• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Microsoft   »   Microsoft Ignite 2015: See How Trend Micro Can Enhance Office 365 Security

Microsoft Ignite 2015: See How Trend Micro Can Enhance Office 365 Security

  • Posted on:May 4, 2015
  • Posted in:Microsoft, Partners, Security
  • Posted by:
    Chris Taylor
0

Microsoft made a major strategic shift towards the cloud a few years ago that is certainly paying off. Driven by a surge in Exchange users migrating off in-house email servers, online productivity suite Microsoft Office 365 is taking Google and others on at their own game – and in many cases, winning.

But while Microsoft Office 365 contains built-in security features, many organizations are looking to enhance risk mitigation efforts by applying additional content security controls to the platform. In light of the growing trend towards covert, targeted attacks, this is a sensible strategy – and it’s why Trend Micro will be showcasing new technologies at Microsoft Ignite this week.

The targeted attack epidemic

Targeted attacks and APTs represent one of the biggest threats to corporate data in decades. Designed specifically to bypass existing defenses, exploit vulnerabilities and other security gaps in enterprise systems and remain hidden from traditional scanning software, they’re difficult to spot and even harder to stop. Targeted attacks typically start with a spearphishing email containing a malicious link or attachment – specially crafted to trick the user into clicking on or opening it. Doing so will begin a malware download in the background – enabling the attackers to gain network access and eventually to navigate to your organization’s most prized assets: its data.

Office 365 is a fantastic productivity platform allowing instant access to a range of hosted services wherever you are. These include Exchange, Lync, SharePoint and Office Web Apps – the latter featuring Word, PowerPoint, OneNote, Outlook, Excel and cloud sync and share service OneDrive. But the multiplicity of services also means an increased number of entry points for attackers. Aside from email, they can also get in via SharePoint and OneDrive. And OneDrive for Business is specifically designed to make file-sharing incredibly easy for users – replacing the email attachment with a simple link.

It’s no surprise that, according to Verizon’s latest Data Breach Investigations Report (DBIR), 70-90 percent of attacks spread from Victim 0 to Victim 1 in less than a day, and 40 percent in less than an hour. This understandably concerns many Office 365 users.

Enhancing security

While Microsoft includes excellent security for the data centers where Office 365 is hosted, IT managers want more security applied to content flowing through their online productivity platform. The truth is that nearly two-thirds (64 percent) of targeted attacks in 2014 used malware hidden in attachments such as Word, Excel and PowerPoint files. What’s more, such is the volume of malware around today, that 70-90 percent of malware samples are unique to an organization. IT Security wants to bolster their protection without impacting the user experience and productivity gains of Office 365.

Help at Hand

Thankfully, there are tools and technologies which organizations can invest in to enhance the existing Office 365 content security controls. Trend Micro has developed two in particular that can help boost email and file-sharing security within the platform:

Document exploit detection – inspects the components of Office files to look at attempts to exploit known and unknown vulnerabilities in Office applications. It’s effective at discovering malware hidden in office files as was used by criminals in two-thirds of targeted attacks in 2014.

Sandbox malware analysis – unlike static pattern file techniques, sandbox technology looks dynamically at suspect files to observe their behavior. They are opened in a virtual environment in and monitored for malicious behavior, such as dropping files in the background, opening a backdoor on the system, or making contact with a server controlled by criminals.  This technology is effective at detecting malicious files before an antivirus pattern file is available.

Both of these detection techniques are available for not only Office 365 email but also OneDrive for Business and SharePoint Online. They are enhanced with up-to-date information from the Smart Protection Network, Trend Micro’s security intelligence network, which analyses and correlates 100TB of threat information daily.

If you want to find out more about how our new technologies can help improve security for Office 365 email, OneDrive for Business, and SharePoint Online, stop by our booth (no. 230) at Ignite in Chicago, May 4-8. Or, check out our solutions here.

Related posts:

  1. How We Boost the Security of Office 365 by Blocking 3.4 Million High-Risk Email Threats
  2. Trend Micro Experts Provide Cloud Security Insights at Microsoft Ignite
  3. Why Trend Micro Will be on Fire at Microsoft Ignite This Week
  4. Driving Microsoft Channel Growth through Office 365-Ready Security

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.