Office 365: CXO's Guide to Security & Archiving Challenges

By Osterman Research

In this Osterman Research paper, you’ll learn about:

  • Limited or insufficient inbound and advanced targeted threat protection techniques, such as real-time link following and sandboxing technologies, in addition to reputation checks
  • Missing email encryption features, including end-user revocation of messages that may have been sent to an unintended recipient
  • Data Location, Mobility, and Application Version limitations, especially those pertaining to geographical and jurisdictional requirements and malicious link detection for mobile devices
  • Archiving of instant messaging content, conference content, or content from application-sharing or desktop-sharing sessions
  • Additional business, regulatory, and service level considerations taken by decision makers and influencers pertaining to Microsoft management of corporate email