Microsoft 365 E5 Security is now available as an add-on to Microsoft 365 Business Premium

Mat Batterbee

Categories

News

Microsoft has announced that Microsoft 365 E5 Security is now available as an add-on to Microsoft 365 Business Premium. This enhancement aims to provide small and medium businesses (SMBs) with advanced security features to combat evolving cyber threats and meet regulatory requirements. The E5 Security add-on includes Microsoft Entra ID Plan 2, Microsoft Defender for Identity, Microsoft Defender for Endpoint Plan 2, Microsoft Defender for Office 365 Plan 2, and Microsoft Defender for Cloud Apps. These tools offer enhanced identity and access controls, extended detection and response (XDR), identity threat detection and response (ITDR), device security, email and collaboration security, and SaaS security. This comprehensive package is designed to deliver robust protection at a cost-effective price, with significant savings compared to purchasing the individual products separately, 57% savings to be precise.  

The solution and its features are well-defined, but the key question remains: Why do our customers need this solution? That’s what I’ll address here. For detailed technical information about the solution, you can check out this Microsoft blog HERE. My focus is on how you can present this to your customers and why they need it.

Let’s start with the “Why?” 

In short, SMBs are increasingly targeted by cyberattacks. Many lack adequate cybersecurity measures, making them attractive targets for attackers. This vulnerability can be catastrophic, as a significant percentage of SMBs that fall victim to ransomware end up paying the ransom. With the average cost of a data breach in the UK exceeding £3 million, many SMBs struggle to survive major breaches due to the financial and reputational damage.  

It’s clear why cybersecurity is crucial. There’s extensive information available on this topic, and you’ll find more in an upcoming blog. Now, let’s delve into the importance of each pillar of Microsoft E5 Security. 

Identity and access controls 

Identity and Access Management (IAM) is essential for SMBs to safeguard sensitive data by controlling access, preventing unauthorized entry, and meeting regulatory compliance like GDPR and HIPAA. It streamlines user management through centralized systems, boosts productivity with features like single sign-on, and significantly reduces the risk of both external and internal security threats. By implementing strong authentication methods such as multi-factor authentication, IAM strengthens the overall security posture, ensuring that only authorized individuals can access necessary resources. 

Extended Detection and Response (XDR)

Extended Detection and Response (XDR) is crucial for SMBs as it addresses the challenge of advanced cyber threats by providing a unified security view across all environments, overcoming resource constraints through automation and efficient threat correlation. This consolidation enhances visibility, leading to faster threat identification and automated response actions, which significantly reduces remediation times. Moreover, XDR offers cost-effectiveness by replacing multiple security tools with a single, comprehensive solution, and enables proactive threat hunting, allowing SMBs to identify and resolve security issues before they escalate, ultimately strengthening their overall security posture. 

Identity threat detection and response (ITDR)

Identity Threat Detection and Response (ITDR) is crucial for SMBs as cybercriminals increasingly target user identities through compromised credentials, enabling lateral movement and access to sensitive data, especially in cloud environments. ITDR addresses this shift by detecting and responding to these threats, including insider risks, through continuous monitoring of user activity. This automation is particularly beneficial for SMBs with limited security resources, streamlining threat detection and response while also aiding in meeting compliance requirements by providing necessary visibility into access patterns and ensuring robust protection of sensitive information. 

Device Security

Device security is paramount for SMBs due to their increased vulnerability to cyberattacks, especially with remote work and BYOD policies expanding potential entry points. Protecting sensitive data, preventing malware and ransomware, and ensuring business continuity are critical functions of device security, minimizing disruptions and financial damage. Furthermore, strong device security safeguards against reputational damage from data breaches, aids in meeting regulatory compliance, and mitigates risks associated with mobile device usage through measures like remote wiping and encryption. 

Email and Collaboration security

Email and collaboration security is vital for SMBs to combat prevalent threats like phishing, malware, and business email compromise, which can lead to data breaches and financial losses. Implementing Data Loss Prevention (DLP) is crucial to prevent sensitive data leaks, while securing accounts against takeover protects against malicious activities and operational disruptions. Furthermore, securing collaboration tools, ensuring compliance with data protection regulations, and maintaining security in remote work environments are essential to protect intellectual property and ensure seamless, secure communication. 

Software-as-a-service (SaaS) security

Microsoft Defender for Cloud, and Microsoft Defender for Cloud Apps, are vital for SMBs to secure their growing use of SaaS applications. Both solutions provide comprehensive SaaS security by offering centralized visibility and control, protecting sensitive data, and detecting advanced threats. They enable SMBs to meet compliance requirements through robust security controls and reporting, while also simplifying security management and integrating seamlessly with the Microsoft ecosystem. Specifically, Defender for Cloud Apps enhances security through “Shadow IT” discovery, extending DLP capabilities, providing granular access control and app governance, and offering detailed compliance auditing, all of which are essential for protecting against rising cloud-based threats and maintaining a strong security posture. 

Okay, we understand why these elements are crucial and how vital security is for SMBs. But how do we effectively position this to our customers? You’re in luck, I’ve prepared a comprehensive Go-To-Market strategy for you, available for download with this blog. This resource goes beyond explaining the what and why, and focuses on how you can successfully present this solution to your customers. For more detailed information on how to leverage this solution, you can download the informational booklet HERE.

If you have any questions or need further assistance, please don’t hesitate to reach out to us on +345 249 3303 or via email at partners@infinigate.cloud. We want to support and ensure that you successfully deliver added value to your customers.