O365
Securing Small Business: Layering Cisco Email Security and Office 365
After being hit with a crypto locker, Strenge knew they needed to enhance their email security. They chose Cisco Email Security to bolster Office 365 controls and help them stay ahead of cyber threats.
Collaboration gets more convenient with each new Webex Teams integration
Cisco IT’s vision for Webex Teams. is to bring collaboration tools right to our users’ fingertips by integrating Webex Teams with Cisco and third-party applications. We think of it as meeting people where they are — in any application.
Connecting the docs—Webex Teams and Enterprise Content Management
Webex Teams is the hub for collaboration at Cisco. For every project or program, we set up a Webex space where we can meet, chat, and share content—from any device....
Waste not, WAN
Our existing circuits comfortably handle terabytes of new Office 365 traffic, with Cisco SD-WAN technology.
Staying productive on the fly
As a mobile worker and member of Customer Zero testing, I’ve tested an integration for Cisco’s Webex Teams and Microsoft’s Office 365. Let me share this great user experience.
The Marriage of Webex Teams and Microsoft Office 365: Our Vision and Strategy
Cisco IT’s Collaboration strategy is to mirror the Webex Teams approach to building bridges between team collaboration and other solutions for a continuous workflow. With Office 365, we continue with this theme
Webex Teams + Office 365 + Implementation Part 1: Rollout and Change Management
Rather than using Office 365 as-is, we integrated it with the collaboration capabilities in Webex Teams.
Implementing Office 365 at Cisco – Part 2: SAFe Bought Us Speed, Visibility, and Accountability
Though SAFe is more typically used for software development, we found it worked very well for structuring and organizing our complex deployment of Office 365.
Office 365: How We Made It More Secure than On-Premises Email
This blog outlines the security architecture we’ve put in place for Office 365. We approached it from three angles: user authentication, device authentication, and encryption key management.