Protect your business with cloud solutions of Microsoft and Softeng

Protege a tu empresa con las soluciones en la nube de Microsoft Protecting the security and privacy of data and ensure business continuity by keeping always operating systems are key challenges in business. And to help achieve them , Microsoft offers a number of cloud services built into Office 365 and Azure of which I discuss in this article.

How Office 365 protects your business data

Information (files and mail) is one of the most valuable assets. In fact,   each company has information that makes it unique so protect it is key to keep growing. To do this, Office 365 includes tools that ensure the security of your data and provides capabilities that help businesses adapt to external industry regulations and meet internal safety requirements.

Preventing leakage of information about your files and email

Protege a tu empresa con las soluciones en la nube de Microsoft Data leakage occurs when confidential or sensitive information of a company leaves the same through employees (deliberately or accidentally way). To control these leaks, Microsoft offers Information Rights Management (IRM), a tool that encrypts and protects sensitive information (files and mail) from unauthorized access. With MRI you can restrict what employees can perform on documents and confidential emails such as forwarding, copying or printing, to protect and control the spread of content. In addition, files that are encrypted can not be opened by third parties outside the company, even if physically reached him by any means (Disco cloud, USB, email, web, ftp, etc).

Protecting your company against spam and malware

Protege a tu empresa con las soluciones en la nube de Microsoft Exchange Online, with its “Protection” module provides a mail filtering service based on the cloud that helps protect your company against any new type of sophisticated attack. The service includes capabilities for protection against spam, malware and viruses as well as protection against malicious URLs in real time.

In the case of attachments, all suspicious content undergoes behavior analysis of malware in real time using machine learning techniques to evaluate the content for suspicious activity.

Protecting your mobile devices

Protege a tu empresa con las soluciones en la nube de Microsoft An increasing number of employees accessing sensitive corporate information through mobile devices is higher. In this sense, Microsoft Microsoft Intune offers, which provides complete management parquet phones, tablets and PCs. With this solution , IT managers can control which devices have access to data from Office 365 and prevent access in the event of loss or theft, as well providing the ability to remotely delete data it may contain.

Helping to meet the most stringent quality standards

Protege a tu empresa con las soluciones en la nube de Microsoft Office 365 adheres to global industry standards, including ISO 27001, ISO 27018, the EU model clauses, the agreement BAA HIPAA and FISMA. Additional subjected to third-party audits by internationally renowned consultants in order to obtain an independent attestation of compliance with the policies and procedures of security, privacy, continuity and regulations.

 

How Microsoft Azure helps the continuity of your business

Companies that require always keep operating their computer systems to not stop their activity have a good ally. With Azure, they can reduce downtime of their applications and speed your recovery in case of interruption.

Disaster protection in your infrastructure

Protege a tu empresa con las soluciones en la nube de Microsoft Azure Site Recovery helps protect servers you have in your company by coordinating replication and recovery of physical or virtual machines in the cloud. With this tool you can create recovery plans flexible to suit your needs and help you to restore service, even with complex workloads.

Azure Site Recovery can be used in various scenarios such as: Virtual Machine Protection VMWare and Hyper-V as well as physical servers running Windows or Linux.

Forget the tapes and having to take them to the bank

Protege a tu empresa con las soluciones en la nube de Microsoft Backups are an important and necessary task, so far, with the traditional method, or was too simple nor entirely reliable. However, from now on, we Backup services on the Azure cloud that enable your company reliably protect the data that you have at home or at another location at low cost, pudiéndolos recover quickly and easily. In addition, Azure only transferred to the cloud changes made to files, thus optimizing storage costs and bandwidth.

With Azure Backup you can forget about the tapes, devices, backup, backup licenses and having to take the tapes to the bank.

Insurance and unlimited file storage Protege a tu empresa con las soluciones en la nube de Microsoft

Microsoft Azure provides secure and unlimited storage for your files, avoiding investment in disk arrays and backup systems. Thanks to its flexibility you can go quickly and easily provisioning more space as needed and pay only for what you’re using.

Helping to meet the most demanding quality estandades

Azure It is the first cloud platform to adopt the ISO 27018 standard, the first international regulations on privacy in the cloud. Protege a tu empresa con las soluciones en la nube de Microsoft

 

  How does it help you Softeng?

Softeng helps you map out and agree on the best strategy for your company to the cloud climb gradually, in stages, without headaches, safely and starting to have advantages, benefits and savings from the start. Also, we help you implement and take advantage of all the security tools you have explained in this post.

Additionally, Softeng is one of the Spanish companies more solutions Office 365 and Azure deployed, with more powers in Spain and one of the first partners of Microsoft in getting the Gold Cloud competition Microsoft, supported by customers of medium and large Softeng company which has successfully implemented 365 Office and official certifications obtained by our specialists engineers cloud solutions from Microsoft. This allows us to offer a service full guarantee.

Want to know more about how we can help?

 

Yes, I want to know more

Controlling devices accessing your enterprise with Office 365

Cómo controlar los dispositivos con los que los usuarios acceden a Office 365 An increasing number of employees accessing sensitive company information through mobile devices is higher. This new trend, compounded by the fact that many users want to work with their personal devices (Bring Your Own Device or BYOD), represents a significant threat to the security of company data.

Therefore having a system that controls access to information from any mobile device (Mobile Device Management or MDM) has become a key element for the security of all companies.

In this sense, Microsoft Microsoft Intune, which provides complete management of devices (mobile and PC) with advanced management and enterprise application with which you can control and manage access of your employees from any device offers.

However, Microsoft recently surprised us by including in Office 365 device management capabilities (MDM) to help companies manage iOS, Android, and Windows Phone. These features are available at no additional cost to customers with business plans, education and government as previously required purchasing Intune.  

What MDM provides Office 365 for enterprises?

MDM allows administrators to control which devices have access to data from Office 365, providing the possibility of eliminating corporate data device from the management console if necessary.

Then his features are as follows:

  • Cómo controlar los dispositivos con los que los usuarios acceden a Office 365 Authorized devices: You can set security policies that determine the types of devices that can access corporate information. With this feature, both emails and documents of all kinds can only be used by authorized company devices.

  • Device Management: You can also create security policies such as Require a password to operate the device, not allowing screenshots, block the use of USB connections and many other all designed to protect information and prevent access to users authorized.

Cómo controlar los dispositivos con los que los usuarios acceden a Office 365

  • Reports: In the Administration Center Office 365 you have reports with which you can obtain valuable information about the devices that access the data of your company.

  • Selective delete data: With this feature, if a device is lost, stolen or if the employee is no longer part of the organization, administrators can wipe corporate data was inside the device, optionally can do without deleting data personal user.

How to manage devices from Office 365

IT administrators can manage and configure security policies for devices (Windows Phone, iPad, iPhone and Android) from the administration portal Office 365 through a user-friendly interface and without impacting employee productivity.

Cómo controlar los dispositivos con los que los usuarios acceden a Office 365

Companies that need protection beyond what Office 365 includes the possibility of hiring have Microsoft Intune for additional management capabilities of devices and applications. However, Microsoft has announced that they are working on a future version in which Office 365 customers may apply the MDM capabilities of Office 365 for some users and provide complete management capabilities Microsoft Intune to other users within the same contract .

And when we will need more than 365 Office offer?

Cómo controlar los dispositivos con los que los usuarios acceden a Office 365

When we want to also manage the PC’s of our company, from health to deploy applications and manage your virus protection centrally … Intune comes in

Microsoft Intune is a cloud-based service that helps your company to not only protect mobile devices and computers but also tablets (running a professional edition of Windows Vista, Windows 7, Windows 8.1) Service, even though these have not been attached a domain so it is ideal for companies whose staff are mobile or are geographically distributed.

Intune includes all MDM capabilities of Office 365 and:

  • Application Management: IT administrators can deploy and manage both corporate applications such as control of app stores on mobile devices and to apply certain restrictions such as not allowing copy, cut, paste and save as.

  • Navigation control: You can restrict the sites employees can visit your company.

  • Advanced security management: You can deploy and manage profiles certified devices, email, VPN and Wi-Fi.

  • PC’s management: Manage devices without cloud infrastructure required to manage PCs, as their health status, alarms in case of problems, virus protection and more.

  • Inventories of hardware and software: You can gather information about the hardware and software used in your business to help you plan an update cycle or to determine if you have installed unwanted software on managed devices.

Conclusion

The new features to Office 365 still add more value to the platform and provide enough to meet the needs of security, mobility and productivity demanded by business and changing market capacity, rapidly differentiating from other market solutions . And if you still need more … well here it, Intune;)

Want to know more about security in Office 365?


Yes, I want to know more!

How Microsoft ensures the security of your data in the cloud with Office 365 and Azure

Seguridad.pngThesecurity, & Nbsp;PrivacyThecommitment and thetransparency were so far some business concerns when the possibility arosemigratetheirservices tocloud.

One of the commitments that Microsoft has with respect to its platforms in the cloud, Office 365 and Azure, is to ensure the security and privacy of customer information to use it, and it is guided by the following principles of trust :

Security
Security for Microsoft is an ongoing effort that combines experience, qualified and powerful technology. Office 365 and Azure store the data in its own network of data centers strategically located worldwide and provides integrated security features to all customers and optional controls so that they can customize the security preferences.

Integrated security features available

  • Physical data centers monitored 24 hours a day.
  • Logical data isolation between different clients.
  • Administrative access to Office 365 controlled by a process based on roles.
  • Separation of the internal network of data centers and the external network and encrypting data transmitted over networks.
  • Encrypted mail data with BitLocker encryption 256 bits and SSL / TLS encryption of data in transit.
  • Applications designed following the development life cycle of security by ensuring the safety and privacy from software development to launch the service.

Personalized security features:

  • Advanced encryption with Rights Management Service that allows administrators to encrypt elements selectively.
  • Control user access through identity services such as Active Directory, Azure Active Directory Federation Services Active Directory.
  • Ability to enable compliance features such as data loss prevention to prevent confidential information from leaving the organization.
  • Legal Hold features, government and archiving sensitive data which they hold for legal purposes and archiving.
  • Easy to quickly find items in SharePoint Online, Exchange Online and Lync Online for auditing and security.
  • Your business managers can easily customize features and antimalware protection against spam.

 

Privacy
Microsoft is constantly working on technologies that improve and respect the privacy of their services. Customers Office 365 and Azure taken into account at all times that your data belongs to them and that:

  • The data is not removed to create advertising products: e-documents or to make analysis, extract data, advertising or improve service are not considered.
  • The data do not mix: Office 365 lets you always keep your customer data separate from consumer services.
  • The data is yours and can move: the client data belonging to Office 365 customers, who can remove their data whenever they want.

Commitment
Office 365 and Azure are provided with capabilities that help companies to adapt to external industry regulations and meet internal safety requirements.

Quality control in Office 365
Office 365 will adhere to global industry standards, including ISO 27001, ISO 27018 standard, the EU model clauses, the agreement BAA HIPAA and FISMA law. Additional subjected to third-party audits by internationally recognized auditors in order to obtain an independent witness of compliance with policies and procedures for security, privacy, continuity and regulations.

Quality control in Azure
Azure Cloud is the first platform to adopt the ISO 27018 standard, the first international regulations on privacy in the cloud.

 

Transparency
Customers cloud Microsoft can always know where your data is, what business users can access them and what they do with the information.

In addition, corporate managers may choose to receive updates concerning any changes in location of data centers and information security, privacy and auditing.

With Office 365 and Azure powerful solutions have total confidence and reliability for your business.

Want to know more about how we can help?


Yes, I want to know more

Moderniza your company and reduces incidents in your applications with Azure

Soluciones de continuidad de negocio con Microsoft Azure When a company will fail their systems and therefore users can not work with business applications, absolute chaos reigns. At that time, we would be willing to “sell our soul to the devil”;) to keep them running again because the opportunity costs of having our users unable to stand their jobs are simply dramatic.

Therefore, modernize your infrastructure and have a plan to protect our business systems (services, applications and data) against incidents or disasters that disrupt the business of our companies (technical, human or natural errors) is critical to any organization.

To do this, relying on Microsoft Azure, we created solutions disaster recovery to protect applications, services and more critical data that you have on your company, “duplicating” in the cloud (and keeping them in sync at all times), so you have a exact replica and ready for action. Thus, when systems fail you have in your company (applications, services and data), the replica that is in the cloud automatically begin to serve your users, non-stop service.

These solutions help ensure the continuity of your business (your data and applications being more available) because your company is tolerant to typical IT problems so that it more productive and therefore more competitive.

Security and tranquility for your business with our solutions in Azure

Soluciones de continuidad de negocio con Microsoft Azure Microsoft Azure has been established as the most comprehensive cloud platform market by offering capabilities that allowed us to create services that meet the needs of your company.

Solutions protect and recover applications and data from your company that offers Softeng are safe and flexible working perfectly with your local infrastructure and the scalability to satisfy any requirement that a business at all times.

On the other hand, geographical replication incorporating Azure provides data redundancy between regions to ensure access to them if a local disaster.

Solutions Azure Softeng meet the needs of your company

  • Your business needs a more reliable storage system? Our solution Microsoft Azure provides unlimited secure storage for your files, avoiding investment in disk arrays and backup systems. Thanks to its flexibility you can go quick and easily provisioning storage as needed and pay only for what you’re using.
  • Have your outdated infrastructure and / or need to expand? The solution, instead of making a large investment in infrastructure renew or extend, maintain, use energy and have an outdated and inflexible solution is to create that renewed infrastructure but cloud paying only for what they need at all times.
  • Want forget backup tapes? One of the most important points for companies is to have well resolved the backup strategy. Backup services on the Azure cloud allows your company protect the data that you have at home in another location and cost, pudiéndolos recover quickly and easily. In addition, incremental backups, only transferred to the cloud changes made to files, thus optimizing storage and bandwidth. Forget the tapes, devices, backup, backup licenses and having to take the tapes to the bank. Now with Azure, the bank is in the cloud!

  • Your business need protection from disasters? As mentioned, we offer a solution for simple and automated recovery in the cloud that helps protect the availability of your applications (who want to stay at home) against failure of all kinds. Recovery plans to suit your needs and help you restore service automatically, even in the case of complex workloads.

What helps you Softeng?

Softeng helps you map out and agree on & nbsp; the most suitable strategy for your company is up to the cloud gradually, in stages, no headaches, safely and beginning to have advantages, benefits and savings from & nbsp; the first time!

For example, if your company still has all its applications at home and are thinking of upgrading to new versions of Microsoft productivity products like Exchange, Lync, Office and SharePoint (or purchasing for the first time), no doubt you want to know Office 365. Office 365 provides these cloud applications directly as a service, so you should not worry about infrastructure issues, maintained or updated. Never again.

Subsequently or in parallel, we help you do without the IT infrastructure that you have in the company, but …

What servers / applications / data that “at present”;) You want to stay home? Softeng offers business continuity solutions and custom recovery helping to protect your local infrastructure, your applications and your data as you have explained in this article.

Want to know more about how we can help?

Yes, I want to know more

Preventing leaks of sensitive information with the help of Office 365 -Part III (IRM)

Proteger correos electrónicos desde Microsoft Office y IRM Protects emails sent to users of our organization.

As we explained to you a few days ago, MRI is a tool that encrypts and protects sensitive information from unauthorized access.

In this third chapter discusses how you can protect & nbsp; email sent to users in your organization. & Nbsp;

Employees use email to exchange sensitive information such as financial reports and data, legal contracts, confidential product information and data about customers and employees. As a result, mailboxes can become repositories of confidential information leakage can become a serious threat to your organization.

Your business managers can protect Exchange Online information output via e-mail (including attachments), preventing the contents from leaking outside the boundaries of the organization.

For example:

  • Prevent a recipient can perform some of these functions: access, forward, copy, modify, print, fax, print screen or cut and paste the contents of an email.

  • Create rules for protection and automatic encryption for emails that meet certain conditions of business (sent by someone determined, someone determined, with certain texts, etc, etc).

 

Once the system is activated

The options available to users will encrypt an email are:

  • Unrestricted Access (default): E unencrypted.
  • Not Forward: Recipients can read this message, but can not forward, print or copy the content. The owner of the conversation has full permission to your message and all the answers it.
  • Confidential: The information recorded content is intended only to internal users. You can change but you can not copy and print.
  • Confidential, see only: The content is only recorded information for internal users. You can not modify.

Proteger correos electrónicos desde Microsoft Office y IRM

And what happens in the receiver?

When employees send an encrypted message (ie, protected by IRM), the attachments receive the same protection as the message (Word, Excel, PowerPoint, as well as .xps files format).

Proteger correos electrónicos desde Microsoft Office y IRM When the recipient opens the mail with permits, will show a message in the message header indicating the restrictions of the message.

In this picture you can sense that there is a message in the header of the email, but as one of the constraints of IRM is precisely the screenshots, I show you a picture taken with mobile. Yes, I know, not what you can read, but that’s the point;)

The next article will discuss MRI one of the latest new features of IRM in Exchange Online, Send secure encryption to our organization to external users post.

Do not miss it !!

Want to have an overview of how MRI works and Office 365?

Yes, I want to know more