Assess the Viability of M365/O365 Security Add-Ons
If you're already a member, click here to log in.
Major Business Pain Points
The technical side of IT security demands the best security possible, but the business side of running IT demands that you determine what is cost-effective and can still do the job. You likely shrugged off the early iterations of Microsoft’s security efforts, but you may have heard that things have changed. Where do you start in evaluating Microsoft’s security products in terms of effectiveness? The value proposition sounds tremendous to the CFO, “free” security as part of your corporate license, but how does it truly measure up and how do you articulate your findings to the business?
Recommendations
Key Points
Microsoft’s security products have improved to the point where they are often ranked competitively with mainstream security products. Depending on your organization’s licensing of Office 365/Microsoft 365, some of these products are included in what you’re already paying for. That value proposition is hard to deny.
Approach
Determine what is important to the business, and in what order of priority.
Take a close look at your current solution and determine what are table stakes, what features you would like to have in its replacement, and what your current solution is missing.
Consider Microsoft’s security solutions using an objective methodology. Sentiment will still be a factor, but it shouldn’t dictate the decision you make for the good of the business.
Methodology and Tools
Executive Brief
Read our concise Executive Brief to assess the viability of M365/O365 security add-ons. Review the methodology and understand the four key steps to completing this project.
1. Review your current state
Examine what you are licensed for, what you are paying, what you need, and what your constraints are.
2. Assess your needs
Determine what is “good enough” security and assess the needs of your organization.
3. Select your path
Decide what you will go with and start planning your next steps.
All resources on this page are provided to Cyber Leadership Hub members under license from third parties including Info-Tech Research Group Inc, a global leader in providing IT research and advice.