A more secure cloud-based Microsoft Office

May 16th, 2016
A more secure cloud-based Microsoft Office

Privacy and security concerns can derail a lot of great software ideas -- but Microsoft is determined not to let that happen to their browser-based Office Online services. Last week, the software giant announced that their cloud-based versions of Office would be available to be hosted locally, wooing over security skeptics. Let’s take a look at whether or not this update could improve efficiency and security in your Microsoft Office suite.

Released in 2013, Office Web Apps offered access to powerhouse software packages like Word, Excel and PowerPoint without cumbersome installation procedures and storage requirements. Earlier this month however, Microsoft updated and renamed Office Web Apps to Office Online Server (OOS), and allowed delivery of these services via local SharePoint servers.

The update to OOS will include a number of collaborative features, like allowing multiple users to view and edit documents simultaneously. This will allow everyone’s changes to be visible the moment they make them -- thereby eliminating the necessity for drawn-out workflows. In addition to editing, OOS can also be used to easily facilitate meetings and presentations by utilizing real-time co-authoring in programs like PowerPoint, OneNote and Word.

The announcement elaborated that, “By integrating OOS with Exchange Server, you can view and edit Office file attachments in Outlook on the web and send back a reply without ever leaving your browser.”

But most importantly, we understand that many small and medium-sized business owners still have security concerns about the public cloud -- no matter what assurances they get from software providers. Many SMBs didn’t feel safe sending their company documents outside of their network and Microsoft’s OOS update aims at addressing those concerns by allowing OOS to be hosted locally. Contact us about how to move your Microsoft Office suite to the cloud without compromising your privacy.

Published with permission from TechAdvisory.org. Source.


Leave a comment!

You must be logged in to post a comment.