 back to blog

Vectra SaaS Detections – Office 365

February 11, 2020
Please note that this is an automated translation. For the most accurate information, refer to the original version in English.

With increasingly sophisticated threats, cyber-risk is becoming an escalating concern for organizations around the world. Data breaches through Office 365 lead the pack as 40% of organizations suffer from account takeovers despite the rising adoption of incremental security approaches like multi-factor authentication.

Office 365 has more than 180 million monthly users, according to Microsoft’s Q3 FY19 earnings call, making it impossible to have 100% cyber hygiene. It is only a matter of time before an attacker moves laterally into other parts of the infrastructure once an initial foothold is obtained.

That’s why we are excited to announce Vectra Detect for Office 365 solution to extend the efficiency of your security operations and help securely and successfully protect applications.

Backed by new detection models covering everything from credentials and privilege to configuration for SaaS applications, Vectra expands cloud coverage from Infrastructure-as-a-Service (IaaS) and extends the ability to track attacker activity pivoting between on-premise, data center, IaaS and SaaS.

“The last thing we want is to create more work for security teams. What is needed is technology that removes the dependency on human behavior and human error and brings control back to the security team. This is what Vectra can provide,” says Vectra CEO Hitesh Sheth.

Take back control and get complete visibility across your deployment footprint and leave attackers without a place to hide. Learn more about Detect for Office 365.

Want to learn more?

Vectra® is the leader in Security AI-driven hybrid cloud threat detection and response. The Vectra platform and services cover public cloud, SaaS applications, identity systems and network infrastructure – both on-premises and cloud-based. Organizations worldwide rely on the Vectra platform and services for resilience to ransomware, supply chain compromise, identity takeovers, and other cyberattacks impacting their organization.

If you’d like to hear more, contact us and we’ll show you exactly how we do this and what you can do to protect your data. We can also put you in contact with one of our customers to hear directly from them about their experiences with our solution.

Get in touch