Cloud Computing Breakout Image

Office 365 Security

Summary of customer information on Office 365 security.

Matrixforce has summarized customer information for Office 365 Security. As a pioneer in online data services, Microsoft builds on deep industry experience to incorporate cutting-edge security practices from development through to administration and maintenance. To learn more about privacy at Microsoft, download the Standard Response to Request for Information documents from the Office 365 Trust Center.

  • Deep Experience. Microsoft has developed proven practices and policies as a result of over 15 years of experience in providing security for online data. Microsoft offers a financially backed 99.9% uptime Office 365 Service Level Agreement.
  • 5 Layers of Security. Data is secured in 5 different layers - data, application, host, network, and physical. See the Security in Office 365 White Paper.
  • Monitoring and Access Restriction. Microsoft proactively monitors Office 365 services to identify potential known and unknown threats by predicting malicious behavior, and also monitors for irregular events that may indicate threats. In addition, production server access is restricted to a short list of critical operations personnel.
  • Secure Lifecycle. The Microsoft Secure Development Lifecycle ensures that security and privacy is incorporated into online services by design, from software development to services operations.
  • Independently Verified. Office 365 adheres to many world-class industry standards and regulatory compliance as verified by third-party security audits: