{"id":17961,"date":"2021-08-16T00:58:28","date_gmt":"2021-08-16T00:58:28","guid":{"rendered":"https:\/\/www.backupassist.com\/blog\/?p=17961"},"modified":"2021-08-26T11:00:10","modified_gmt":"2021-08-26T11:00:10","slug":"additional-protections-that-backupassist-365-offer-beyond-microsoft-365","status":"publish","type":"post","link":"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365","title":{"rendered":"What additional protections does BackupAssist 365 offer beyond Microsoft 365?"},"content":{"rendered":"\n<p>In fact, Microsoft themselves recommend 3rd party backups. Take a look at this quote from their services agreement:&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<div style=\"background:#f2f2f2;text-align:center;padding:10px 30px 10px 30px;\">\n  <h5 style=\"font-weight:400;color:#282561;\"><i>&#8220;We recommend that you regularly&nbsp;backup&nbsp;Your Content and Data that you store on the Services or store using Third-Party Apps and Services.&#8221;<\/i><\/h5>\n  <p style=\"font-size:12pt;margin-top:-10px;\">\n    Source:\n    <a href=\"https:\/\/www.microsoft.com\/en-us\/servicesagreement\" target=\"_blank\" rel=\"noreferrer noopener\">\n      <strong>Microsoft Services Agreement<\/strong>\n    <\/a>\n  <\/p>\n<\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>BackupAssist 365 can provide additional resilience and backup features to fill the gap left by Microsoft 365&#8217;s default options and help businesses maintain more robust and accessible backups.&nbsp;&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/BackupAssist-QuadMenu-07.png\" alt=\"\" class=\"wp-image-12676\" width=\"215\" height=\"284\" srcset=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/BackupAssist-QuadMenu-07.png 430w, https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/10\/BackupAssist-QuadMenu-07-228x300.png 228w\" sizes=\"auto, (max-width: 215px) 100vw, 215px\" \/><\/figure><\/div>\n\n\n\n<p>Specifically, BackupAssist 365 provides these additional protections beyond Microsoft 365:&nbsp;<\/p>\n\n\n\n<div style=\"font-size:17px;margin-bottom:5px;padding:15px;border-collapse:collapse;border:none;border-left:1px solid white;background:#005266;color:#ffffff;text-align:left;border-radius:5px;\">\n  \u203a&nbsp;&nbsp;Complete data sovereignty&nbsp;&nbsp;<a href=\"#point-1\" style=\"color:#f78f1e;\"><b>Read more<\/b><\/a>\n<\/div>\n<div style=\"font-size:17px;margin-bottom:5px;padding:15px;border-collapse:collapse;border:none;border-left:1px solid white;background:#005266;color:#ffffff;text-align:left;border-radius:5px;\">\n  \u203a&nbsp;&nbsp;Enhanced point-in-time recovery&nbsp;&nbsp;<a href=\"#point-2\" style=\"color:#f78f1e;\"><b>Read more<\/b><\/a>\n<\/div>\n<div style=\"font-size:17px;margin-bottom:5px;padding:15px;border-collapse:collapse;border:none;border-left:1px solid white;background:#005266;color:#ffffff;text-align:left;border-radius:5px;\">\n  \u203a&nbsp;&nbsp;More robust data retention&nbsp;&nbsp;<a href=\"#point-3\" style=\"color:#f78f1e;\"><b>Read more<\/b><\/a>\n<\/div>\n<div style=\"font-size:17px;margin-bottom:5px;padding:15px;border-collapse:collapse;border:none;border-left:1px solid white;background:#005266;color:#ffffff;text-align:left;border-radius:5px;\">\n  \u203a&nbsp;&nbsp;Back up data from deleted users automatically and without additional costs&nbsp;&nbsp;<a href=\"#point-4\" style=\"color:#f78f1e;\"><b>Read more<\/b><\/a>\n<\/div>\n<div style=\"font-size:17px;margin-bottom:5px;padding:15px;border-collapse:collapse;border:none;border-left:1px solid white;background:#005266;color:#ffffff;text-align:left;border-radius:5px;\">\n  \u203a&nbsp;&nbsp;Easier recovery from ransomware and other malware&nbsp;&nbsp;<a href=\"#point-5\" style=\"color:#f78f1e;\"><b>Read more<\/b><\/a>\n<\/div>\n<div style=\"font-size:17px;margin-bottom:5px;padding:15px;border-collapse:collapse;border:none;border-left:1px solid white;background:#005266;color:#ffffff;text-align:left;border-radius:5px;\">\n  \u203a&nbsp;&nbsp;Better protection against human error&nbsp;&nbsp;<a href=\"#point-6\" style=\"color:#f78f1e;\"><b>Read more<\/b><\/a>\n<\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>To understand what those mean&nbsp;\u2013 and&nbsp;why they matter&nbsp;\u2013&nbsp;let\u2019s&nbsp;take a closer look at each of those points.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"point-1\">Complete data sovereignty: You control your data&nbsp;<\/h2>\n\n\n\n<p>With any cloud service, the vendor ultimately controls your data. It resides in their cloud. It\u2019s in a format the vendor dictates, and you can only restore it using their processes. This approach to backups can be an advantage that offloads complexity from IT in some cases.&nbsp;<\/p>\n\n\n\n<p>However, in other cases, it limits your ability to have your data in standard file formats, store the data on physical servers you control, and drill down to find individual files. Limited control of your data can also create a variety of compliance and data sovereignty challenges.&nbsp;&nbsp;<\/p>\n\n\n\n<p>With&nbsp;BackupAssist&nbsp;365, data is stored (in&nbsp;<strong>standard file formats whenever possible<\/strong>)&nbsp;on-premises&nbsp;or in a cloud storage location you specify, giving IT the control. This&nbsp;<strong>decouples your business continuity and compliance from complete control by a single vendor<\/strong>.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Additionally, with the complete control offered by&nbsp;BackupAssist&nbsp;365,<strong>&nbsp;IT can easily search for &#8212; and restore&nbsp;\u2013&nbsp;individual files<\/strong>.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"point-2\">Enhanced point-in-time recovery: Go beyond 30 days&nbsp;<\/h2>\n\n\n\n<p>Microsoft 365 enables point-in-time recovery for the&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/docs.microsoft.com\/en-us\/compliance\/assurance\/assurance-sharepoint-onedrive-data-resiliency\" target=\"_blank\"><strong>last 30 days for&nbsp;Sharepoint&nbsp;and&nbsp;Onedrive&nbsp;for Business<\/strong><\/a>. While this is sufficient for some organizations, an alternative solution is a must for businesses that need point-in-time recovery beyond 30 days (for compliance, resilience against malware with long dwell times, etc.).&nbsp;&nbsp;<\/p>\n\n\n\n<p>BackupAssist 365 puts you in control of your point-in-time recovery. It enables you to&nbsp;<strong>automatically capture backups, retain them as long as you want, and restore using any restore point you choose<\/strong>.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"point-3\">More robust data retention: Complete control over your policies&nbsp;&nbsp;<\/h2>\n\n\n\n<p>Microsoft allows businesses to configure and customize retention policies for compliance purposes. However, retention settings vary across apps, and some applications lack native retention settings. This limits your flexibility and makes remaining compliant more complex.&nbsp;&nbsp;<\/p>\n\n\n\n<p>With&nbsp;BackupAssist 365,&nbsp;<strong>you&#8217;re in complete control of your data retention strategy and can develop custom retention policies based on your compliance, risk, and retention requirements<\/strong>.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"point-4\">Back&nbsp;up&nbsp;data from deleted users simply and without additional costs&nbsp;<\/h2>\n\n\n\n<p>Microsoft&#8217;s default data retention policies store data for deleted users for 30 days. While modifications to retention policies are possible, they add complexity to your backup workflows.&nbsp;<strong>With BackupAssist 365, deleted users\u2019 data is retained by default with no additional licensing costs<\/strong>.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"point-5\">Easier recovery from ransomware and other malware&nbsp;<\/h2>\n\n\n\n<p>Microsoft retention policies offer some protection against ransomware and other malware.&nbsp;<br>However, there are several major shortcomings:&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>You can only restore to a point within the last 30 days (limiting protection against attacks with long dwell times).&nbsp;<\/li><li>Sophisticated malware can change files until they&#8217;ve exceeded versioning retention policies (leaving only infected files).&nbsp;<\/li><li>Effectively configuring native retention policies to meet risk and compliance requirements is highly complex.&nbsp;&nbsp;<\/li><\/ul>\n\n\n\n<p><strong>BackupAssist 365 makes it easier to recover from ransomware and other malware attacks because unaffected, off-platform backups can be quickly and easily restored.&nbsp;<\/strong>Additionally, off-platform backups won&#8217;t necessarily be exposed to an attacker&nbsp;who&nbsp;compromises a Microsoft account.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"point-6\">Better protection against human error&nbsp;<\/h2>\n\n\n\n<p>People make mistakes. This goes for business users as well as IT staff. Depending on the app and use case,&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/support.microsoft.com\/en-us\/office\/restore-deleted-items-from-the-site-collection-recycle-bin-5fa924ee-16d7-487b-9a0a-021b9062d14b\" target=\"_blank\"><strong>restoring deleted items using native Microsoft tools is capped at 30 or 93 days<\/strong><\/a>. In the real world, a window of just a few months can be far too short to protect against data loss.&nbsp;<\/p>\n\n\n\n<p><strong>With BackupAssist 365, backed up files can be restored independently of recycle bin and retention policies, protecting businesses from human error and malicious users.<\/strong>&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion: BackupAssist 365 provides full backup protection&nbsp;<\/h2>\n\n\n\n<p>The built-in retention and backup features of Microsoft 365 are helpful and solve some real-world problems, namely short-term data retention and recovery.&nbsp;However, Microsoft&#8217;s native retention and recovery features stop short of providing businesses with complete control of their backup strategy,&nbsp;long-term backups,&nbsp;and&nbsp;complete protection against malware, malicious users, and human error.<strong>&nbsp;<\/strong>&nbsp;<\/p>\n\n\n\n<p><strong>BackupAssist 365 fills that gap and enables you to complement Microsoft 365&#8217;s basic retention and backup&nbsp;with robust, resilient, and flexible backups you control.<\/strong>&nbsp;<\/p>\n\n\n\n<p>If you\u2019d like to try BackupAssist 365 for yourself, you can&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/www.backupassist.com\/365\/downloads\" target=\"_blank\"><strong>sign up for a free trial here<\/strong><\/a>.&nbsp;&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Given Microsoft 365&#8217;s reputation for reliability, many businesses choose to rely solely on the built-in backup and recovery features. However, these enterprises limit the overall resilience and completeness of their backup and disaster recovery (DR) strategy. <\/p>\n","protected":false},"author":17,"featured_media":17116,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[763,774],"tags":[],"class_list":["post-17961","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-backupassist-365","category-office-365"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What additional protections does BackupAssist 365 offer beyond Microsoft 365? - Cyber Resilience Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What additional protections does BackupAssist 365 offer beyond Microsoft 365? - Cyber Resilience Blog\" \/>\n<meta property=\"og:description\" content=\"Given Microsoft 365&#039;s reputation for reliability, many businesses choose to rely solely on the built-in backup and recovery features. However, these enterprises limit the overall resilience and completeness of their backup and disaster recovery (DR) strategy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Resilience Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-16T00:58:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-26T11:00:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2021\/02\/1487706341.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1001\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Linus Chang\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Linus Chang\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365\"},\"author\":{\"name\":\"Linus Chang\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be\"},\"headline\":\"What additional protections does BackupAssist 365 offer beyond Microsoft 365?\",\"datePublished\":\"2021-08-16T00:58:28+00:00\",\"dateModified\":\"2021-08-26T11:00:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365\"},\"wordCount\":913,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2021\/02\/1487706341.jpg\",\"articleSection\":[\"BackupAssist 365\",\"Office 365\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365\",\"url\":\"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365\",\"name\":\"What additional protections does BackupAssist 365 offer beyond Microsoft 365? - Cyber Resilience Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2021\/02\/1487706341.jpg\",\"datePublished\":\"2021-08-16T00:58:28+00:00\",\"dateModified\":\"2021-08-26T11:00:10+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365#primaryimage\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2021\/02\/1487706341.jpg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2021\/02\/1487706341.jpg\",\"width\":1500,\"height\":1001},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.backupassist.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What additional protections does BackupAssist 365 offer beyond Microsoft 365?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#website\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"name\":\"Cyber Resilience Blog\",\"description\":\"Protect Your Cloud Data with BackupAssist\",\"publisher\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#organization\",\"name\":\"Cyber Resilience Blog\",\"url\":\"https:\/\/www.backupassist.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"contentUrl\":\"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg\",\"caption\":\"Cyber Resilience Blog\"},\"image\":{\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be\",\"name\":\"Linus Chang\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g\",\"caption\":\"Linus Chang\"},\"url\":\"https:\/\/www.backupassist.com\/blog\/author\/nithiyananda-soosai\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What additional protections does BackupAssist 365 offer beyond Microsoft 365? - Cyber Resilience Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365","og_locale":"en_US","og_type":"article","og_title":"What additional protections does BackupAssist 365 offer beyond Microsoft 365? - Cyber Resilience Blog","og_description":"Given Microsoft 365's reputation for reliability, many businesses choose to rely solely on the built-in backup and recovery features. However, these enterprises limit the overall resilience and completeness of their backup and disaster recovery (DR) strategy.","og_url":"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365","og_site_name":"Cyber Resilience Blog","article_published_time":"2021-08-16T00:58:28+00:00","article_modified_time":"2021-08-26T11:00:10+00:00","og_image":[{"width":1500,"height":1001,"url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2021\/02\/1487706341.jpg","type":"image\/jpeg"}],"author":"Linus Chang","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Linus Chang","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365#article","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365"},"author":{"name":"Linus Chang","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be"},"headline":"What additional protections does BackupAssist 365 offer beyond Microsoft 365?","datePublished":"2021-08-16T00:58:28+00:00","dateModified":"2021-08-26T11:00:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365"},"wordCount":913,"commentCount":0,"publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2021\/02\/1487706341.jpg","articleSection":["BackupAssist 365","Office 365"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365","url":"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365","name":"What additional protections does BackupAssist 365 offer beyond Microsoft 365? - Cyber Resilience Blog","isPartOf":{"@id":"https:\/\/www.backupassist.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365#primaryimage"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365#primaryimage"},"thumbnailUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2021\/02\/1487706341.jpg","datePublished":"2021-08-16T00:58:28+00:00","dateModified":"2021-08-26T11:00:10+00:00","breadcrumb":{"@id":"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365#primaryimage","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2021\/02\/1487706341.jpg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2021\/02\/1487706341.jpg","width":1500,"height":1001},{"@type":"BreadcrumbList","@id":"https:\/\/www.backupassist.com\/blog\/additional-protections-that-backupassist-365-offer-beyond-microsoft-365#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.backupassist.com\/blog"},{"@type":"ListItem","position":2,"name":"What additional protections does BackupAssist 365 offer beyond Microsoft 365?"}]},{"@type":"WebSite","@id":"https:\/\/www.backupassist.com\/blog\/#website","url":"https:\/\/www.backupassist.com\/blog\/","name":"Cyber Resilience Blog","description":"Protect Your Cloud Data with BackupAssist","publisher":{"@id":"https:\/\/www.backupassist.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.backupassist.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.backupassist.com\/blog\/#organization","name":"Cyber Resilience Blog","url":"https:\/\/www.backupassist.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","contentUrl":"https:\/\/www.backupassist.com\/app\/uploads\/sites\/3\/2019\/09\/BA-Logo-Full-Logo.svg","caption":"Cyber Resilience Blog"},"image":{"@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/e3b9b8dd4c91aac329df23310ea033be","name":"Linus Chang","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.backupassist.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2ec8afa11de6866934a194c35c8d592faf45ced0ee666b40654a1752103bae17?s=96&d=mm&r=g","caption":"Linus Chang"},"url":"https:\/\/www.backupassist.com\/blog\/author\/nithiyananda-soosai"}]}},"_links":{"self":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/17961","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/comments?post=17961"}],"version-history":[{"count":40,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/17961\/revisions"}],"predecessor-version":[{"id":18061,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/posts\/17961\/revisions\/18061"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media\/17116"}],"wp:attachment":[{"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/media?parent=17961"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/categories?post=17961"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.backupassist.com\/blog\/wp-json\/wp\/v2\/tags?post=17961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}