Cisco and Microsoft 365: Making Them Better Together Solution Overview

Secure the Modern Workplace with Cisco Security Suites

Available Languages

Download Options

  • PDF
    (6.3 MB)
    View with Adobe Reader on a variety of devices
Updated:September 9, 2025

Bias-Free Language

The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.

Available Languages

Download Options

  • PDF
    (6.3 MB)
    View with Adobe Reader on a variety of devices
Updated:September 9, 2025
 

 

Challenges with securing the modern workplace

The way we work is changing. Organizations today are complex ecosystems with a mixture of remote and hybrid workers and diverse users, applications, AI, and devices. While these environments foster productivity, they can also be difficult to protect, leading to gaps in the attack surface, exposing organizations to ransomware and other unknown vulnerabilities, leaving organizations susceptible to an evolving threat landscape.

Organizations are faced with a difficult challenge: enable seamless and secure access, with limited budget, resources, and talent. That means investing in proactive protections for users, making progress on a zero-trust strategy, and implementing strong Extended Detection and Response (XDR) capabilities to protect against breaches while balancing financial considerations.

To add to these challenges, organizations are also struggling to manage disparate products that guard against individual attack vectors but fail to provide holistic protection. Therefore, to improve security posture, simplify management, and enhance user experience, organizations are looking to trusted vendors and platform-level integration and performance. For many organizations, this means leveraging both Cisco and Microsoft 365 for comprehensive networking, cloud, security, identity, and productivity capabilities.

For Cisco, this includes solutions from both the User Protection Suite and the Breach Protection Suite, including Cisco's Secure Access, Duo, XDR, and more.

Microsoft 365: IT infrastructure and productivity solution

The Microsoft E3/G3 solutions website notes: "connect and empower every employee across your organization with a Microsoft 365 solution that enhances productivity and drives innovation." Organizations purchase E3/G3 licenses for many reasons. The most common is to provide the tools required to keep a business running. These include:

Identity Management: Entra ID and Active Directory are used as the main Identity Provider (IdP) to store user information.

Device Management: Organizations using Windows machines require Windows software to operate.

Email Security: Microsoft 365 provides enterprise email solutions.

Because Microsoft wants to ensure their solutions are protected, they include some core security tools within an E3/G3 license.

Identity: Multi-Factor Authentication (MFA) for cloud applications.

Devices: Anti-Virus protection with Defender for Endpoint P1.

Email: Basic phishing and spam filter.

Microsoft's tools are essential for day-to-day business operations, but if your organization is looking to execute a robust zero trust strategy with full threat visibility across your environment, that's where Cisco comes in.

Enhance your security with Cisco Suites

Layering the Cisco User Protection and Breach Protection Suites on top of your existing Microsoft E3/G3 solutions can maximize the value of your existing security investments and fortify your organization against advanced threats.

Proactive user protection

Identity security:

    Cisco Identity Intelligence ingests data across your environment, including your identity provider, SaaS applications, HR resources, and more to determine potential vulnerabilities. Duo provides security first identity and access management capabilities, including phishing resistant authentication options on an extensive set of use cases, to enable seamless access for trusted users and stop attackers from logging in.

Zero trust access:

    Cisco Secure Access, a comprehensive Security Service Edge (SSE) solution includes Secure Internet Access with Secure Private Application Access. An integrated VPN-as-a-Service and Zero Trust Network Access (ZTNA) client and policies enables organizations to adopt Zero Trust Access on their timeline.

Email Security:

    Cisco Secure Email Threat Defense maximizes your email security investment by augmenting your Microsoft environment with comprehensive threat protection. Deployed in minutes, Email Threat Defense sits behind your gateway to detect and block dangerous emails including malicious QR codes, Business Email Compromise (BEC), and other advanced threats.

Endpoint detection and response:

    Secure Endpoint's Endpoint Detection and Response solution provides analytics across the Cisco portfolio to block malware and emerging threats. Working with Duo, it ensures only healthy devices can access corporate resources and prevents access when a threat is detected.

Device access control:

    Cisco Identity Services Engine (ISE) authenticates and authorizes all devices that connect to the network. ISE assigns tags to these devices, including corporate devices, BYOD, and IoT devices, like cameras and printers. Those tags are integrated in Secure Access to enable organizations to make security policies across their Cisco solutions.

Related image, diagram or screenshot

Responsive breach protection

Email security:

    Secure Email Threat Defense is integrated with Cisco XDR and makes use of the user as an asset for correlation. All threat verdicts from Email Threat Defense are a part of Cisco XDR's incident attack chains.

Endpoint detection and response:

    Secure Endpoint, the native EDR for Cisco XDR, enhances security by enabling faster detection through shared incident generation, enhancing asset context with detailed endpoint information, prioritizing threats using extensive MITRE TTP mapping, and expediting investigations with the XDR ribbon and pivot menu. Additionally, it accelerates response with powerful workflows available through XDR automation.

XDR solution:

    Cisco XDR is a network-led, open Extended Detection and Response (XDR) solution that detects, prioritizes, and remediates threats to simplify security operations. It integrates with the Cisco Security portfolio, third-party offerings, and Microsoft products such as Defender, Intune, and Entra ID, to provide comprehensive visibility and holistic threat management.

Related image, diagram or screenshot

Make Progress on your security maturity journey

Organizations that are looking to improve security maturity with zero trust programs frequently hit roadblocks. According to Gartner, "by 2028 30% of organizations will abandon zero-trust programs due to budget constraints, cultural resistance, and vendor product value." (Gartner, Inc., Predicts 2025: Scaling Zero-Trust Technology and Resilience, Charanpal Bhogal, Wayne Hankins, Manuel Acosta, John Watts, March 21 2025).

For many organizations, the ultimate goal of implementing zero trust programs is to achieve cyber resiliency. While the attackers will never be eliminated, organizations can minimize the damage, ensure quick recovery, and bounce back to normal operations. However, for organizations that face challenges outlined by Gartner, they might fall back to "check the box" security to meet basic compliance requirements, and stall on the promise of security maturity.

Cisco can support those organizations with a platform approach to eliminate the complexities of integration, ensure consistent policy enforcement, and improve visibility into the environment. By consolidating point solutions down to Cisco's security platform, organizations benefit from an integrated solution and expert guided on-boarding services to rapidly operationalize the solutions.

As a result, organizations can close security gaps, and the security team can gain the breathing room it needs to tackle more advanced and strategic projects. Cisco does this by enabling advanced identity protection (including phishing-resistant MFA and identity posture visibility), modernizing access (such as VPN-as-a-service and ZTNA), and correlating data across endpoints, networks, and the cloud to reduce alert fatigue and enhance detection and response.

Example of Security Maturity Journey

Related image, diagram or screenshot

Begin your suite investment

Related image, diagram or screenshot

Cisco Services

In addition to Cisco products, services help Cisco partner with your organization to scope out deployment, plan your roadmap, and help your organization achieve your security goals. Through enhanced or premium services, you get a dedicated Customer Success Specialist to bring in technical experts and help guide you through best practices.

Cisco Support services for Security Software comparison

 

Software Support Enhanced

Software Support Premium

Access: 24x7 access to Cisco TAC for software support

Related image, diagram or screenshot

A pink circle with black backgroundAI-generated content may be incorrect.

Response: Service response objective for severity 1 and 2 cases

30 minutes

15 minutes

Updates: Software updates for supported product

Related image, diagram or screenshot

A pink circle with black backgroundAI-generated content may be incorrect.

Tools: Knowledgebase and online access to resources, support tools, and product info

Related image, diagram or screenshot

A pink circle with black backgroundAI-generated content may be incorrect.

TAC engineer: Primary point of contact accountable for solution issue: single product, multi-product, and multi-vendor support coordination

Related image, diagram or screenshot

A pink circle with black backgroundAI-generated content may be incorrect.

Onboarding: Welcome email, kickoff and technical discovery meetings, best practices, Smart Account and Smart Licensing activation, configuration, deployment, and migration guidance

Related image, diagram or screenshot

A pink circle with black backgroundAI-generated content may be incorrect.

Technical adoption: Ongoing guidance for customer IT help desks, software feature adoption guidance, software update consultation, periodic configuration reviews

Related image, diagram or screenshot

A pink circle with black backgroundAI-generated content may be incorrect.

Designated service management: Cisco expert supports products in your environment, provides design and sizing guidance, and assists with managing the lifecycle

 

A pink circle with black backgroundAI-generated content may be incorrect.

Incident and escalation management: Assigned expert owns severe issues until resolution

 

A pink circle with black backgroundAI-generated content may be incorrect.

Reviews: Periodic business and technical reviews

 

A pink circle with black backgroundAI-generated content may be incorrect.

 

Learn more