For enterprise and mid-sized companies who have deployed Office 365 but have not realized the full value of their investment, Forcepoint removes the barriers to full adoption by enhancing security and compliance, taking back unsanctioned IT, and implementing the right architecture.
Forcepoint’s Office 365 Solution Positioning Statement
For enterprise and mid-sized companies who have deployed Office 365 but have not realized the full value of their investment, Forcepoint removes the barriers to full adoption by enhancing security and compliance, taking back unsanctioned IT, and implementing the right architecture.
Other providers offer point solutions and lack deep Microsoft integration. Only Forcepoint is deeply integrated with Office 365, offering the most complete security Office 365 environment available.
CISO, we want to help you to be the hero by spearheading the successful adoption & conclusion of your long-standing O365 migration project.
Source: 1)Barracuda 2017, 2) Skyhigh 2017
Also according to Microsoft Tech community, 87% of IT pros see driving adoption of O365 as a top priority. Source: https://www.binarytree.com/media/2226/journey-to-office-365-cloud-infographic.pdf
(Microsoft 2017)
Security & Compliance: This is the biggest barrier to full adoption. Often, Compliance teams restrict deployments while they ratify risk to compliance program, security teams may veto moving users to cloud alternative until they are confident that they have the security in place to maintain or increase the level of security to proect users and the data they are processing.
Workforce Unaware of Capabilities: - IT & security can support the business here by identifying unsanctioned IT that is being used instead of the sanctioned O365 application alternative. Identifying overlapping IT and raising awareness to the business users of the correct alternative is a quick win for everyone. - Working with the business to organise user training / coaching sessions etc.
Network Architecture Impacts User Experience: According to zScaler those organisations that migrate users over to O365 cloud apps see a 40% increase in bandwidth requirements. 70% of organisations see bandwidth issues reported on a weekly basis (30% report daily issues!).
Why?
Even with SaaS you need to look after users and data – e.g. compromised accounts, enforcing strong authentication, managing the devices they access cloud apps from etc..
Also, would you rely on the cloud provider’s security alone? – or would you prefer to have your own oversight (e.g look for advanced malware in file stores or email services that the cloud app provider says they do already? – you’ll always find things that were not detected..
Also even if SaaS provider offers security, each app (or platform) has it’s own security domain, and that means multiple places to create and manage security policies, as well as inconsistent capabilities too (This also applies to governance and compliance too)…
Discover your files (Attack Surface)
Manage the flow of data across the organization
Integrate with Enterprise DLP to gain deeper visibility and control
New data actions / incidents: (Public sharing, over sharing, saving into unsanctioned IT)
Skyhigh: 21% of sensitive files that are shared externally are accessed within 5 minutes of the sharing action, making response time critical to preventing data breaches. –
Overall, 18,1% of files uploaded to cloud-based file sharing and collaboration services contain sensitive data, which can be broken
down into six categories:
• 4.4% of data is confidential (e.g. financial records, business plans, source code, trading algorithms, etc.)
• 3.9% of data contains personally identifiable information (e.g. Social Security numbers, tax ID numbers, phone numbers, date of birth, etc.)
• 3.2% of data is password protected, and most security solutions do not inspect it (e.g. password protected ZIP files, Excel spreadsheets, etc.)
• 2.7% of data is email (e.g. PST exports from Microsoft Outlook, individual EML messages, individual MSG messages, etc.)
• 2.3% of data contains payment information (e.g. credit card numbers, debit card numbers, bank account numbers, etc.)
• 1.6% of data contains protected health information (e.g. patient diagnoses, medical treatments, medical record IDs, etc.)
https://info.skyhighnetworks.com/WPCloudAdoptionandRiskReportQ42016_BannerCloud.html?Source=Website&LSource=Website
SYMC 2017: https://resource.elq.symantec.com/LP=4717?cid=70138000001QNHyAAO&inid=symc_cloud-application-security-cloudsoc_fam_to_leadgen_form_LP-4717_1H-2017-shadow-data-report
SYMC 2016: http://www.computerweekly.com/news/450298345/Shadow-data-and-the-risks-posed-by-cloud-storage-and-apps (SYMC)
Then there is over-sharing. Cloud security developer Elastica’s vice-president Eric Andrews says the company’s threat team analysed 63 million documents stored by its customers in 2015, looking for shadow data threats.
It discovered that 25% of the documents owned by the average user were broadly shared; for example, shared with everyone in the company, with outside contractors or accessible to anyone with the web link.
Of those broadly-shared documents, 12.5% (so 3% overall) contained sensitive or compliance-related data. The type of data at risk varied by industry.
Forcepoint’s Office 365 solution can help you move past these barriers by providing the confidence you need to fully adopt the suite. Confidence you can:
Enhance Microsoft’s integrated cloud security and regain visibility & protection against advanced attacks and data loss
Maintain compliance consistently into the Microsoft ecosystem and beyond
Take back control of unsanctioned IT impacting the full adoption of Office 365 and maintain workforce productivity with reduced risk
Have the right architecture to improve user experience and reduce cost as you fully adopt the Microsoft applications and migrate users to the cloud
Ask your audience – where do you want to start?
Make sure we emphasise that we can do all of this, BUT NOT JUST LIMITED TO MICROSOFT – we can extend all of this to all cloud applications and legacy infrastructure too.
Biggest Differentiators: Custom / Bespoke App mapping and security, Embedded UEBA provides Context & Adapt controls to block risky users, not just notify.
Identify all cloud apps in use (Sanctioned & unsanctioned)
User CASB and or Web gateway. Web gateway can also identify shadow IT, and then block access to unwanted apps. In the next release you can then provision CASB management of sanctioned apps from within Web Gateway console..
Investigate each app to understand impact, compare similar apps to find a safer alternative etc..
Improve user experience
Take advantage of local broadband
Improve availability
Reduce operational costs by half
Improve branch office security
Forcepoint’s Office 365 solution can help you move past these barriers by providing the confidence you need to fully adopt the suite. Confidence you can:
Enhance Microsoft’s integrated cloud security and regain visibility & protection against advanced attacks and data loss
Maintain compliance consistently into the Microsoft ecosystem and beyond
Take back control of unsanctioned IT impacting the full adoption of Office 365 and maintain workforce productivity with reduced risk
Have the right architecture to improve user experience and reduce cost as you fully adopt the Microsoft applications and migrate users to the cloud
Ask your audience – where do you want to start?
Make sure we emphasise that we can do all of this, BUT NOT JUST LIMITED TO MICROSOFT – we can extend all of this to all cloud applications and legacy infrastructure too.
Biggest Differentiators: Custom / Bespoke App mapping and security, Embedded UEBA provides Context & Adapt controls to block risky users, not just notify.
OUR SYSTEM HOLISTICALLY ADDRESSES CISO CONCERNS
Our system works together to effectively address all of the problems we’ve heard from CISOs:
Problem: Data being stored in places that you can’t easily see, and being accessed from anywhere
Human Point solution: DLP and Insider threat provide powerful investigation capabilities and NGFW = central visibility
Problem: Too many point solutions w/ no unified security policy
Human Point solution = integrated view of clouds, 3rd party apps and users, unifying multiple solutions into a single location
Problem: Too many alerts – cannot determine critical signal
Human Point solution: UEBA cuts through noise w/ analytics, DLP helps identify and offer guidance on riskiest behaviors
Problem: Worried about enforcement – manual, reactive, and too late
Human Point solution: UEBA = gives context to user actions across data sources to identify non-compliant activities, DLP remediates fraudulent activity before it happens
Your people access and share data using a myriad of different cloud apps. The bad news is, you probably have no idea how your data is used, where it travels to and the level of associated risk. You’ve lost visibility and control — we can help get it back.Register now for a FREE Cloud Threat Assessment Report that details your cloud-application risk posture. This in-depth assessment will show you:
Cloud usage patterns. How potentially harmful activities happen in cloud applications across your organization.
Geographical usage. Which countries your data is traveling to and from (you may be surprised).
Privileged users. Do you have more administrators than you need?
Dormant users. Are you overspending on unused licenses?
Riskiest users. Who are your riskiest users and why?