• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

15 of the Coolest New Features in Office 365

A little while back, we put up a post outlining why the inclusion of voice in the new Office 365 E5 SKU should push the license package to the top of your list of IT New Year’s Resolutions. As Human hand drawing social network scheme on the whiteboardexciting as the inclusion of voice is – it isn’t the only reason you should be considering Office 365 E5. There are a variety of other features in Office 365 E5 which can help businesses power through plateaus and reach new levels of success in 2016 and beyond.

Let’s take a closer look at what else is included in the Office 365 E5 SKU and what these features can do for your organization.

Delve Analytics 

On its own, Microsoft’s Delve gives employees an easy way to see what documents the people they interact with most are working on. It leverages machine learning to figure out an employee’s true team, not the one from their org chart. Delve Analytics takes that concept and uses the same machine learning to compile and track the data associated with it. It essentially gives managers a visual representation of how their employees work and collaborate with others.

Delve Analytics:

  • provides users and managers the chance to see which employees or departments work most effectively together and which ones need improvement
  • uses dashboards and interactive reports to display insights on time usage, helping employees identify inefficiencies and make the necessary corrections
  • increases the speed at which users can analyze and understand data surrounding how they do their jobs

Power BI

Power BI is a business analytics tool that allows users to better digest data pulled from across a variety of mediums. It takes that data and translates it into compelling visuals, reports, and dashboards. This allows users to gain greater insight into just how these different data sets relate to each other and the business in general.

Power BI:

  • enables companies to make better and more efficient use of the data sets they’re already generating
  • hooks into data sources such as SQL, Excel, Hadoop, Mail Chimp, Google Analytics, and many more to build a well-rounded picture of your organization
  • delivers data to users via live dashboards so that they have the most accurate, updated version of the figures at their disposal

The most amazing thing is that the dashboards aren’t difficult to build. Our Microsoft Practice Manager has put together a video in Office Mix to show how easy it is.

Customer Lockbox

For some customers, there’s an acute fear of losing control over their data when they entrust it to the cloud. The Customer Lockbox feature is designed to put those fears to rest once and for all. It does this by injecting customers into the security process, keeping them in full control over their own data regardless of where it may live.

Customer Lockbox:

  • gives customers the ability to limit who can access their data through the use of pre-assigned, two-factor authentication steps
  • increases transparency in terms of who is doing what with data stored in the cloud
  • improves customer confidence in migrating additional data sets into the cloud

Advanced eDiscovery

Organizations engaged in eDiscovery can find themselves having to sift through mountains of data to find the documents their legal teams want to see. This process can eat up a lot of time as well as resources. However, Microsoft’s Advanced eDiscovery tool was built with the goal of reducing the time and money spent conducting eDiscoveries, as well as limiting other challenges which can crop up.

Advanced eDiscovery:

  • integrates Equivio machine learning capabilities, predictive coding, and text analytics to make it easier to navigate data stockpiles
  • supports integration with non-Microsoft systems and tools to ensure important documents aren’t being missed
  • responds to user training, allowing it to more efficiently weed out valuable nuggets from large, unstructured data piles

Advanced Threat Protection

Email is one of an organization’s most important communication tools – it can also be one of the biggest threats. If users let their guards down, they could easily fall victim to a malware scam. Depending on a user’s level of access, a mistake like this could very easily put the entire organization at risk. Advanced Threat Protection from Microsoft works to protect users from known and unknown threats which may be lurking in emails, attachments, links, etc.

Advanced Threat Protection:

  • can be licensed for specific, high-risk users whose clearance level would be greatly coveted by attackers
  • sends every email that comes in off to a quarantine area where it’s scanned in depth for threats before delivery is completed
  • sends a stub to end users which enables them to read and act on the text of the email while the attachments and links are vetted for security

Experience the security and reliability of Office 365 E5

If you are on an Office 365 E plan, you can step up to E5, but you may want to enable some other workloads first, like SharePoint, OneDrive, etc. If you own Office 365 E1 or E3 and want some help in figuring out the next step, our award-winning Microsoft team is ready to help. Contact us today to schedule an Office 365 Workload Enablement Workshop.

You can also find us on Twitter @ArrayaSolutions. Follow us to stay updated on all of our latest blogs, special offers, and exclusive events.

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}