The Need for Third-Party Security, Compliance and Other Capabilities in Microsoft® Office 365®

Symantec cover 2

Osterman Research conducted a market research survey with organizations that had at least 50 email users and that had not definitely ruled out the possible use of Office 365. In fact, 5% of the email users in the organizations surveyed are currently served by Office 365, a figure that is expected to increase to 22% by May 2014.

The survey, conducted in early May 2013 with the Osterman Research survey panel, focused on capabilities, features and functions that these organizations would require from their communication and collaboration systems, and how well these might be satisfied by Office 365 and other solutions. Some of the results from that survey are discussed in this white paper, but a separate document will be made available specifically focused on all of the survey results.

The sponsor of this white paper is Symantec. Information about the company and its relevant offerings are included at the end of this paper.

View whitepaper
Date: 29 January 2015, 9:57 am   |   Provider: Symantec Singapore Corp   |   Size: 2.36 MB   |   Language: English
This may interest you too:
Thumb original idr infographic automation is essential for cyber resilience final july 2019  1

Why automation is essential for cyber resilience

Digital transformation makes today’s businesses more productive and more vulnerable to cyberattacks. Security professionals know that breaches are inevitable. To be successful, companies must establish cyber-resilient endpoints. Where do you turn when legacy approaches fail? In a word: Automation. ...

To the download
Thumb original malwarebytes cybercrime tactics and techniques

Cybercrime tactics and techniques: Q2 2018

A generally slow quarter reflects an overall lullin cybercrime, picking up where Q1 left off with cryptominers continuing to dominate, ransomware continuing to evolve through experimentation, and exploits making a small but significant comeback.

New developments in ransomware and cryptomining drove the market, as Q2 attacks generally showed more sophistication than their Q1 counterparts. The introduction of complex VPNFilter malware, which dropped multi-stage attacks on hundreds of thousands of unsuspecting small office and consumer users, ...

To the download
Thumb original idr infographic automation is essential for cyber resilience final july 2019

Why automation is essential for cyber resilience

Digital transformation makes today’s businesses more productive and more vulnerable to cyberattacks. Security professionals know that breaches are inevitable. To be successful, companies must establish cyber-resilient endpoints. Where do you turn when legacy approaches fail? In a word: Automation. ...

To the download
Thumb original threat report discussion guide   whitepaper

2017 Threat Report - Discussion Guide

The Cylance 2017 Threat Report offers valuable analysis on the current state of cybersecurity. The information provided in the report is unavailable anywhere else. This Cylance® study includes research and information drawn from internal data and feedback provided by Cylance customers. The report offers considerable insights into recent threat trends and related security issues.

Some key findings of this report merit further discussion. These conversations represent an opportunity to dig deeper into the implications of current security stra ...

To the download
Thumb original 19q4 dev opps guide cloud 328387314 1b solution guide

AUTOMATE DEVOPS/SECOPS DEPLOYMENT WITH CI/CD PIPELINE INTEGRATIONS

By focusing on frequent code integration, automated testing, and keeping
the mainline code version in a state that is deployable to production at any
time, CI/CD aims to eliminate the risks and friction of traditional waterfall
software development. Add to that the practice of continuous deployment
and you can move to a situation where the latest and greatest software version
is not just always ready to be deployed—it’s deployed on a frequent basis. ...

To the download