{"id":47418,"date":"2022-07-07T16:00:00","date_gmt":"2022-07-07T16:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=117224"},"modified":"2022-07-07T16:00:00","modified_gmt":"2022-07-07T16:00:00","slug":"kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/","title":{"rendered":"KuppingerCole rates Microsoft as outstanding in functionality for secure collaboration"},"content":{"rendered":"<p>We are excited to share that Microsoft has been rated \u201cOutstanding in Functionality\u201d in the KuppingerCole Market Compass for Secure Collaboration, May 2022. Microsoft was also the only company to be awarded the highest possible score of \u201cStrong Positive\u201d in all five categories: security, deployment, interoperability, usability, and market standing for the <a href=\"https:\/\/www.microsoft.com\/security\/business\/information-protection\/microsoft-purview-information-protection\">Microsoft Purview Information Protection<\/a> platform.<\/p>\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"506\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/06\/Picture1-62bdd6440c940.png\" alt=\"KuppingerCole graphic awarding rewarding Microsoft with Outstanding Functionality rating.\" class=\"wp-image-117239\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/06\/Picture1-62bdd6440c940.png 1000w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/06\/Picture1-62bdd6440c940-300x152.png 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/06\/Picture1-62bdd6440c940-768x389.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\"><\/figure>\n<p>The <a href=\"https:\/\/www.kuppingercole.com\/reprints\/ceee1e33dd43f4a407168eaf23c4f580\" target=\"_blank\" rel=\"noreferrer noopener\">Secure Collaboration Market Compass report<\/a> covers solutions that protect sensitive data, which includes intellectual property or information restricted to certain audiences (such as trade secrets, some legal contracts, agreements, and financial statements), along with personally identifiable information (PII) and health information for regulatory standards such as General Data Protection Regulation (GDPR), California Consumer Privacy Act (CCPA), and Health Insurance Portability and Accountability Act (HIPAA). As companies shift towards remote hybrid work, protecting sensitive data that is continuously created and shared among employees, contractors, partners, and suppliers\u2014while not impeding worker productivity\u2014is becoming increasingly important. Enterprises today face the challenge of classifying large volumes of data, especially personal data, which is required by privacy regulations and laws worldwide.<\/p>\n<p>At Microsoft, our goal is to provide a built-in, intelligent, unified, and extensible solution to protect sensitive data across your digital estate\u2014in Microsoft 365 cloud services, on-premises, third-party software as a service (SaaS) applications, and more. With Microsoft Purview Information Protection, we are building a unified set of capabilities for classification, labeling, and protection, not only in Microsoft Office apps but also in other popular productivity services where the information resides (such as SharePoint Online, Exchange Online, and Microsoft Teams), as well as endpoint devices.<\/p>\n<p>\u201cMicrosoft Purview Information Protection provides a sophisticated classification system that can apply labeling to a document based on the creator, the context in which it was created, and\/or the content within the document. The functionality is natively embedded into Office services and apps, and third-party applications via the information protection SDK. Sensitive information is discovered and labeled with out-of-the-box, custom, and machine learning (trainable) functionality,\u201d&nbsp;Annie Bailey, KuppingerCole analyst, writes in the report.&nbsp;\u201cInformation such as credit card, social security number (SSN), person names, licenses, and business categories like healthcare or financial can be classified out-of-the-box. Custom fields include RegEx, Dictionary, Fingerprint, Named entities detection (e.g., person name, address, medical terms), Exact Data Match, and credentials.\u201d<\/p>\n<p>We are also pleased that KuppingerCole recognizes the breadth and depth of our Microsoft Purview Information Protection platform and called out these strengths:<\/p>\n<p>\u2022&nbsp; Double Key Encryption provides additional security and governance control.<br \/>\u2022&nbsp; Built into frequently used enterprise applications.<br \/>\u2022&nbsp; Simulations to test policy effectiveness.<br \/>\u2022&nbsp; Interoperates with Microsoft and third-party event logs.<br \/>\u2022&nbsp; Automated and manual classification options.<br \/>\u2022&nbsp; Coverage of structured and unstructured data in the Microsoft environment.<br \/>\u2022&nbsp; Data loss prevention functionality in Teams chat.<br \/>\u2022&nbsp; Option for no configuration, default classification.<\/p>\n<p>We have made significant investments in our Microsoft Purview solutions (such as <a href=\"https:\/\/www.microsoft.com\/security\/business\/information-protection\/microsoft-purview-data-loss-prevention\">Data Loss Prevention<\/a>, <a href=\"https:\/\/www.microsoft.com\/security\/business\/risk-management\/microsoft-purview-compliance-manager\">Compliance Manager<\/a>, <a href=\"https:\/\/www.microsoft.com\/security\/business\/information-protection\/microsoft-purview-data-lifecycle-management\">Data Lifecycle Management<\/a>, <a href=\"https:\/\/www.microsoft.com\/security\/business\/risk-management\/microsoft-purview-insider-risk-management\">Insider Risk Management<\/a>, and <a href=\"https:\/\/www.microsoft.com\/security\/business\/risk-management\/microsoft-purview-ediscovery\">eDiscovery<\/a>) and <a href=\"https:\/\/www.microsoft.com\/security\/business\/privacy\/priva-privacy-management-software\">Microsoft Priva<\/a> privacy solution that leverage our advanced classifiers, unified labeling and protection, sensitive information types, and policy authoring templates provided by our Microsoft Purview Information Protection platform.<\/p>\n<p>More than 200 partners are part of our <a href=\"https:\/\/www.microsoft.com\/security\/business\/intelligent-security-association\">Microsoft Intelligent Security Association<\/a> (MISA). Partners can leverage our labeling features through our Information Protection SDK, data connectors, and Graph APIs to provide integrations with Microsoft applications and services, security and compliance solutions, and their own products.<\/p>\n<p>We are honored to have been designated as \u201cOutstanding in Functionality\u201d by KuppingerCole and rated the highest possible score of \u201cStrong Positive\u201d in five different categories.<\/p>\n<h2>Learn more<\/h2>\n<p>We invite you to read the full <a href=\"https:\/\/www.kuppingercole.com\/reprints\/ceee1e33dd43f4a407168eaf23c4f580\" target=\"_blank\" rel=\"noreferrer noopener\">KuppingerCole Secure Collaboration report<\/a>. For more information on our Microsoft Purview solutions, please <a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-purview\">visit our website<\/a><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/microsoft-purview\">.<\/a> Visit the <a href=\"https:\/\/www.microsoft.com\/security\/business\/information-protection\/microsoft-purview-information-protection\">Microsoft Purview Information Protection<\/a> platform page to learn more about how to protect your data wherever it lives.<\/p>\n<p>To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p> READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/07\/07\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We are excited to share that Microsoft has been rated Outstanding in Functionality in the May 2022 KuppingerCole Market Compass for Secure Collaboration. Microsoft was also the only company to be awarded the highest possible score of Strong Positive in all five categories.<br \/>\nThe post KuppingerCole rates Microsoft as outstanding in functionality for secure collaboration appeared first on Microsoft Security Blog. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":47419,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[941,6871,10072],"class_list":["post-47418","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-compliance","tag-data-governance","tag-microsoft-purview"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>KuppingerCole rates Microsoft as outstanding in functionality for secure collaboration 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"KuppingerCole rates Microsoft as outstanding in functionality for secure collaboration 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-07T16:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/06\/Picture1-62bdd6440c940.png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"KuppingerCole rates Microsoft as outstanding in functionality for secure collaboration\",\"datePublished\":\"2022-07-07T16:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/\"},\"wordCount\":692,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/07\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration.png\",\"keywords\":[\"compliance\",\"Data governance\",\"Microsoft Purview\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/\",\"name\":\"KuppingerCole rates Microsoft as outstanding in functionality for secure collaboration 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/07\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration.png\",\"datePublished\":\"2022-07-07T16:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/07\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/07\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration.png\",\"width\":1000,\"height\":506},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"compliance\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/compliance\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"KuppingerCole rates Microsoft as outstanding in functionality for secure collaboration\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"KuppingerCole rates Microsoft as outstanding in functionality for secure collaboration 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/","og_locale":"en_US","og_type":"article","og_title":"KuppingerCole rates Microsoft as outstanding in functionality for secure collaboration 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-07-07T16:00:00+00:00","og_image":[{"url":"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/06\/Picture1-62bdd6440c940.png","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"KuppingerCole rates Microsoft as outstanding in functionality for secure collaboration","datePublished":"2022-07-07T16:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/"},"wordCount":692,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/07\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration.png","keywords":["compliance","Data governance","Microsoft Purview"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/","url":"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/","name":"KuppingerCole rates Microsoft as outstanding in functionality for secure collaboration 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/07\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration.png","datePublished":"2022-07-07T16:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/07\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2022\/07\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration.png","width":1000,"height":506},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/kuppingercole-rates-microsoft-as-outstanding-in-functionality-for-secure-collaboration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"compliance","item":"https:\/\/www.threatshub.org\/blog\/tag\/compliance\/"},{"@type":"ListItem","position":3,"name":"KuppingerCole rates Microsoft as outstanding in functionality for secure collaboration"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47418","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=47418"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/47418\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/47419"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=47418"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=47418"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=47418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}