Office 365
Cisco Is the First SD-WAN Vendor with Informed Network Routing for Microsoft 365
Cisco SD-WAN Cloud OnRamp with Microsoft 365 gives you more control over your SaaS traffic with enhanced optimization tools. Cisco is the first SD-WAN vendor in the industry to deliver informed network routing for Microsoft 365.
Cisco and Microsoft Advance Technology Partnership to Improve SD-WAN and Cloud Connectivity
Cisco and Microsoft extend their partnership to help customers improve connectivity from branch offices to Microsoft by integrating Cisco’s SD-WAN with Microsoft’s Azure Virtual WAN and Office 365.
Connecting the docs—Webex Teams and Enterprise Content Management
Webex Teams is the hub for collaboration at Cisco. For every project or program, we set up a Webex space where we can meet, chat, and share content—from any device....
Waste not, WAN
Our existing circuits comfortably handle terabytes of new Office 365 traffic, with Cisco SD-WAN technology.
Staying productive on the fly
As a mobile worker and member of Customer Zero testing, I’ve tested an integration for Cisco’s Webex Teams and Microsoft’s Office 365. Let me share this great user experience.
The Marriage of Webex Teams and Microsoft Office 365: Our Vision and Strategy
Cisco IT’s Collaboration strategy is to mirror the Webex Teams approach to building bridges between team collaboration and other solutions for a continuous workflow. With Office 365, we continue with this theme
Webex Teams + Office 365 + Implementation Part 1: Rollout and Change Management
Rather than using Office 365 as-is, we integrated it with the collaboration capabilities in Webex Teams.
Implementing Office 365 at Cisco – Part 2: SAFe Bought Us Speed, Visibility, and Accountability
Though SAFe is more typically used for software development, we found it worked very well for structuring and organizing our complex deployment of Office 365.
Office 365: How We Made It More Secure than On-Premises Email
This blog outlines the security architecture we’ve put in place for Office 365. We approached it from three angles: user authentication, device authentication, and encryption key management.
4