An IDC Infographic, sponsored by VMware Office 365 · An IDC Infographic, sponsored by VMware...

1
All IDC research is © 2016 by IDC. All rights reserved. All IDC materials are licensed with IDC's permission and in no way does the use or publication of IDC research indicate IDC's endorsement of VMware’s products/or strategies. Office 365 Approaches for Optimizing Security Microsoft Office 365 is a cloud-based office productivity suite delivering hosted communication services and collaboration apps and email on user's devices. It’s a fast-growing market … Security issues can lead to challenges for enterprise mobility … and requiring strong self-provisioning and one-touch access to multiple resources, all tied to identity and role. Mobile security investment plans for the future which are becoming more diverse, and harder to manage of enterprises have implemented the right security controls to handle multi-OS BYOD. With so many organizations deploying Office 365 on personal iOS and Android devices, the risk of a data loss or exposure breach increases. Broad swaths of enterprise workforces are mobilizing… Types of workers with access to mobile business applications. of enterprises use role/risk as criteria for BYOD allowance of enterprises cite access policy enforcement as top driver for no-BYOD stance Mobile Device Management Identity and Access Management Mobile Application Management Mobile Content Security With Office 365 running on a wide range of device types, ownership models, and deployments with a mix of business and personal apps, enterprises realize they will need better device, identity, application and content controls. Bringing together multiple security and management technologies—identity, device, app, native containment, and content—will be critical to secure to Office 365 in complex, multi-platform organizations. An IDC Infographic, sponsored by VMware Worldwide collaborative & content cloud service revenue 2014 2019 $20B $8B Tablets 53% Smartphones 44% Supported OS platforms by enterprises using Microsoft Office 365 AND allowing BYOD devices 73% 74% 52% Office-based workers 87% Field workers 53% Telecommuters 58% External contractors and partners 45% With data breaches and personal devices as top challenge of enterprises deploying mobile solutions have experienced security and compliance challenges 58% of organizations allow some form of BYOD 88% 56% 60% Enterprises deploying Office apps across newer endpoints Self service and secure single sign-on Device security, and conditional access Protect data at rest, in use, and in transit Consolidated catalog and adaptive access ... BUT LESS THAN HALF Apple devices Android devices Windows devices

Transcript of An IDC Infographic, sponsored by VMware Office 365 · An IDC Infographic, sponsored by VMware...

Page 1: An IDC Infographic, sponsored by VMware Office 365 · An IDC Infographic, sponsored by VMware Worldwide collaborative & content cloud service revenue 2014 2019 $8B $20B Tablets 53%

All IDC research is © 2016 by IDC. All rights reserved. All IDC materials are licensed with IDC's permission and in no way does the use or publication of IDC research indicate IDC's endorsement of VMware’s products/or strategies.

Office 365Approaches for Optimizing Security

Microsoft Office 365 is a cloud-based office productivity suite delivering hosted communication services and

collaboration apps and email on user's devices.

It’s a fast-growing market …

Security issues can lead to challenges for enterprise mobility

… and requiring strong self-provisioning and one-touch access to multiple

resources, all tied to identity and role.

Mobile security investment plans for the future

which are becoming more diverse, and harder to manage

of enterprises have implemented the right security controls to handle multi-OS BYOD.

With so many organizations deploying Office 365 on personal iOS and Android devices, the risk of a

data loss or exposure breach increases.

Broad swaths of enterprise workforces are mobilizing…Types of workers with access to mobile business applications.

of enterprises use role/risk as criteria

for BYOD allowance of enterprises cite

access policy enforcement as top driver for no-BYOD

stance

Mobile Device Management

Identity and Access Management

Mobile Application Management

Mobile Content Security

With Office 365 running on a wide range of device types, ownership models, and deployments with a mix of business and personal apps, enterprises

realize they will need better device, identity, application and content controls.

Bringing together multiple security and management technologies—identity, device, app, native containment, and content—will be critical to secure

to Office 365 in complex, multi-platform organizations.

An IDC Infographic, sponsored by VMware

Worldwide collaborative & content cloud service revenue

20142019

$20B$8BTablets

53%Smartphones

44%

Supported OS platforms by enterprises using Microsoft Office 365 AND allowing BYOD devices

73% 74% 52%

Office-based workers

87%Field workers

53%Telecommuters

58%External contractors

and partners

45%

With data breaches and personal devices

as top challenge

of enterprises deploying mobile solutions have experienced security and compliance challenges

58%

of organizations allow some form of BYOD

88%

56%60%

Enterprises deploying Office apps across newer endpoints

Self service and secure single sign-on

Device security, and conditional access

Protect data at rest, in use, and

in transit

Consolidated catalog and adaptive

access

... BUT LESS THAN HALF

Apple devices Android devices Windows devices