ICT NWT s.r.o.

Cloud Office Security

Protect your cloud applications, email services, communication tools and storage from viruses and attackers with a layer of protection that leverages ESET's proven and award-winning technology.

Cloud Office Security use cases

CYBER SECURITY
Minimising risks
The business owner wants to implement specific measures to minimize cybersecurity risks and maintain business continuity.
CLOUD
Data stored in cloud
Frequent exchanges of large files on company cloud storage between internal employees and people outside the company.
CYBER ATTACK
Ransomware attacks
Dangerous ransomware is on the rise.

Functionalities

Antispam
It filters all unsolicited emails and keeps user email inboxes free of unwanted messages. It uses an improved and award-winning high-performance detection engine.
Antiphishing
Protects users from accessing phishing websites. Links to phishing sites may appear in email messages. Cloud Office Security looks for links in the subject and content of the email and uses a regularly updated phishing database to decide if they are dangerous.
Automatic protection
The administrator can set up automatic protection for newly added users. When a new user is created in Microsoft 365, they will be automatically protected without having to add them manually to the console.
Architecture with tenants
Add an unlimited number of tenants and serve multiple companies from one dedicated Cloud Office Security console.
Antimalware
It scans all incoming emails and attachments as well as all new and changed files. This keeps the mailbox free of malware and prevents the spread of malware via cloud storage to other devices.
Rules
The comprehensive rule system within the solution allows administrators to manually define the conditions for filtering emails and the actions to be performed on them.
Dashboards
The reports allow administrators to conveniently view the most important operational data. Reports are produced in PDF or CSV formats and can be generated on demand or repeatedly at scheduled times.
Quarantine Administrator
The administrator can check the quarantined objects and decide to remove or release them. Quarantine offers easy management of suspicious emails and files that Cloud Office Security has detected. The administrator can download items from the quarantine to the local environment and examine them using other tools.
Alerts
Alerts significantly improve work efficiency. The administrator does not have to constantly check the overview in the console. If Cloud Office Security detects suspicious activity, it can automatically send an alert email. The administrator receives immediate information about the threat.

Other areas of security

Remote management
Identity and data protection
Analysis in cloud sandbox
Endpoint protection
Endpoint Detection & Response
Mail server protection
File server protection
Cybersecurity services

System requirements

The following is required to start Microsoft 365 protection:
Supported Microsoft 365 plans
Administrator access to Azure Active Directory (Azure AD)
Cloud services:
Exchange | OneDrive | Sharepoint | Teams

We are long-term Microsoft's partner

Contact us

Our specialist

Michaela Kubíková
Product manager
+420 607 036 460
michaela.kubikova@ictnwt.cz
Company info
ICT NWT s.r.o.
tř. Tomáše Bati 269
760 01 Zlín

IČ: 08217661
GPS: 49.2200622N, 17.6399244E
Contact
Phone:
+420 607 089 773

E-mail:
ict@nwt.cz
(c) 2024 ICT NWT s.r.o.