Discover how cybercriminals use legitimate Office 365 services to launch attacks
Read how attackers used Office 365 to attempt financial fraud and IP theft
Start your free trial to see Cognito Detect for Office 365 in your environment.
Can your network security see threats emerging from the cloud?
Vectra Cognito detects threats from cloud-based SaaS, IaaS, and PaaS.
Less office + more cloud = increased attack surface
The workplace looks different today. Rapidly moving to the cloud has enabled your remote workforce to be effective, and further constrained IT resources and security analysts.
Malicious cloud apps
Malicious cloud apps bypass multifactor authentication solutions to gain full access to user accounts, and create additional privileged and admin level accounts
Attackers use Power Automate
Attackers use Power Automate to exfiltrate sensitive data to other cloud services that look benign
Misconfigurations in cloud software, infrastructure, and platforms are easy entry for attacks
“The escalating sophistication of threats requires organizations to use multiple sources of data for threat detection and responses. Network-based technologies enable technical professionals to obtain quick threat visibility across an entire environment without using agents.”
Gartner research report “Applying Network-Centric Approaches for Threat Detection and Response” published March 18, 2019 (ID: G00373460), Augusto Barros, Anton Chuvakin, and Anna Belak
Account takeover in Office 365 has become the largest threat vector in the cloud
Rise in compromised credentials to accounts*
Breaches taking months or longer to discover
Vectra gives us much better visibility into threat behaviors across our entire deployment. We now have a greater degree of confidence that we can detect and stop credential abuse that has become common in Office 365."
IT security manager
GHHM NHS Foundation Trust