escloud for saas: office 365 ·...

1
GAIN CRITICAL VISIBILITY WITH ALWAYS-ON THREAT MONITORING Industry-leading tech illuminates Office 365 activity and empowers eSentire Security Operations Center (SOC) analysts to hunt threats 24x7. RAPIDLY IDENTIFY MALICIOUS AND SUSPICIOUS ACTIVITY Machine learning and predictive analytics make sense of expected and unexpected behavior, accelerating investigation of potential threats. MINIMIZE THREAT ACTOR DWELL TIME Integrated response enables lock down and isolation of threats with full remediation support that hardens your Office 365 environment against future attack. EXCEED REGULATORY REQUIREMENT Co-managed model with customized reporting lets your team generate alerts, meet compliance requirements and investigate events alongside eSentire SOC analysts. eSentire, Inc., the global leader in Managed Detection and Response (MDR), keeps organizations safe from constantly evolving cyberattacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business disrupting events. Protecting more than $6 trillion AUM, eSentire absorbs the complexity of cybersecurity, delivering enterprise-grade protection and the ability to comply with growing regulatory requirements. For more information, visit www.esentire.com and follow @eSentire. esCLOUD for SaaS: Office 365 Collaborate with confidence OFFICE 365 ADOPTION IS ACCELERATING OFFICE 365 OFFERS BUSINESS BENEFITS, BUT THEY COME WITH ADDITIONAL RISK WHERE OFFICE 365 SECURITY RESPONSIBILITIES LIE While Microsoft is accountable for the security of the cloud, your responsibility is protecting access and the data within. RESOURCE RESTRICTIONS AND COMPLEXITY INCREASE CONFUSION AS A RESULT, CYBERATTACKERS EXPLOIT BLIND SPOTS WITH RECORD SPEED AND PRECISION THE SOLUTION ABOUT e SENTIRE of organizations use Office 365 2 Office Suite Exchange Online Sharepoint Power BI Sway Skype for Business Delve Yammer OneDrive Azure Active Directory Most widely adopted Software as a Service (SaaS) application 1 71 Accessibility to applications and data anytime, anywhere Enables collaboration with multi-user access Simplifies information exchange Increases productivity with document and file sharing Application and data centralization Unauthorized access Data classification and accountability Microsoft End-User/Customer Client and endpoint protection Identity and access management Application level controls Network controls Host infrastructure Physical security Hijacking of accounts External sharing of data Malicious insiders Malware and ransomware monthly Office 365 users 3 180 M of organizations use Microsoft Exchange 4 33 Realm of Responsibility Office 365 Microsoft Office 365 offers your organization access to critical information and enables collaboration anywhere, anytime on any device. While native Office 365 security features provide your organization with a groundwork layer of protection, threat actors are demonstrating the ability to bypass these controls with speed and precision, leaving your organization at risk. # 1 Adoption Benefits Risks Attacker Speed 10 esCLOUD for SaaS. Full threat visibility. Rapid detection. Focused response. 71 25 41 report limited expertise and training 6 of organizations have at least one compromised Office 365 account each month 11 of phishing attacks bypass Office 365’s built-in security 12 organizations can analyze 75% + of their cloud security events 7 express confusion of shared security responsibility 5 only 1 in 10 54 1-5 Hours 5-10 Hours 10-15 Hours >15 Hours Probability of exploit increases as more time passes 15 20 19 46

Upload: others

Post on 22-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: esCLOUD for SaaS: Office 365 · new-report-finds-25-of-phishing-attacks-circumvent-office-365-security eSentire, Inc., the global leader in Managed Detection and Response (MDR), keeps

GAIN CRITICAL VISIBILITY WITH ALWAYS-ON THREAT MONITORING

Industry-leading tech illuminates O�ce 365 activity and empowers eSentire Security Operations Center (SOC) analysts to hunt threats 24x7.

RAPIDLY IDENTIFY MALICIOUS AND SUSPICIOUS ACTIVITY

Machine learning and predictive analytics make sense of expected and unexpected behavior, accelerating investigation of potential threats.

MINIMIZE THREAT ACTOR DWELL TIME

Integrated response enables lock down and isolation of threats with full remediation support that hardens your O�ce 365 environment against future attack.

EXCEED REGULATORY REQUIREMENT

Co-managed model with customized reporting lets your team generate alerts, meet compliance requirements and investigate events alongside eSentire SOC analysts.

1,2 2018 Cybersecurity Insiders Cloud Security Report3 Office 365 IT Pros, 2019 4 2018 Cybersecurity Insiders Cloud Security Report

5 Oracle and KPMG Cloud Threat Report 20196 2019 Cybersecurity Insider Cloud Security Report7 Oracle and KPMG Cloud Threat Report 2019

8 2019 Cybersecurity Insider Cloud Security Report9 Oracle and KPMG Cloud Threat Report 201910 2018 Nuix Black Report

11 Definitive Guide to O365 Data Protection, McAfee12 https://www.trendmicro.com/vinfo/hk-en/security/news/cybercrime-and-digital-threats/ new-report-finds-25-of-phishing-attacks-circumvent-office-365-security

eSentire, Inc., the global leader in Managed Detection and Response (MDR), keeps organizations safe from constantly evolving cyberattacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), sta�ed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business disrupting events. Protecting more than $6 trillion AUM, eSentire absorbs the complexity of cybersecurity, delivering enterprise-grade protection and the ability to comply with growing regulatory requirements. For more information, visit www.esentire.com and follow @eSentire.

esCLOUD for SaaS: Office 365Collaborate with confidence

OFFICE 365 ADOPTION IS ACCELERATING

OFFICE 365 OFFERS BUSINESS BENEFITS, BUT THEY COME WITH ADDITIONAL RISK

WHERE OFFICE 365 SECURITY RESPONSIBILITIES LIE

While Microsoft is accountable for the security of the cloud, your responsibility is protecting access and the data within.

RESOURCE RESTRICTIONS AND COMPLEXITY INCREASE CONFUSION

AS A RESULT, CYBERATTACKERS EXPLOIT BLIND SPOTS WITH RECORD SPEED AND PRECISION

THE SOLUTION

ABOUT eSENTIRE

of organizations use O�ce 3652

• O�ce Suite • Exchange Online • Sharepoint

• Power BI • Sway

• Skype for Business • Delve • Yammer

• OneDrive • Azure Active Directory

Most widely adopted Software as a Service (SaaS) application1

71

• Accessibility to applications and data anytime, anywhere

• Enables collaboration with multi-user access

• Simplifies information exchange

• Increases productivity with document and file sharing

• Application and data centralization

• Unauthorized access

Data classification

and accountability

Microsoft End-User/Customer

Client and

endpoint protection

Identity and

access management

Applicationlevel

controls

Network controls

Host infrastructure

Physical security

• Hijacking of accounts

• External sharing of data

• Malicious insiders

• Malware and ransomware

monthly O�ce 365 users3

180Mof organizations use Microsoft Exchange4

33

Realm of Responsibility

O�ce 365

Microsoft O�ce 365 o�ers your organization access to critical information and enables collaboration anywhere, anytime on any device. While native O�ce 365 security features provide your organization with a groundwork layer of protection, threat actors are demonstrating the ability to bypass these controls with speed and precision, leaving your organization at risk.

#1

Adoption Benefits

Risks

Attacker Speed10

esCLOUD for SaaS. Full threat visibility. Rapid detection. Focused response.

71 25

41

report limited expertise and training6

of organizations have at least one compromised O�ce 365 account

each month11

of phishing attacks bypass O�ce 365’s built-in security12

organizations can analyze 75% + of their cloud security events7

express confusion of shared security responsibility5

only1in1054

1-5 Hours 5-10 Hours 10-15 Hours >15 Hours

Probability of exploit increases as more time passes

15 20 1946