Businesses that have embraced O365 or are
in the midst of the decision to migrate to O365 are recognizing its many benefits, including:
•
Cost savings:
Primarily driven by a shift toward OpEx consumption models and a consolidation of IT tools.
•
Simplified IT management
: Simplified application of patches and updates, automation of tasks, and
proactive recognition of suspicious behavior.
•
Data security and control:
Leveraging the intelligence of the cloud to detect sophisticated threats, malware,
and user credentials theft, as well as adhere to compliance mandates.
•
Productivity and availability
: Secure, safe, and consistent access across devices, independent of end-user
location.
Threats Can Strike Any Time, Any Place…
As companies migrate to Microsoft O365 and other cloud applications, they are not always aware of potential
threats, policies with limited effectiveness, and vulnerabilities resulting from accidental configuration. Businesses
are still responsible for monitoring and controlling how applications are used, content is monitored, and data is
secured. As a result, they may find themselves at risk without fully understanding where they are truly
vulnerable.
To secure this range of cloud applications—some sanctioned and supported by the IT organization, and other
shadow IT constituents bending the rules based on application preference without the knowledge or support of
IT—some organizations have initially recognized the need for cloud access security broker (CASB) solutions to
provide user behavior analytics (UBA) to determine anomalous user patterns, data protection status, threat
detection/prevention strength, and breadth of overall security coverage across a variety of cloud applications
(O365 and beyond). In fact, 57% of respondents identified 0365 as one of the (top five) applications most in
need of the user access and data loss prevention controls and policies that CASB products provide.
Source: ESG Master Survey Results, 2018 IT Spending Intentions Survey, December 2017.
Source: ESG Research Report, 2017 Public Cloud Computing Trends, April 2017.