Microsoft 365 is being adopted by organizations of all sizes. Exium CASB (Cloud Access Security Broker) for Microsoft 365 gives users productivity with the tools they need while maintaining visibility and controls to protect sensitive data, prevents loss, and ensure compliance.
Collaboration and communication are key components of productivity in modern organizations. Microsoft 365 provides the necessary environment to facilitate this collaboration and communication, delivering the de facto productivity suite for many organizations of all sizes. Microsoft 365 has been built from the ground-up to accommodate a more mobile workforce, helping to get work done wherever and whenever it happens. However, this flexibility can also facilitate security challenges. Though Microsoft 365 provides native security controls, organizations often find they require a broader approach to security that takes into account enterprise application use and mobile worker mobility.
Exium CASB for Microsoft 365 provides a robust security solution, helping MSPs to understand and control risky activities across the Microsoft 365 suite of apps and enable protection of sensitive data and blocking cloud threats. Exium provides deep visibility into activity and data-level usage within every Microsoft 365 app and any other cloud app your organization uses, managed or unmanaged. Across each app, MSPs can observe corporate data violations and potential cyber threats that can endanger the security and compliance of your organization.
Exium can reveal deep visibility across your Microsoft 365 and all apps in use within your organization. MSPs can parse through each individual Microsoft 365 app or obtain a consolidated view of usage. Microsoft 365 apps such as Exchange, SharePoint, and OneDrive can reveal previously unknown critical activity and data usage, insights that security teams were simply unaware before. With Exium, you can obtain granular visibility into Microsoft 365 activity and the spread of sensitive data within and outside your client organizations.
Exium collects event data from Microsoft 365. Using advanced machine learning, Exium can flag anomalous behavioral activities in user accounts that can signal data exfiltration attempts by cybercriminals that have bypassed your security defenses.
With Exium, you obtain deep visibility and insight into Microsoft 365 app use.
Threats and Compliance | 360 DEGREE VIEW |
---|---|
Insider threats | Detect anomalous behavior by unusual amounts of data uploaded/data, changes in user behavior, and login frequency into account of cloud services |
Compromised accounts | Evaluate access attempts by identifying suspicious geographic login-access, brute-force attacks, and unusual login patterns |
Privileged user threats | Identify sudden user privilege escalations, dormant accounts, and unusual system access |
Malware | Block known malware, discover unknown files, and identify command and control behavior signaling data exfiltration |
Shadow IT | Discover all managed and unmanaged cloud apps |
Audit trail | Capture an audit trail of activity for forensic investigations |
Prevent loss of data | Prevent loss of corporate Microsoft 365 data from use of unmanaged cloud apps or personal Microsoft 365 instances. Detect unauthorized data from being shared externally. |
Compliance | Stay compliant with PCI, HIPAA, GDPR, and other regulations |
Please follow the step-by-step instructions to integrate Microsoft 365 with Exium.
Enable ActivityFeed.Read and ActivityFeed.ReadDlp under ActivityFeed group. See an example configuration here.
Note the API permissions Type for these two permissions needs to be “Application” and not “Delegated” as highlighted below.