Recently Microsoft announced their new Secure Productive Enterprise offering. This offering combines Office 365 with either the E3 or E5 packages, with the Enterprise Mobility + Security Suite, and Windows Desktop OS.
Microsoft has just launched special pricing through March of 2017! See below.
Contact us today to talk about how to take advantage of this offer with Microsoft!
While moving to the cloud has increased flexibility for employees and reduced IT cost, it has also raised new security concerns for many organizations.
To realize the full benefit of cloud applications, IT teams must find the right balance of enabling access while maintaining control to protect critical data.
In this on-demand event, Microsoft and Microsoft Cloud Consumption Partner of the Year, Interlink Cloud Advisors show you how an organization can take full advantage of the cloud while maintaining control, security and improved visibility into activity with Advanced Security Management and Advanced eDiscovery.
Through demos and successful customer deployment scenarios, we’ll help you understand the new security and compliance functionality available in Office 365 and show you can achieve:
Improved Security and Compliance: Protect and control access to your data
Accelerated Response Times: Take corrective action quickly on security violations
Reduced Risk: Reduction in the time spent looking for litigation information
Improved Protection: Reduce ransomware and malware
After viewing, you'll also understand new Office 365 E5 licensing and all of your security options and bundles available.
Advanced eDiscovery and Advanced Security Management
Jason Wingert Vice President & Principal Consultant, Interlink Cloud Advisors
I’ve said for a while that if you haven’t invested in a corporate-managed external file sharing software like Box, Dropbox or OneDrive, then I guarantee at least some of your users have gone rogue and done it themselves. For a long time, corporate users have been frustrated with email attachments that are blocked and aging and unreliable ftp servers. As a result, many have resorted to creating their own personal Dropbox accounts. These personal accounts may be connected to personal email addresses or even a corporate email address. These personal Dropbox accounts are being used to transfer the corporate documents you are responsible for protecting. This is commonly encouraged by vendors and so your end users see it as harmless. Everyone does it. It’s possible that even the IT department isn’t overly concerned about it – I haven’t seen many IT departments drop everything to fix the problem. Before I explain my concern…let me start with a story.
As a member of IT leadership, you get a phone call from Dropbox. They inform you that 100 users in your organization have Dropbox accounts that they created on their own, using their corporate email. So – aren’t you interested in an Enterprise account so you can manage them? First, this may come as a shock – 100 users! You ask – can I find out who those users are? No, they won’t provide that information, you don’t own it. You look into the cost and it’s more than you want to deal with, so you put it to the side to be addressed later.
In the meantime, Dropbox has a security breach. Those 100 users from your own organization now have shared content that can be compromised. This time, it’s only old passwords and Dropbox forced password resets for those that needed it. However, we’ve seen a lot of security breaches lately across a number of platforms and many of them have been on relevant and active information. Sure, you could always just have them go change their passwords when these things happen. In this case though, you don’t even know who to contact to make sure they do. And…what if that compromised password is on an account that links to their corporate email and it was the same one they used to log into your network with? They didn’t just hack Dropbox, your network is at risk. So, you don’t know who has an account, who used the same password for their corporate account, who hasn’t changed their password since the breach, or what content is at risk. This isn’t a good situation!
Fortunately, the answer may be easier than you think. For many, OneDrive for Business is already part of your licensing agreement. It’s an easy roll-out and one of the easiest components of Office 365 to train users on. For those concerned about not being ready for the cloud, you can still support your on-premises SharePoint 2013 or 2016 servers and configure a redirect to OneDrive for Business instead of using My Sites. Easy! No more excuses.
Contact Interlink to learn more about OneDrive and how it keeps your documents secure.
FindTime for Office 365 Makes Scheduling a Meeting Easy
Scheduling across multiple organizations can be a difficult process. A one-hour meeting with seven people from two different companies can take weeks to schedule. For the meeting organizer, planning a meeting between multiple third party representatives is a tiresome game of phone and email tag. For the attendees, it’s equally as frustrating. Just as soon as the business calendar is being updated, an email storms the inbox, stating that someone forgot to check a calendar and a new meeting time is needed.
Those who have gone through this process frequently find themselves saying, “There has to be a better way to schedule these meetings.”
Scheduling FOR the People
With the addition of Microsoft’s FindTime to the Office 365 suite, a better way to schedule meetings across organizations exists. FindTime is a free Outlook add-in that gives meeting organizers and attendees the flexibility to schedule a time that works for everyone. FindTime reduces the amount of phone calls and email clutter that piles up during the scheduling process.
How does FindTime work?
FindTime is a plugin for Outlook with Office 365. You can either start a new message or reply with a meeting poll. Next, it automatically looks at your calendar and the calendars of people in your organization, and show times when all invitees are available. The coolest part is...the application emails the “poll” to the other parties and lets them select the times they are available, along with the ones that they prefer the most.
FindTime is a welcomed tool for sales teams, product managers, business developers, and any other business units that require meetings with other organizations.
To use FindTime, the organizing party must have an active Office 365 subscription and be using Outlook. However, attendees don’t need an Office 365 subscription and they don't have to be using Outlook. FindTime transforms multiple party scheduling by seamlessly working across different email service providers, devices, and organizational sizes and structures.
With FindTime, organizers and attendees can focus their time and resources on how to make meetings productive, not how to make them happen.
Cloud App Security and Office 365 Advanced Security Management are very comparable Microsoft products, and many of our clients are confused over the difference between them. Both were acquired by Microsoft through the acquisition of Adallom and give users the capability to create security policies and receive alerts when those policies are breeched. In addition, each of the products give users the ability to set manual or automation remediation. Focused on Office 365, Advanced Security Management (ASM) does that work automatically.
In contrast, Cloud App Security covers a wide range of SaaS-based applications - including competitor’s services like Box, Salesforce, and Amazon Web Services. Cloud App Security also adds more functionality including its own data loss prevention, ability to automatically add new applications, and integration with Security Information Event Management (SIEM) products.
The below chart provides additional details on when each product includes:
Contact Interlink today to discuss your needs and which solutions would be a fit for your organization.
All content provided on this blog is for informational purposes only. The owner of this blog makes no representations or warranties regarding the information from our partners or other external sources.