Securing Microsoft 365 without E3 or E5 Licenses
Mimecast Incydr now has a Microsoft 365 Email Exfiltration Detector that can protect your investments without the costly E3/E5 licenses.
Key Points
- This blog was originally posted on the Aware website, but with the acquisition of Aware by Mimecast, we are ensuring it is also available to visitors to the Mimecast website.
- Businesses can secure Microsoft 365 email accounts against data leaks with the cost-effective Email Exfiltration Detector, avoiding expensive E3/E5 licensing.
- Mimecast Incydr offers seamless integration and real-time data protection, reducing security risks without disrupting users or increasing workloads.
Customers are increasingly looking to protect their Microsoft 365 investments without having to upgrade to E3/E5 licenses. And while you may have been convinced that this was somehow “free” (in case you already live in E3/E5 world), nothing truly is.
To access and use Microsoft Insider Risk Management, organizations must have one of the following subscriptions or add-ons:
- Microsoft 365 E5 subscription (paid or trial version)
- Microsoft 365 E3 subscription + the Microsoft 365 E5 Compliance add-on
- Microsoft 365 E3 subscription + the Microsoft 365 E5 Insider Risk Management add-on
- Microsoft 365 A5 subscription (paid or trial version)
- Microsoft 365 A3 subscription + the Microsoft 365 A5 Compliance add-on
- Microsoft 365 A3 subscription + the Microsoft 365 A5 Insider Risk Management add-on
You get the gist. Costs can spiral, and if you’re one of the lucky few to have invested in E3/E5, maybe you’ve been convinced this is free. And perhaps, leadership (the CFO in particular) is convincing you this is a “no-brainer” yet you know there is a platform beyond Microsoft you need to think about. Users looking to Microsoft or other Insider Risk Management (IRM) solutions have often been swayed away due to the costs associated with having a Microsoft license that supports “Audit (Premium)”, Microsoft’s cornerstone logging product. The problem is, businesses need IRM and a cost effective way to achieve it. Naturally, the Code42 team got to work and here’s what we came up with.
A new Microsoft 365 Email Exfiltration Detector that can be used without expensive E3/E5 licensing
What does this mean?
- The new Microsoft 365 Email Exfiltration Detector will only require that customers have a Microsoft 365 License that includes Exchange/Outlook online.
- Customers who have purchased a Microsoft subscription which includes email accounts hosted in the Microsoft cloud will be eligible.
- Nearly all customers with OneDrive should be able to take advantage of the Microsoft 365 Email Exfiltration Detector with no additional Microsoft licensing.
Customers now have a cost effective way to mitigate data leaks through Microsoft 365 corporate email accounts. And of course, you can expect the same level of functionality across the following:
1. Comprehensive monitoring
Bring untrusted data risk that occurs over Microsoft 365 into focus with exposure events involving other cloud, endpoint and email exfiltration vectors to quickly detect when files are exfiltrated.
2. Native integration
Incydr’s Microsoft 365 Email Exfiltration Detector is tied directly into Microsoft and conducts the file monitoring there. This means that whether emails with attachments are sent from Outlook Web App or a local email client, Code42 will monitor this activity regardless and without complex proxy or network monitoring.
3. Built to work with Microsoft Advanced
The Incydr Microsoft 365 Email Exfiltration Detector is available for all Microsoft users that have enabled cloud-based email accounts within Microsoft through Outlook and Exchange.
Mimecast Incydr’s Approach
Respond confidently to data theft before damage is done
Incydr, a data protection solution, allows security teams to detect data theft by monitoring cloud & endpoint exfiltration, and accurately tailor responses to each offense. Let’s work together to protect IP without disrupting users or causing more work for your security team.
Subscribe to Cyber Resilience Insights for more articles like these
Get all the latest news and cybersecurity industry analysis delivered right to your inbox
Sign up successful
Thank you for signing up to receive updates from our blog
We will be in touch!