Office 365

Browse 0 cybersecurity solutions, with 0 security professionals searching monthly

SaaS discovery tool for MSPs to detect sanctioned & shadow IT apps.

MSP-focused platform for managing & securing clients' SaaS/M365 environments.

MSP-focused tool automating M365 security policy enforcement and drift remediation.

Reported Email Analysis & Response

Managed email security service for Office 365 using Cisco's platform.

Managed cloud backup service for local, M365, and Azure data.

Secures OWA sessions by alerting users who navigate away without logging off.

SSO platform supporting SAML 2.0 and Windows auth for web/cloud apps.

IAM security suite for Office 365, Azure AD/Entra ID & on-prem AD.

UC security platform with DLP, ethical wall, archive & eDiscovery.

AI-powered email security with phishing detection and employee training

Cloud and local Active Directory auditing for MSPs

Cloud-to-cloud backup for SaaS platforms like M365, Google, Salesforce

Email security service for analyzing suspicious emails reported by users

Microsoft 365 login protection against phishing pages and suspicious logins

Automated Microsoft 365 security configuration management and remediation tool

Protects Microsoft 365 users from phishing attacks using fake login pages

ScubaGear is a PowerShell-based assessment tool that evaluates Microsoft 365 tenant configurations against CISA security baselines using Open Policy Agent and generates compliance reports.

GraphSpy is a browser-based post-exploitation tool for Azure Active Directory and Office 365 environments that enables token management, reconnaissance, and interaction with Microsoft 365 services.

Top 15 recommendations to protect your business from email-borne threats with Security Gateway.

An Active Defense framework for detecting and responding to phishing attacks in Office 365 Message Trace logs.

A reconnaissance tool that retrieves information from Office 365 and Azure Active Directory using a valid credential.

EvilClippy is a cross-platform tool that creates malicious MS Office documents with hidden VBA macros and evasion techniques for penetration testing and red team operations.