Back

A User’s View of Office 365 – Part 3

In this series weve been exploring Office 365 from a users point of view how it works how easy it is to adapt to new features cool features ...

5 min read
Published on Mar 6, 2015
a-users-view-of-office-365-part-3

In this series, we’ve been exploring Office 365 from a user’s point of view - how it works, how easy it is to adapt to, new features, cool features. 

In part one, we looked at why someone would choose Office 365, what the migration process was like, and the ease of establishing Office 365 Groups.  In part two, we explored the different kinds of Office 365 Groups (public and private), went through the discussion group experience, and delved into Office Delve.

Today, Tony explores Office Graph, talks about the newness of subscribing to Office products rather than outright purchasing, is grateful for the ease of accessing his data from multiple devices, and discusses security in the Cloud.  


Now that I have explained how Groups in Office 365 works and how Delve gives me great information I would like to further discuss my experience with Office 365 by explaining how Office Graph feeds Delve and a few other great features that have made me wonder why I didn’t make the change sooner.  Overall I couldn’t be happier with my Office 365 experience.  Outlook Web App works great, with some very handy new features with Groups.  After tinkering around and finding my way through SharePoint I may end up migrating all my documentation to that versus Dropbox.  I still consider myself a novice when it comes to Office 365 but the more I dive into it the more integrated I can become with my friends and colleagues.

Office Graph

Graph works hand-in-hand with Delve.  Graph helps weed out all the information overload I get on a daily basis.  Graph uses machine learning to map connections between my contacts and the content I use every day within the Office 365 domain.  The information it learns is sent to Outlook and removes clutter for me automatically so I can get to the more relevant information I need.  Graph ties into my calendar as well to “learn” topics of meetings I have scheduled and provides latest content on that subject and provides the information on cards I can review before my scheduled meeting or event.

Office 365 Subscription

While the thought of having to pay for a subscription for Office products made me skeptical at first I realized the value of paying to use the products quickly as I began working with it more and more.  I discovered the vast amount of integration Office truly has to offer.  While I still have a choice to stick with a perpetual license in Microsoft’s Office 2013 suite I think I will stick with Office 365.  As technology continues to change and evolve and security becomes a greater concern I trust Microsoft will provide the most up-to-date patches and security through Office 365 automatically without charging me an additional fee.

Multiple devices

Since the subscription allows me to install Office 365 on up to five devices I have used it on my laptop and new Surface Pro 3 which allows me to use my laptop at home or work and bring my Surface Pro 3 when I travel since it is much lighter and portable than the laptop.  Since I store everything in the Cloud I never have to worry about memory cards or constantly emailing working files to myself like I used to.  Having the same programs and apps on my devices also means I don’t have to worry about compatibility.  When I begin to migrate from Dropbox to OneDrive I know the 20GB of storage will be plenty for my files.

Security

Office 365 provides built in defense-in-depth security to protect your files, documents, and account against hackers and vulnerabilities.  I always worry about security, and decided to look into how Microsoft has handled it in Office 365.  Iwas quite pleased with my findings.  Office 365 offers security at all levels including physical, logical, data, and admin and user controlled security.

Microsoft monitors their data centers 24 hours a day and requires biometric scanning to access their servers.  They also segregate their internal data center from their external network servers.  Their employees have role based access to ensure customer data is useless to the people that have the physical access to their servers who perform installations, upgrades, and maintenance.

The logical security involves a lock box process to restrict physical access to data.  Their servers only run processes on a whitelist to cut down on malicious code.Microsoft has dedicated threat management teams who are proactive in responding to current and future threats.  Intrusion detection and port scanning are also performed to detect malicious activity.  Encryption at rest, in transit, and threat management all protect server data when you are actively using it and storing it.

Through admin and user controls you must enter your credentials in order to access your files.  This is a simple login painless to do, and gives me peace of mind knowing Microsoft has this level of defense-in-depth security.  If I wanted to access my OneDrive files on my phone I have to enter my credentials in that device as well.  Office 365 Message Encryption allows me to send encrypted emails to anyone.  This is a key feature and is very non-intrusive to my daily routine.  If I were to send or receive an encrypted email I would receive a notification that it was encrypted but it would not deter me from wanting to send or receive encrypted emails.  I can send important information or simple one line emails encrypted with ease.

This post has matured and its content may no longer be relevant beyond historical reference. To see the most current information on a given topic, click on the associated category or tag.

Related Posts

Office 365 License Comparison: Business Plans Vs. E5, E3 and E1

GCC High Vs GCC for Protecting CUI with CMMC

Learn the key differences between GCC and GCC High for handling CUI under CMMC, DFARS, and NIST 800-171. Find out which cloud meets your compliance needs.

Mar 31, 2025
4 min read
Risks of not using a CMMC RPO

The Risks of Not Using a CMMC RPO for Compliance and Certification Readiness

A CMMC RPO helps organizations prepare for certification and avoid compliance failures. Learn why working with an RPO is essential for achieving CMMC compliance.

Mar 20, 2025
8 min read
CMMC 2.0 Require GCC High for Compliance

Does CMMC 2.0 Require GCC High for Compliance?

Does CMMC 2.0 require GCC High? Learn the cloud options for compliance, data security, and protecting CUI under NIST 800-171 and DFARS.

Mar 17, 2025
10 min read
Office 365 License Comparison: Business Plans Vs. E5, E3 and E1

CMMC RPO vs a C3PAO: Understanding Their Roles in Compliance

Understanding the difference between an RPO and a C3PAO is crucial for CMMC compliance. Learn why they should be separate and how an RPO helps prepare for certification.

Mar 15, 2025
6 min read
Can You Meet CMMC with Google Workspace?

Can You Meet CMMC with Google Workspace?

Is Google Workspace CMMC compliant? Learn about its DFARS, NIST 800-171, and ITAR limitations and how migrating to GCC High ensures full compliance.

Mar 4, 2025
7 min read
Is Maintaining a GCC High Tenant Worth It for Non-Government

Evaluating the Need for a GCC High Tenant in Non-Government Organizations

Explore whether maintaining a GCC High tenant is necessary for organizations not involved in government work. Understand the pros and cons, costs, and compliance considerations.

Feb 25, 2025
7 min read

Ready to Secure and Defend Your Data
So Your Business Can Thrive?

Fill out the form to see how we can protect your data and help your business grow.

Loading...
Secure. Defend. Thrive.

Let's start a conversation

Discover more about Agile IT's range of services by reaching out.

Don't want to wait for us to get back to you?

Schedule a Free Consultation

Location

Agile IT Headquarters
4660 La Jolla Village Drive #100
San Diego, CA 92122

Secure. Defend. Thrive.

Don't want to wait for us to get back to you?

Discover more about Agile IT's range of services by reaching out

Schedule a Free Consultation