<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=111591952803728&amp;ev=PageView&amp;noscript=1">
Skip to content
Our difference

We are on a mission to deliver innovative business transforming technology solutions that exceed our customers’ expectations.
 

Our culture

Our values guide us in everything we do and help shape our culture and customer approach. Find out more about our values and meet some of our team.
 

Our Microsoft Partnership

As a Microsoft Solutions Partner, we’ve been at the centre of the revolutionary changes that technology has brought to every aspect of life and we continue to stand by their side at the centre of tomorrow’s digital transformations.

Microsoft Solutions Partner

Our partners

We have successfully built relationships with multiple partners that prepare businesses for the future.
 

Carbon management

We understand our environmental responsibilities as a UK business and IT Managed Service Provider, and we understand how important it is for our customers to partner with responsible providers.
 

Careers

Our team is made up of a diverse group of people from all around the world, and we all have one thing in common: we’re passionate about providing our customers with outstanding solutions.

Thinking of selling your IT business?

Core is a well funded Microsoft Solutions Partner with a 30 year history of being at the heart of control in IT.

We are supported by our bankers and have funds available for strategic business acquisitions. Together with our successful acquisition track record and a commitment to making deals happen, now is the perfect time to talk to us if you are considering selling your IT business.

If you are interested in discussing a potential exit of your IT business, please complete the form on the right. All correspondence will be treated in the strictest of confidence and a mutual non-disclosure agreement will be exchanged prior to any discussions taking place.

Interactive Microsoft workshops

Our workshops are designed to help you realise the value of Microsoft technologies in your business, gain real value from your investment and transform the way you work.

The workshops are a collaborative and immersive experience; our experts will work with you to identify your business objectives and establish the Microsoft technologies to help you achieve them.
 

Request a workshop

Our range of workshops covers every aspect of the modern workplace including productivity, collaboration, identity, security and compliance and communication, with interactive and engaging sessions that bring the art of the possible to life.

Download our workshop guide

Read more about the interactive workshops we offer, and how they can benefit your business by downloading our guide.

MCI Workshop Introduction

Managed Services

Discover why Core is the first choice for many organisations looking to add flexibility, efficiency, and expertise to their teams.

Cloud Technology

From Microsoft’s leading platforms to bespoke cloud solutions, Core’s range of cloud technology solutions covers everything the modern workplace needs.

Professional Services

Whichever challenges you face on your digital journey, Core's professional services team has a solution to help, from IT Project Management to our innovative Smart Services.

Public Sector

Certified secure solution for the public sector, providing a reliable, flexible, secure and affordable IT solution.

Commercial Sector

Certified commercial sector solutions, covering all your commercial needs from financial and legal services, through to manufacturing.

Download our Frontline Workers white paper

Learn how technology can help to balance productivity with wellbeing for Frontline Workers.

White paper: How technology is revolutionising the health and productivity of frontline workers


Why customers choose us

Since we were founded in 1990 and started our Microsoft journey, we have supported over 10,000 customers on their communications and collaboration projects, and with the introduction of Microsoft's cloud technology, have grown our capabilities significantly across Microsoft 365 and Azure.

What sets us apart is a talented and passionate team who truly love what they do, demonstrating boundless enthusiasm and dedication in every single project.
 

logo-menu-david-lloyd

"It was apparent from day one that Core had a depth of knowledge in Microsoft 365, which we simply hadn’t found anywhere else."

Greater London Authority

"Core has a lot of experience working with the public sector, which was definitely a benefit."

Angel Trains

"There’s such a good working relationship with Core, it’s like having another permanent person in our organisation."

Talbot

"We had a really good, down to earth relationship with a few of the guys, and they know what they are doing."

Read our latest blog articles

Maximising Savings on Azure with Core’s Gain-Share Offer



Future-Proofing Your Business: The Perils of Rushing into Copilot for Microsoft 365
AI for All: How Microsoft's Latest Update on Copilot Opens Doors for all Businesses



Defending Against Modern Cyber Threats with Managed Services
The Core knowledge hub

Stay up-to-date with the latest insights, trends, and discussions from Core's team of subject matter experts through our blog topics and news articles.


Kathleen GreenanSep 18, 2019 4:29:23 PM5 min read

Top 5 security features of Microsoft 365 E5

More and more, businesses of every kind are utilising cloud technologies to make them agile, future-proof and more productive. Microsoft’s cloud-based productivity suite, Microsoft 365, makes all these things happen and more.   

Microsoft 365 combines Office 365, Enterprise Mobility + Security, and Windows 10, all in one package.  

Two versions of Microsoft 365 are available: E3 and E5. Essentially, E3 and E5 are just different versions of the Microsoft 365 suite, with slightly different levels of functionality.  

E5 has more features than E3, like PowerBI Pro, Teams telephony licensing (and most importantly for many businesses), additional security features - which is key to what this blog will discuss. 

Having a secure environment is usually a top organisational priority, if not the top priority, when it comes to IT. Many businesses want to use cloud technologies but are afraid that their security will be compromised if they do; that isn’t the case.  

In this blog, I look at the security features and functionality that come with the E5 version of Microsoft 365. Keep on reading to discover my top five security features and why they’re so useful. 

Office 365 Advanced Threat Protection

Office 365 Advanced Threat Protection (ATP) protects your organisation from phishing attacks. If an employee receives a malicious email with links and attachments, ATP will scan the links/attachments, and block them from being opened if they are identified as being suspiciousThis is an integral part of protecting your IT environment; if an employee opens a malicious link or attachment your hard drive can be corrupted, your data stolen, and you can be exposed to all sorts of online and offline fraud. So, having ATP gives you the peace of mind that your network is protected even if a phishing email lands in your employees’ inbox. 

You can also set anti-phishing policies, which require ATP to check incoming messages and depending on your policy, take action, like blocking or reporting the message if it is identified as a phishing attempt. 

Windows Defender Advanced Threat Protection

Windows Defender ATP is a powerful product that is designed to help you detect and respond to security threats. Windows Defender ATP is embedded in Windows 10, so it provides an extra level of protection because it not only helps you detect threats to your operating system, but it also helps you understand the actions you can take to neutralise the threatSo, if your current setup means you don’t know whether you are getting threats or (if you are) how to respond to them, Windows Defender ATP is the tool to help you do that. 

M365 graphic 1

Microsoft Cloud App Security

Most people have heard of the term shadow IT. Shadow IT refers to IT applications that are managed and utilised without the knowledge of an organisations IT department. In some cases, the use of shadow IT in a business can’t be helped; but Microsoft have addressed the problem of shadow IT with Cloud App Security. Cloud App Security allows you to identify non-Microsoft cloud apps, and manage and secure them so that your organisation takes back control over the use of shadow IT. Resulting in less security risks within the businessYou have control over who is accessing the applications, and there is further protection for any company data held within them. 

As well as providing additional control, Cloud App Security protects sensitive information from being shared and used in the applications and protects against cyberthreats. So, if you have a lot of employees downloading and using non-Microsoft apps, Cloud App Security can give you peace of mind knowing that information is secure. 

Office 365 Threat Intelligence

Detecting and intercepting security threats is a major priority for most businesses. Microsoft has a wealth of threat data and techniques to detect patterns that are synonymous with attack behaviour. Office 365 Threat Intelligence uses this knowledge to help you protect your networks and intercept security incidents. You are provided with an interactive tool that helps monitor, report and act on any security attacks Threat Intelligence detects. 

M365 graphic 2

This is all in real-time so you can see any threats, and threats that have been stopped and blocked.  

This is especially important for staying compliant with the GDPR. GDPR states that businesses are expected to demonstrate that they are applying appropriate technical measures to enable compliance, i.e., ensuring you have the right data protection software and policies in place. Threat Intelligence is a tool that helps create security policies to protect against malware and so helps organisations with compliance. 

For Government agencies, there are minimum standards for cybersecurity. One of the main aspects of this is having a defined, planned and tested response to cybersecurity incidents that could impact sensitive information. Threat Intelligence includes the Attack Simulator, which allows departments to conduct realistic attack scenarios with the aim of creating a culture amongst staff of cybersecurity awareness and education. 

Azure Information Protection P2

Azure Information Protection (AIP) is a great way to protect sensitive or confidential information and documents. AIP encrypts documents, tracks who has accessed a document and controls how it is shared, and who with.  

For those familiar with Azure Information Protection, the P2 version is an extension of P1. It provides the ability to set automatic labels (like labelling a file as confidential if it contains sensitive data, such as credit card number) and control oversharing of information in Outlook.  

For example, if I receive a document that is protected by AIP, I won’t be able to screenshot the document, save it or share my computer screen on Skype or Teams (thereby showing the document to someone else).  

AIP is a great way to make sure that documents are controlled even when they leave your organisation.  

If you need help deciding which licence is best for your business, get in touch with our Customer Success Manager, Kat, or for more information on our security services, ask about our security assessments.

DOWNLOAD OVERVIEW

Core also offer a Security Workshop for organisations that want to assess, review and improve their IT security landscape, or need help meeting industry standards and complying with regulations. Our experts will produce a comprehensive overview of your IT security and help you realise the value of Microsoft Security in your organisation. Book yours now.

BOOK A SECURITY WORKSHOP