In this Osterman Research paper about Office 365 security, you’ll learn about:
- Limited or insufficient inbound and advanced targeted threat protection techniques, such as real-time link following and sandboxing technologies, in addition to reputation checks
- Missing email encryption features, including end-user revocation of messages that may have been sent to an unintended recipient
- Data Location, Mobility, and Application Version limitations, especially those pertaining to geographical and jurisdictional requirements and malicious link detection for mobile devices
- Archiving of instant messaging content, conference content, or content from application-sharing or desktop-sharing sessions
- Additional business, regulatory, and service level considerations taken by decision makers and influencers pertaining to Microsoft management of corporate email