Upload
others
View
3
Download
0
Embed Size (px)
Citation preview
All IDC research is © 2016 by IDC. All rights reserved. All IDC materials are licensed with IDC's permission and in no way does the use or publication of IDC research indicate IDC's endorsement of VMware’s products/or strategies.
Office 365Approaches for Optimizing Security
Microsoft Office 365 is a cloud-based office productivity suite delivering hosted communication services and
collaboration apps and email on user's devices.
It’s a fast-growing market …
Security issues can lead to challenges for enterprise mobility
… and requiring strong self-provisioning and one-touch access to multiple
resources, all tied to identity and role.
Mobile security investment plans for the future
which are becoming more diverse, and harder to manage
of enterprises have implemented the right security controls to handle multi-OS BYOD.
With so many organizations deploying Office 365 on personal iOS and Android devices, the risk of a
data loss or exposure breach increases.
Broad swaths of enterprise workforces are mobilizing…Types of workers with access to mobile business applications.
of enterprises use role/risk as criteria
for BYOD allowance of enterprises cite
access policy enforcement as top driver for no-BYOD
stance
Mobile Device Management
Identity and Access Management
Mobile Application Management
Mobile Content Security
With Office 365 running on a wide range of device types, ownership models, and deployments with a mix of business and personal apps, enterprises
realize they will need better device, identity, application and content controls.
Bringing together multiple security and management technologies—identity, device, app, native containment, and content—will be critical to secure
to Office 365 in complex, multi-platform organizations.
An IDC Infographic, sponsored by VMware
Worldwide collaborative & content cloud service revenue
20142019
$20B$8BTablets
53%Smartphones
44%
Supported OS platforms by enterprises using Microsoft Office 365 AND allowing BYOD devices
73% 74% 52%
Office-based workers
87%Field workers
53%Telecommuters
58%External contractors
and partners
45%
With data breaches and personal devices
as top challenge
of enterprises deploying mobile solutions have experienced security and compliance challenges
58%
of organizations allow some form of BYOD
88%
56%60%
Enterprises deploying Office apps across newer endpoints
Self service and secure single sign-on
Device security, and conditional access
Protect data at rest, in use, and
in transit
Consolidated catalog and adaptive
access
... BUT LESS THAN HALF
Apple devices Android devices Windows devices