Why maximizing your business productivity and security is crucial when using Microsoft Office 365
As we all know, enterprises are moving from on-premises hosted applications to public cloud applications. One of the most successful cloud SaaS applications is the Microsoft Office 365.
Enterprises around the world use Office 365 applications such as Exchange mail-services, SharePoint document collaboration application, Lync Unified Communication services, OneDrive Cloud Storage Services to avoid hosting, installing and maintaining those applications on premises with their own IT personnel.
With the huge proliferation of Office365 across businesses and the migration of on-premises Microsoft applications to Office 365 Cloud Services, businesses must ensure predictable performance and excellent user experience, identify service degradations, plan capacities and expansions ahead and tighten the security of their employees when they are using MS/Lync video & voice conferencing or sharing documents or files using MS/SharePoint with their colleagues.
Migration of Microsoft on-premises solution to Office 365 increases Internet bandwidth consumption significantly, thus impacting user experience. Recent research shows that performance and security are prime concerns of enterprises when using Office 365 and other enterprise public cloud SaaS applications.
Microsoft stated recently in its “Plan for Internet Bandwidth Usage for Office 365” article: “Using Office 365 service offerings may increase your organization’s Internet traffic, so it is important to evaluate and assess the network impact of the services. Email traffic with Exchange hybrid deployment and directory synchronization activity has the most impact on bandwidth, but some organizations may notice a general increase in Internet traffic after migrating users to the Office 365 suite.” The article provided recommendations for mitigating the performance risks and ways to prevent saturation of network bandwidth.
To assist enterprises with their performance challenges when they are migrating to Office 365, Allot has launched its Cloud Access Optimization Solution for Office 365, supporting the entire migration lifecycle to Office 365. Prior to migration, Cloud Access Optimization provides the enterprise IT staff with the required IT intelligence to understand their existing network resource consumption of their on-premises Microsoft applications, and to understand the strain on their existing internet infrastructure by various applications. With this information, enterprises can plan ahead of time and ensure a smooth migration to Office 365.
After the migration, Cloud Access Optimization allows enterprises to deliver predictable Internet capacities for employees while using Office 365 applications, to continuously monitor and troubleshoot degradations, to plan capacities ahead, and to set and control corporate employee’s usage at any location for every Office 365 application.
Enterprise migration from on-premises applications to cloud-based applications creates significant concerns for security officers since the enterprise security perimeter is extended to the cloud, and therefore employee credentials are used everywhere, network transactions are encrypted and transactions hidden under anonymous communications (such as TOR) are used. All this makes both the network infrastructure as well as the end users more vulnerable for attacks, adding complex attack vectors.
Cloud Access Security help security professionals to identify malicious activity by inspecting every transaction including those that are hidden under SSL or are anonymized. This allows for identifying security breaches as quickly as possible. Enterprises can retain those transaction logs for auditing purposes or to respond to inquiries.
What do enterprises gain from cloud access security?
- Protection of their network infrastructure from DDoS attacks
- Securing of endpoints from phishing web sites, against infiltration from malicious web sites known for including malware or containing forbidden web content
- Protecting endpoint devices from being infected by malware attacks via web and email
- Identification of infected endpoints