Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session


Varonis + Office 365

IT Pros

What is Office 365?

Cloud-based Office 365 for Business and Enterprise allows subscribers to access Microsoft-hosted versions of Exchange, SharePoint, and file sharing services (OneDrive).  This means customers don’t host the infrastructure themselves, and employees can access Office 365 applications and data from anywhere, and from most devices (Mac/PC, tablets, iPad, and smart phones).

Are Varonis products compatible with Office 365?

The Varonis Metadata Framework will be compatible with Office 365 in 2015, protecting our customers’ investments as they evolve their IT strategies to include cloud platforms.

Enhancements to the Varonis Metadata Framework will allow us to offer permissions visibility and auditing for Microsoft Exchange Online, SharePoint Online, OneDrive, and visibility into Active Directory for Azure – providing the data management, access, and security that is needed in today’s world.

We’re committed to providing comprehensive solutions for unstructured, human-generated data, regardless of where the data is stored: on premise, in the cloud, or both.

Sign up here if you’d like to be informed about opportunities to become a beta tester.  

What do I need to know before moving to Office 365?

Office 365 is a great service that lets your company access Microsoft’s applications and cloud-based storage. If you’re thinking of moving to Office 365, it’s important to understand what is needed to ensure your Office 365 data has the required controls and protections.

Click here to sign up for a free assessment, where we’ll help guide you through the Office 365 migration prep.

Sarah Hospelhorn

Sarah Hospelhorn

Based in Brooklyn, NY, Sarah focuses on the strategy behind solving problems in data security. She’s been in tech for over 20 years, with experience in software, hardware, and cryptography.


Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.