Assess the Viability of M365/O365 Security Add-Ons


Start with Microsoft before spending money elsewhere.

If you're already a member, click here to log in.

Major Business Pain Points

The technical side of IT security demands the best security possible, but the business side of running IT demands that you determine what is cost-effective and can still do the job. You likely shrugged off the early iterations of Microsoft’s security efforts, but you may have heard that things have changed. Where do you start in evaluating Microsoft’s security products in terms of effectiveness? The value proposition sounds tremendous to the CFO, “free” security as part of your corporate license, but how does it truly measure up and how do you articulate your findings to the business?

Assess the Viability of M365/O365 Security Add-Ons-Pain Points

Recommendations

Key Points

Microsoft’s security products have improved to the point where they are often ranked competitively with mainstream security products. Depending on your organization’s licensing of Office 365/Microsoft 365, some of these products are included in what you’re already paying for. That value proposition is hard to deny.

Approach

Assess the Viability of M365/O365 Security Add-Ons-Recommendations

Determine what is important to the business, and in what order of priority.

Take a close look at your current solution and determine what are table stakes, what features you would like to have in its replacement, and what your current solution is missing.

Consider Microsoft’s security solutions using an objective methodology. Sentiment will still be a factor, but it shouldn’t dictate the decision you make for the good of the business.

Methodology and Tools

Executive Brief

Read our concise Executive Brief to assess the viability of M365/O365 security add-ons. Review the methodology and understand the four key steps to completing this project. 

  • Assess the Viability of M365/O365 Security Add-Ons – Executive Brief
  • Assess the Viability of M365/O365 Security Add-Ons – Phases 1-3

1. Review your current state

Examine what you are licensed for, what you are paying, what you need, and what your constraints are.

  • Microsoft 365/Office 365 Security Add-Ons Assessment Tool

2. Assess your needs

Determine what is “good enough” security and assess the needs of your organization.

3. Select your path

Decide what you will go with and start planning your next steps.

All resources on this page are provided to Cyber Leadership Hub members under license from third parties including Info-Tech Research Group Inc, a global leader in providing IT research and advice.