How Spanning Protects Your Microsoft 365 Tenant From All Sides





Threats to Your Microsoft 365 Tenant

Your Microsoft 365 tenant faces threats from all directions. Danger lurks at your front door, back door and even inside your house. Hover over or click on the icons to learn about these threats and how Spanning can help protect your data from them.

Malware and Virus Protection

Intercepted Traffic

Without strong encryption, data in transit is like mail without an envelope. Bad actors can both steal sensitive information or alter it, thereby compromising data integrity.

How Can Spanning Protect My House?
Privileged Service Accounts

Privileged Service Accounts

Service accounts are prime targets for cybercriminals who leverage administrator rights and limited oversight to reconfigure systems and hide their activities.

How Can Spanning Protect My House?
Poor System Controls

Poor System Controls

Ineffective controls can negatively impact system security, availability and processing integrity, putting confidentiality and privacy of data at risk.

How Can Spanning Protect My House?
Human Error

Human Error

Everyday human errors account for up to 64 percent of data loss incidents according to Aberdeen’s research. Employees inevitably delete the wrong email, contacts or critical configurations.

How Can Spanning Protect My House?
Illegitimate Deletion Requests

Illegitimate Deletion Requests

SaaS providers will honor your deletion request without question. They have no way of knowing if it’s a hasty (or malicious) request and they are not responsible for any unexpected results.

How Can Spanning Protect My House?
Malicious Insiders

Malicious Insiders

Employee action is involved in up to 23 percent of all electronic crime events, according to the CERT Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute.

How Can Spanning Protect My House?
Programmatic Errors

Programmatic Errors

Otherwise known as sync errors, those powerful tools designed to streamline business processes can ruin critical data in a flash — with no way of undoing it.

How Can Spanning Protect My House?
Ransomware

Ransomware

Beyond a typical cyberattack, these forms of industrial-scale extortion are becoming increasingly aggressive and expensive.

How Can Spanning Protect My House?
Hackers

Hackers

Hackers leverage sophisticated technology and social engineering tactics to compromise credentials and accounts to get to your data.

How Can Spanning Protect My House?
Malware and Virus Protection

Malware & Viruses

Rogue software can spread mayhem with programmatic efficiency without an active attack from a hacker. Many malware programs and viruses emerge from existing code after hibernation, making them especially hard to defend against.

How Can Spanning Protect My House?

Back to the House

Front Door Threats


Upfront threats that can expose your tenant or compromise Microsoft 365 credentials, leading to unauthorized access to sensitive data.
Integrated Dark Web Monitoring
Integrated Dark Web Monitoring
Dark Web Monitoring alerts Microsoft 365 administrators when employee emails and passwords have been compromised, enabling them to take proactive steps to secure accounts at risk. Leverage Microsoft 365 and Spanning audit, reporting and search capabilities to determine if a malicious activity has taken place and restore any corrupted data in just a few clicks.
SOC-2 Compliance
AI-Enabled Phishing Defense
Detect and block even the most sophisticated email threats with technology from Graphus — the simple, powerful and automated phishing defense platform that provides three layers of comprehensive email security via patented AI technologies such as TrustGraph, EmployeeShield and Phish911.

Learn More

Zero-Effort Backup
Automated Backup
Automated backup of all critical data in Exchange Online, SharePoint Online, OneDrive and Teams that auto-discovers new and/or altered content to back up. This takes place as part of a recurring, incremental backup process that runs quietly in the background every day without any additional effort from your admins or users.
Transparent Reporting
Transparent Reporting
Utilize the immutable audit log for a transparent, actionable report of every Microsoft 365 backup. Admins are given a clear, comprehensive insight into the state of all backup and restore activities, which can be viewed directly within the application. Additionally, admins can opt-in to receive daily backup status reports via email to keep them informed of backup health across their tenant.
Point-In-Time Restore
Point-in-time restore
Enjoy total restore flexibility with access to every point-in-time Microsoft 365 backup performed by Spanning. Daily automated backup and unlimited on-demand backup equip your organization with an abundance of historical snapshots and versions of your backed-up Microsoft 365 data. Find the last date on which your content was in the desired state and restore it directly back into your tenant.

Back to the House

Inside Threats


The biggest threats to your Microsoft 365 tenant are inside the house. They are harder to manage because they leverage access rights.
Zero-Effort Backup
Zero Effort Backup
Automated Microsoft 365 backup that auto-discovers new and/or altered content to back up. This takes place as part of a recurring, incremental backup process that runs quietly in the background every day without any additional effort from your admins or users.
End-User Self-Service
End User Self-Service
Save on helpdesk costs and reduce the need for IT intervention by empowering your end users to locate and restore their own Microsoft 365 backup data for Mail, Calendar and OneDrive. When files are lost or corrupted, users will be able to quickly and easily restore the data in question to help ensure maximum productivity and meet even the most ambitious recovery time objectives.
Point-In-Time Restore
Total Restore Flexibility
Enjoy total restore flexibility with access to every point-in-time Microsoft 365 backup performed by Spanning. Daily automated backup and unlimited on-demand backup equip your organization with an abundance of historical snapshots and versions of your backed-up Microsoft 365 data. Find the last date in which your content was in the desired state and restore it directly back into your tenant.
Cross-User Restore
Cross-user restore
Admin users can perform Microsoft 365 backups and restore data not only for themselves, but for any licensed user within their tenant. Additionally, admins can restore data into the original user account from which the backup was taken, or into a different user’s account altogether. This enables quick and easy transfer of ownership of Microsoft 365 data such as on-boarding and off-boarding of employees.

Back to the House

Back Door Threats


Threats caused by vulnerabilities on the application side. Poorly architected solutions meant to improve your Microsoft 365 operations and security can instead increase the risk of data loss.  
Certifications
Microsoft AppSource-Approved
Spanning meets Microsoft’s rigorous requirements for quality of code and service for listing on the Microsoft AppSource marketplace and the stringent requirements to be an Azure Verified Publisher. 
SOC-2 Compliance
SOC 2 Compliance
SOC 2 is the leading auditing standard addressing the protection and privacy of sensitive data. To be SOC 2 compliant, an organization must provide evidence and undergo rigorous audits demonstrating the quality and effectiveness of their systems and controls. SOC 2 – Type II is the gold standard for technology service providers that process or store their customer’s data in the cloud and establishes their commitment to the security and protection of data.
Strong Encryption
Strong Encryption
Spanning Backup protects data at rest with 256-bit AES object-level encryption (one of the strongest block ciphers available) with unique, randomly generated encryption keys for every single object and a rotating master key protecting the unique keys.  All data in transit is also protected with Transport Layer Security (TLS) encryption.
End-User Self-Service
Application Level Authentication
Spanning accesses Microsoft 365 at the application level through the OAuth 2.0 protocol instead of through less secure service accounts and passwords. Service account passwords are susceptible to compromise providing threat actors with administrator privileges and the ability to freely operate in your tenant.
Certifications
Third Party Privacy & Security Certifications
Spanning Backup has been awarded the Skyhigh CloudTrust™ rating of Enterprise-Ready. Skyhigh Enterprise-Ready cloud services fully satisfy the most stringent requirements for data protection, identity verification, service security, business practices and legal protection. Additionally, Spanning is SSAE 16, SOC2 Type II certified infrastructure globally; COBIT5, HIPAA certified; FERPA; GDPR compliant.