{"id":1181,"date":"2020-02-12T13:46:55","date_gmt":"2020-02-12T09:46:55","guid":{"rendered":"https:\/\/www.techxmedia.com\/?p=1181"},"modified":"2025-04-16T15:43:43","modified_gmt":"2025-04-16T11:43:43","slug":"vectra-empowers-organizations-office-365-breaches","status":"publish","type":"post","link":"https:\/\/techxmedia.com\/en\/vectra-empowers-organizations-office-365-breaches\/","title":{"rendered":"Vectra empowers organizations to manage Office 365 Breaches"},"content":{"rendered":"\n<p>Cyber\nrisk is becoming an escalating concern for organizations around the world, and Office 365 data breaches are at the forefront. Even with the rising\nadoption of incremental security approaches like multi-factor authentication, access\ncontrols continue to be circumvented. In fact, 40% of organizations suffer from\nOffice 365 account takeovers. As these data breaches make\nheadlines with growing consistency, the resulting financial and reputational\ncosts mount.<\/p>\n\n\n\n<p>It is far too easy for an attacker to manipulate human behavior and gain high privilege access to business-critical SaaS resources. According to Microsoft\u2019s Q3 FY19 earnings call, there are more than <a href=\"https:\/\/office365itpros.com\/2019\/04\/25\/office-365-reaches-180-million-users\/\">180 million<\/a> monthly users on Office 365.\u00a0With so many users, 100% cyber hygiene becomes impossible. To make matters worse, teams continue to struggle to keep up with weekly vendor-driven configuration changes and new best practices.\u00a0 And once an initial foothold is gained in a <a href=\"https:\/\/techxmedia.com\/tag\/SaaS\/\">SaaS<\/a> application, it is just a matter of time before they laterally move and cross into other parts of the infrastructure.<\/p>\n\n\n\n<p>Against this backdrop, a massive number of alerts are flooding Security\nOperations Centers (SOCs), forcing analysts to spend time manually analyzing\nand prioritizing which ones deserve attention. This is overwhelming security\nanalysts\u2019 time and organizations\u2019 security budgets. As threat actors become\nmore efficient at dodging and targeting the enterprise, most analysts simply\ncan\u2019t keep up.&nbsp;<\/p>\n\n\n\n<p>\u201cAttackers\nwill follow a path of least resistance and the convergence of these elements\nmakes exploiting the cloud easy for them.&nbsp;In no other construct is it fair\nto expect a person, or security team, to be correct 100% of the time. This is\nan unacceptable expectation and entirely unfair to security teams,\u201d said\nVectra CEO Hitesh Sheth. \u201cThe last thing we want is to create more work for\nsecurity teams. What is needed is technology that removes the dependency on human behavior\nand human error and brings control back to the security team. This is what\nVectra can provide.\u201d <\/p>\n\n\n\n<p>Credential abuse is\nthe leading attack vector in SaaS, especially for Office 365. In an effort to help organizations securely and\nsuccessfully protect their applications, <a href=\"http:\/\/www.vectra.ai\/\">Vectra AI<\/a>,\nthe leader in <a href=\"https:\/\/vectra.ai\/cognito-platform\">network threat detection and response\n(NDR)<\/a>, is announcing the launch of Cognito Detect for\nOffice 365. Backed by new detection models focused\non credentials and privilege in SaaS applications, Vectra expands cloud\ncoverage from Infrastructure-as-a-Service (IaaS) and extends\nthe ability to track attacker activity pivoting\nbetween on-premise, data center, IaaS and SaaS. Given that attackers don\u2019t\noperate in silos, a security solution shouldn\u2019t either. Vectra delivers the\ncomplete visibility across your deployment footprint that leaves attackers\nwithout a place to hide.<\/p>\n\n\n\n<p>\u201cPrevention technology has long been available and continues\nto evolve, however, it doesn\u2019t guarantee that data is safe. The real growth has\nbeen in detection and response capabilities, which have been long missing from\nmost organizations\u2019 resources,\u201d continued Sheth. \u201cWe are the\nfirst and only NDR to apply privilege-based detections in SaaS applications.\nOur AI-driven solution seamlessly ties into your existing Office 365\ndeployment, and detects privilege-based attacker behaviors, giving you full\nvisibility into your SaaS deployments. We continue to be at the forefront of security by detecting privilege abuse behaviors across the entire\nlifecycle of an attack in the cloud.\u201d&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>40% of organizations suffer from Office 365 account takeovers. As these data breaches make headlines with growing consistency, the resulting financial and reputational costs mount.<\/p>\n","protected":false},"author":8,"featured_media":1185,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[9618],"tags":[369,379,188,378],"contributor":[],"class_list":["post-1181","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-editors-pick","tag-cyberattack","tag-cyberrisk","tag-dataprotection","tag-office365"],"featured_image_src":"https:\/\/techxmedia.com\/en\/wp-content\/uploads\/2020\/02\/Vectra.png","author_info":{"display_name":"News Desk","author_link":"https:\/\/techxmedia.com\/en\/author\/rabab\/"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts\/1181","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/comments?post=1181"}],"version-history":[{"count":0,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/posts\/1181\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/media\/1185"}],"wp:attachment":[{"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/media?parent=1181"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/categories?post=1181"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/tags?post=1181"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/techxmedia.com\/en\/wp-json\/wp\/v2\/contributor?post=1181"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}