Microsoft 365 Native Security: Unlocking Compliance and Monitoring Features

No business is exempt from meeting some kind of compliance or governing regulation. These controls are put in place (generally speaking) to help ensure trust and consistency when dealing with goods and services. When it comes to “as a Service” offerings, these regulations can enter grey areas and offer misconceptions of who is responsible — and at fault — if there is a violation. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

Top Threats in Microsoft 365 Security

Microsoft 365 is a cornerstone for businesses worldwide containing invaluable intellectual property and business-critical applications. It is vital to understand the threats facing this landscape and how to mitigate the risks with security considerations and monitoring. In this blog, we will take a deeper look at these challenges, some steps you can take today to ensure these assets are protected and some of the potential risks accepted by not acting. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

The Cyber Battlefield: A Tactical Guide To Preparing For, Engaging in and Triumphing Over Cyberattacks

In the digital age, where information is power, and the battle for data integrity rages on, cyber threats loom like shadowy adversaries, ready to pounce on unsuspecting organizations. These stealthy assailants are relentless, exploiting every vulnerability to breach digital fortresses, wreak havoc and compromise the integrity of business-critical data. In the ever-evolving landscape of cyber warfare, organizations must be fully equipped, prepared for the subduing incursion and swift in their response to emerge victorious. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

Does Microsoft Protect Microsoft 365 Data?

Welcome back to the second part of our three-part blog series, where we continue to revisit what leading IT analyst firm, Gartner, suggests for protecting Microsoft 365. In the first post, we looked at what Gartner identified as risks associated with Microsoft 365. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

What Are the Risks to Microsoft 365, According to Gartner?

In life, we must make informed choices and decisions about the services and products we consume and rely on recommendations and thorough research. In these cases, we often look to those we consider to be experts in their respective areas. Gartner is one of the top technology research firms that’s dedicated to delivering actionable objective observations to the industry. Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

Veeam ONE: Now Monitoring Your Microsoft 365 Backups

 Veeam ONE is Veeam's prized monitoring and reporting software for Veeam Backup & Replication, and it gives users insight into both their infrastructure components and job metrics. The release of Veeam ONE v12 and Veeam Backup for Microsoft 365 v7 also comes with the ability to monitor your Microsoft 365 backup environment as well. The best part is that this comes at no additional licensing cost since the monitoring of Veeam Backup for Microsoft 365 inside Veeam ONE is completely free. This  Veeam ONE integration gives you insight into your backups, proxies, repositories and so much more all in a single view, and it’s all accessible through several convenient vehicles. Read on to learn more about all of these new, ... Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy

Veeam Backup for Microsoft 365 v7: Enhanced Storage Solutions

Veeam Backup for Microsoft 365 v7 brought many enhancements to how backups can be stored and flexibility to where data can be transferred. The highlight features in this release are backup copy from any object storage to any object storage and object lock capability on the backup copies. These features provide a new level of security and freedom to the backups within Veeam Backup for Microsoft 365.   Read more
Karinne Bessette
Karinne Bessette

Technologist, Product Strategy