Select Page

Cyren Security Blog

The Cyren Security Blog is where Cyren engineers and thought leaders provide insights, research and analysis on a range of current cybersecurity topics.

Buying Email Security for Office 365 Has Gotten Harder

Has the success of Microsoft Office 365 exacerbated the already complex task of purchasing email security? New Buyer’s Guides give a framework and provide a checklist to get it right.

Over the last few years, the way businesses use technology has undergone a complete transformation, driven by two major trends — mobility and cloud application adoption.

At the same time, we are seeing constant evolution of internet threats, which when combined with mobility and cloud, is putting huge pressure on traditional security infrastructure. Cyber threats are becoming more frequent, sophisticated and evasive. The majority start with a malicious email, resulting in email security being one of the main focus areas for cyber security spend, second only to firewalls.

Current security concernsFigure 1: Framework for selecting email and web security solutions covered in new Buyer’s Guide

Office 365 Migration Creates Special Issues

Everyone who works in IT already understands this of course, but why suggest that Office 365 has any bearing on the email security buying process? There are two parts to the answer.

The first is that, through no fault of Microsoft’s, Office 365 is a victim of its own success. In much the same way that the popularity of Windows resulted in it being targeted by cyber criminals, as the number of Office 365 users increases rapidly, so do the threats specifically targeting those users. Cyren Security Lab research into phishing kits available on the dark web found that kits that phish for Office 365 credentials comprised 25% of the total number being sold. As a consequence, IT and information security professionals with Office 365 deployed are increasingly finding themselves challenged to ensure their email security controls protect their users, company, business partners and customers.

The second part of the answer is related to this challenge. The choices available to those evaluating email security products and services today are many and confusing. For companies that have migrated to Office 365, the inclusion of some bundled, basic email security exacerbates the complexity of this process.

Buyer’s Guides Now Available to Navigate Complexity

Large enterprises are having their fair share of difficulty in defending against modern internet threats, but they are (more likely than not) advantaged in terms of planning resources. They have dedicated security teams who assess their security posture and understand the technical, process and people controls that they need to put in place to mitigate the risks to the business. If well-organized, they are able to specify required functionality and work with the messaging infrastructure and operations teams to evaluate products and services.

Smaller and mid-sized enterprises will often not pursue the same depth of analysis and planning, as they are likely more budget and resource constrained.

Here at Cyren we do believe that the email security buying process has become more difficult, so to help those needing to cut through the complexity we have created a 27-page buyer’s guide specifically for Office 365 customers, as well as a general buyer’s guide relevant for those looking for any system, along with other resources also available at those links.

You might also like

Phishing with QR codes

Don’t Scan or be Scammed By Maharlito Aquino, Kervin Alintanahin and Dexter To In 1994, a type of the matrix barcode known as the Quick Response code, now widely known as QR code, was invented by Masahiro Hara from a Japanese company Denso Wave. The purpose of the...