skip to Main Content

Protecting Microsoft Office 365 Web Apps

How it works
Man Working Remote From His Kitchen

Remote working is essential but risky

Remote access to company information is offered to an increasing number of employees. This trend is causing some serious security issues that are not mitigated by the standard security measures like anti-virus, authentication and encryption.

Sophisticated malware are targeting remote sessions in order to steal and spy on sensitive information. Malware spreads when end-users download or install an infected software or through phishing emails and links.

How to secure your desktop applications?

Read our latest white paper and discover how In-App Protection can help you

Malware threats

A legitimate user has read/write access to business data. This means that malware being able to hijack an application gains the same access and the same control as the actual user. And, the accessed data is available unencrypted.

This problem is independent from most likely installed security measures as SSL/VPN, Anti-Virus, and authentication solutions like 2-factor authentication, because the actual session is initiated by a legitimate user and the encrypted data is decrypted according to the implemented protocols.

App-hijacking

Malware on infected end-points can steal, spy on or manipulate sensitive information being used or accessed from the client side. If an authentication token is used, the malware simply waits for the user to authenticate and then happily copies or changes information as the employee continues his work inside the application.

Man-in-the-middle attacks

By controlling the application from the inside, malware can easily operate as a man-in-the-middle copying or changing data, before it is encrypted and send to the server (as is the case for SSL/VPN solutions). Also, keylogging becomes trivial once the malware controls the application.

Spyware

On an infected end-point, keyloggers can harvest sensitive information and send it to a central command and control server. Screenshots, either taken by the user (employee) or malware, may also lead to sensitive information getting into the wrong hands.

Protect your Office 365 Web Apps

Promon SHIELD™ for Office 365 Web Apps prevents all the threat scenarios as mentioned above, most importantly by creating a secure dedicated execution environment for the applications.

This environment is controlled and protected in-depth by strong proactive security mechanisms.

Promon SHIELD™ has some clear advantages

  • 100 % proactive technology, protects against both known and unknown malware without using any pre-known information
  • Transparent for the end-user, who does not have to take any action whatsoever
  • Easy to deploy!
Easy deployment!

The Promon SHIELD™ for Office 365 Web Apps packages comprise of two parts, the admin part and the end-user part. The admin part contains all the necessary files and tools required by the administrator to create customized end-user installation setup programs and update packages for the auto-update feature. The end-user part contain the default end-user installation setup programs to deploy.

Back To Top