Cloud Security – Osterman Research https://ostermanresearch.com Insightful research that impacts organizations Mon, 10 Mar 2025 22:33:53 +0000 en-US hourly 1 https://i0.wp.com/ostermanresearch.com/wp-content/uploads/2021/01/cropped-or-site-icon.png?fit=32%2C32&ssl=1 Cloud Security – Osterman Research https://ostermanresearch.com 32 32 187703764 CISO and CIO Investment Priorities for Cybersecurity in 2025 – our latest report https://ostermanresearch.com/2025/03/11/2025report-ciso-cio-investment-priorities/ Mon, 10 Mar 2025 22:00:00 +0000 https://ostermanresearch.com/?p=4814 We have just published our latest report for 2025. It’s all about how CISOs and CIOs are approaching investments in cybersecurity this year. The research looks at investment priorities overall (across 24 areas), plus takes a deep dive into four focus areas. The focus areas this year are applications, cloud platforms and services, identity, and data. Feel free to get a copy if making decisions around cybersecurity strategies and investments is in your wheelhouse.

The data comes from a survey of 268 CISOs and CIOs in the United States, at organizations with more than 1,000 employees. This is the second time we’ve run this research program. The first program was run in 2023, and this program builds on and extends our earlier research.

The key takeaways from this research are:

  • Cybersecurity driven by changing threat response calculus
    Increasing prices for cybersecurity insurance, the growing use of AI in cyberattacks, software supply chain compromise, and return-to-office mandates for employees are the top trends and challenges driving how CISOs and CIOs approach cybersecurity in 2025. All force a reevaluation of how best to address current and emerging threats.
  • Cloud infrastructure security, cybersecurity talent availability, and control and
    ethical processing of data top the priority stack

    Out of 24 potential investment areas for cybersecurity, two thirds of organizations assigned the highest priority to cloud infrastructure, internal cybersecurity talent, and compliant data processing. They see weaknesses in their current posture that are misaligned with where they want to be and are investing the resources to do something about it.
  • Budgets continue to rise, showing resilience across economic cycles
    Almost all organizations have received a higher budget for cybersecurity over the previous two years, and most believe they could put even more budget to productive and effective use.
  • Strong risk management disciplines make a significant difference
    Organizations with higher efficacy in managing the business risks associated with key cybersecurity areas such as applications, cloud, and identities show much higher commitment to address security weaknesses and are spending accordingly. Being able to see what is and isn’t happening drives change.
  • Organizations must do the work to understand their priorities
    Investment priorities for any given organization must be set within the context of their current posture, real-world threat data, and known areas of concern (and unknown areas of weakness). This is the fundamental work that cybersecurity decision-makers and influencers must coordinate.

This research was sponsored by BIO-key International, OpenText, and Salt Security.

If your firm provides cybersecurity solutions AND you would like to spread this research to your customers and prospects, please get in contact to talk about licensing options.

]]>
4814
State of Cloud Security Maturity 2022 – webinar with Ermetic https://ostermanresearch.com/2022/08/17/webinar-ermetic-cloud-security-maturity/ Wed, 17 Aug 2022 00:00:00 +0000 https://ostermanresearch.com/?p=2305 Hosted by Ermetic

Presented on August 17, 2022

Watch this webinar to hear from Osterman Research who conducted the benchmarking study and the architect of the Ermetic maturity model as they discuss the significance of the key findings and explain how you can use the model and the benchmark to improve your own cloud security maturity.

Among the findings they will explore are:

  • Demonstrable ROI: 42% of companies investing more than 50 hours per week on cloud security are achieving the highest levels of maturity (Levels 3 and 4)
  • Bigger not better: Only 7% of companies with more than 10,000 employees were at level three or four in terms of maturity, compared with 18% for companies with between 2,500 and 9,999 employees, and 24% for companies with 500 to 2,499 employees
  • Shared blindspot: 81% of organizations lack full visibility into all resources that are directly accessible from the Internet

Register and watch the webinar

Read the report: State of Cloud Security Maturity 2022

]]>
2305
The Rush to MDR Services – webinar with LogicHub https://ostermanresearch.com/2022/06/25/webinar-logichub-rush-to-mdr/ Sat, 25 Jun 2022 00:00:00 +0000 https://ostermanresearch.com/?p=2185 Hosted by LogicHub

Presented on June 24, 2022

The managed cybersecurity services market is undergoing a significant shift. Organizations are upgrading from alert-oriented Managed Security Service Providers (MSSPs) to action-oriented Managed Detection and Response (MDR) services.

The need for change is evident, and organizations early to embrace MDR services report a higher security posture across multiple dimensions. Those organizations that have not yet upgraded from an MSSP evidence an overwhelming and urgent intent to do so.

Learn about MDR adoption – especially those driven by AI and automation – and how this is expected to more than double in the next 12 months, compelled by an excess of alerts, alert fatigue, a staffing crisis, and a profound increase in the number of advanced threats across any given attack surface.

Register and watch on BrightTalk

Read the report: The Rush to MDR Services

]]>
2185
Securing Your SaaS Landscape – Webinar https://ostermanresearch.com/2019/10/11/webinar-saas-security-sonicwall/ Fri, 11 Oct 2019 03:00:00 +0000 https://ostermanresearch.com/?p=576 Sponsored by: SonicWall

The growing number of cloud services available in most organizations enable fast time-to-market for productivity and collaboration tools, but the easy availability of these capabilities can pose significant security risks for organizations. 

Join SonicWall and Osterman Research as they collaborate to help you understand the current threats landscape and the best practices to protect against phishing, ransomware and email fraud.

We will cover the following:

  • Major concerns and issues with SaaS adoption
  • What to look for in a CASB solution
  • Overview of SonicWall Cloud App Security

Register to watch the recording

]]>
576
Comparison of Microsoft and Forcepoint CASB Solutions – Buyer’s Guide https://ostermanresearch.com/2019/04/22/orwp_0310/ Mon, 22 Apr 2019 00:00:00 +0000 https://ostermanresearch.com/?p=950 Published April 2019

Sponsored by Forcepoint

Executive Summary

Cloud services enable fast time-to-market for productivity and collaboration tools, but the easy availability of these capabilities poses significant security risks for organizations. For example:

  • Employees may be using insecure cloud services for sharing business documents that contain confidential or sensitive information.
  • Unauthorized actors may gain access through credential harvesting or brute force attacks, triggering a data breach.
  • A disgruntled employee may download confidential documents just before leaving the organization to go work for a competitor.

A Cloud Access Security Broker (CASB) is a security offering that provides visibility into and protection for the cloud applications being used by employees in an organization. In general, this means that CASBs report on what cloud applications are being used (both sanctioned and unsanctioned), can alert an administrator when a specific action or chain of actions is identified in a cloud application, and can interject varying types of controls in real-time as action is unfolding.

In this paper, we compare and contrast the capabilities offered in two CASBs that work with Office 365: Microsoft’s own Office 365 Cloud App Security offered in the Office 365 Enterprise E5 plan, and Forcepoint’s CASB offering. In brief:

  • The Office 365 Cloud App Security service is included in the Enterprise E5 plan. Office 365 Cloud App Security is a tightly scoped edition of the full Microsoft Cloud App Security service. The latter is available standalone, as part of the Enterprise Mobility + Security E5 plan, or as part of a Microsoft 365 E5 plan. Office 365 Cloud App Security deals with Office 365 and a small set of similar cloud apps. Microsoft Cloud App Security deals with many thousands of cloud apps that are both similar and dissimilar to Office 365, including Amazon Web Services and Microsoft Azure. Neither support Exchange on-premises.
  • Forcepoint CASB provides visibility, policy enforcement and user behavior analysis for thousands of cloud apps, including Office 365. It is available as a cloud service and as an on-premises server, and is one element of Forcepoint’s comprehensive security platform that includes malware detection, data loss prevention, and email security, among others.

Request a Copy

]]>
950
Securing your SaaS Landscape – Webinar https://ostermanresearch.com/2019/04/04/webinar-securing-saas-sonicwall/ Thu, 04 Apr 2019 03:00:00 +0000 https://ostermanresearch.com/?p=649 Sponsored by: SonicWall

The growing number of cloud services available in most organizations enable fast time-to-market for productivity and collaboration tools, but the easy availability of these capabilities can pose significant security risks for organizations. 

Join SonicWall and Osterman Research as they collaborate to help you understand the current threats landscape and the best practices to protect against phishing, ransomware and email fraud.

We will cover the following:

  • Major concerns and issues with SaaS adoption
  • What to look for in a CASB solution
  • Overview of SonicWall Cloud App Security

Register to watch the recording

]]>
649
The Importance of Choosing the Right CASB Solution – White Paper https://ostermanresearch.com/2019/01/29/orwp_0306/ Mon, 28 Jan 2019 23:00:00 +0000 https://ostermanresearch.com/?p=979 Published January 2019

Sponsored by Avanan, Forcepoint and SonicWall

Executive Summary

A CASB is an on-premises or cloud-based solution that serves as an intermediary between one or more cloud providers and an organization’s on-premises and/or cloud-based security infrastructure. A CASB acts to ensure that the organization’s security policies are executed properly by the cloud provider(s) that are used by the organization. CASBs enable security analysts and others within an organization to determine how cloud applications and services are being used, to identify any non- sanctioned “shadow IT” applications that might have been installed, and to provide insight into cloud-to-cloud operations.

Request a Copy

By downloading this white paper, you are opting into receiving marketing communications from Osterman Research and any of the sponsors of this white paper
]]>
979
White Papers – 2017 https://ostermanresearch.com/2017/12/31/whitepapers2017/ Sat, 30 Dec 2017 23:00:00 +0000 https://ostermanresearch.com/?p=764 Here’s our white papers from 2017. If you’d like a copy, please get in touch.

DateWhite PaperSponsor(s)
December
2017
The State of Privacy for Employee Personal DataZL Technologies
November
2017
Best Practices for Securing Social Media and Collaboration PlatformsActiance, Archive360, Proofpoint and Viewpointe
October
2017
Filling the Gaps in Office 365Agari, AppRiver, Commvault, PortalGuard, Proofpoint, RSA, Sonian, Trend Micro, Viewpointe and Zix
October
2017
Strategies for Archiving in Hybrid EnvironmentsActiance, HubStor, Micro Focus, Mimecast, Proofpoint, Smarsh and Viewpointe
September
2017
IT Security at SMBs: 2017 Benchmarking SurveyCyren
July
2017
Securing Office 365: How to Protect Against Targeted AttacksAgari
July
2017
Assessing the Total Cost of Ownership for Veritas Enterprise VaultActiance
July
2017
A Practical Guide for GDPR ComplianceDruva, HPE, KnowBe4, Nuix, Quest, RSA, Storage Made Easy, TITUS and ZL Technologies
July
2017
Protecting Data in the Healthcare IndustryForcepoint, Ipswitch, KnowBe4, Mimecast, Quest, South River Technologies, Spamhaus Technology, Storage Made Easy and Zix
June
2017
The Growing Importance of Archiving Mobile Text MessagesTeleMessage
May
2017
The Why, the What and the How of the SDDCMcAfee and VMware
May
2017
Deploying and Managing Security in the CloudBarracuda, Forcepoint, Proofpoint and RSA
April
2017
Cyber Security in Financial Services: A Complex Threat Requiring a Comprehensive StrategyCipherCloud, Forcepoint, McAfee, Proofpoint, Smarsh and Wombat Security.
April
2017
Key Issues for eDiscovery and Legal ComplianceArchive360, ArcMail, Barracuda, Exterro, Hewlett Packard Enterprise, Smarsh and Sonian
March 2017The Critical Importance of File AnalysisZL Technologies
January 2017Techniques for Delaying with Ransomware, Business Email Compromise and SpearphishingCyren, Forcepoint, HPE, KnowBe4 and PhishMe
January 2017GDPR Compliance and Its Impact on Security and Data Protection ProgramsActiance, CipherCloud, Forcepoint, HPE, janusNET, Mimecast, Sonian and Waterford Technologies
]]>
764
White Papers – 2014 and Earlier https://ostermanresearch.com/2014/12/31/whitepapers2014andearlier/ Tue, 30 Dec 2014 23:00:00 +0000 https://ostermanresearch.com/?p=775 Here’s our white papers from 2002 to 2014. If you’d like a copy, please get in touch.

December 2014Evolving Toward the Next Phase of Email (updated)IBM
October 2014Improving the Security and Control of Your File Sync and Share CapabilitiesIntermedia
September 2014Best Practices for File SharingCitrix, Cleo and ownCloud
August 2014Email Encryption is an Essential Best PracticeZix
August 2014Managing Content in Enterprise Social NetworksSmarsh
July 2014Using Email, File, Social Media and Mobile Archiving to Grow Your BusinessActiance, Authority3, GWAVA, and Zovy
July 2014Why You Need to Protect Your Customers’ Online Experience in Real-TimeRiskIQ
June 2014Evolving Toward the Next Phase of EmailIBM 
June 2014Best Practices for Managing Archive MigrationsArchive360, GWAVA, OpenText, QUADROTech, Smarsh and TransVault
April 2014Addressing Information Governance ChallengesHP Autonomy
April 2014How Online Identity Fraud Harms Businesses and What You Can Do About ItE-HAWK
April 2014Improving the Compliance Management ProcessKnowBe4
March 2014The Growing Need for Mobile Device ArchivingGWAVA, MobileGuard and Smarsh
March 2014Best Practices for Social Media Management and ArchivingGWAVA, Proofpoint and Smarsh
March 2014Microsoft Office 365 for the Enterprise: How to Strengthen Security, Compliance and ControlMcAfee, Mimecast, Sonian and TrustSphere
February 2014Developing an Information Governance StrategyActiance, ownCloud, StorageMadeEasy and Zovy
February 2014PST Management: The Eliminate or Migrate ImperativeQUADROTech
February 2014Email Archive Migration: Opportunities and RisksQUADROTech
February 2014Best Practices in Email, Web and Social Media SecuritySpamTitan and Trustwave 
February 2014Portal Authentication: A Balancing Act Between Security, Usability and CompliancePortalGuard
January 2014The Critical Need for Messaging IntelligenceTrustSphere
December 2013The Need for Enterprise-Grade File TransferAttachmate
November 2013The Case For Third-Party Archiving in Microsoft Exchange EnvironmentsGWAVA, Messaging Architects, Smarsh and Symantec
October 2013The Importance of Continuity in Office 365 EnvironmentsMimecast
October 2013Managing Growth and Driving Down Costs for Microsoft SharePointAccellion, MessageSolution and Metalogix
October 2013Why eDiscovery Should be a Top Priority for Your OrganizationHP Autonomy, Proofpoint and Smarsh
September
2013
The Importance of File ArchivingHP Autonomy, Mimecast and Symantec
July 2013Best Practices for Managing Email ArchivingGWAVA
July 2013Why You Should Encrypt Email and What Happens if You Don’t?Symantec
July 2013Things to Look for in a Cloud Encryption SolutionOsterman Research
July 2013Practical Methods for Improving AuthenticationSecureKey and VASCO
July 2013The Need for Third-Party Security, Compliance and Other Capabilities in Microsoft Office 365Erado, McAfee, Messaging Architects, Metalogix and Symantec
June 2013File Synchronization and Sharing Market Forecast, 2012-1017Osterman Research
May 2013Best Practices for Managing Information ArchivesAkaibu
May 2013Key Issues in European eDiscoveryImation
May 2013The Importance of Robust Email Security in the Financial Services IndustryEdgewave
May 2013Enterprise Requirements for Secure Exchange of Corporate FilesProofpoint
May 2013The Cost and ROI Advantages of IronKey Workspace W300 for Windows to GoImation
May 2013The Case for Hosted ExchangeRackspace Hosting
April 2013Managing BYOD in Corporate EnvironmentsActiance, Armor5, BlackBerry, Box, Colligo, GWAVA and Smarsh
February 2013Best Practices for Messaging, Collaboration, Security, Archiving and Encryption in the CloudDell, GWAVA, Sendmail and Smarsh
January 2013The Need for IT to Get in Front of the BYOD ProblemDell
December 2012File Archiving: The Next Big Thing or Just Big?Autonomy, EMC, OpenText, Proofpoint and Smarsh
November 2012Achieving Rapid Payback With Mobile Device ManagementOsterman Research
November 2012Assessing the Benefits of Cloud Computing for Small Businesses in AfricaMynextMail
October 2012Why Securing Communications and Content is a Critical Best PracticeCoolrock Software, DataMotion and Proofpoint
October 2012Improving SharePoint Use and GovernanceAzaleos and Symantec
September 2012Key Issues in eDiscoveryAutonomy, C2C, Globanet, GWAVA and Imation
July 2012Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable for the ChannelSonian
July 2012How the Cloud Can Make Government Archiving More Secure and Less ExpensiveSonian
July 2012The Need for Enterprise-Grade File Sharing and SynchronizationAccellion, Email2 and YouSendIt
June 2012A Better Method of AuthenticationConfident Technologies
June 2012Mobile Devices in the Enterprise: MDM Usage and Adoption TrendsAzaleos
June 2012Putting IT Back in Control of BYODAccellion, Colligo Networks, Edgewave, HyperOffice, McAfee and YouSendIt
May 2012What is the Total Value of a Hosted PBX?Intermedia
May 2012Why Third-Party Archiving is Still Necessary in Exchange 2010EMC, Mimecast and Symantec
April 2012Why All Organizations Need to Manage and Archive Social MediaActiance, Erado, GWAVA, Smarsh and Socialtext
April 2012Taking a Strategic Approach to Unified Communications: Best-of-Breed vs. Single Vendor SolutionsEsnatech
March 2012Cloud vs. Cloud: Comparing the TCO of Office 365 and Private CloudsAzaleos
February 2012Important Issues for Government Agencies to Consider When Using Social Media and Unified CommunicationsActiance
February 2012Making File Transfer Easier, Compliant and More SecureAccellion, Inc, Attachmate, FileCatalyst and Ipswitch File Transfer
January 2012Why Basic Email Discovery Capabilities are Important For Your BusinessQuest Software
January 2012Why You Need to Consider Cloud-Based Security in 2012AppRiver, GWAVA, Proofpoint and WebTitan
December 2011The Policy Survey Project: Fall 2011Dell, Messaging Architects and Contoural
December 2011Making Office 365 More Secure and CompliantAppRiver, LiveOffice, Proofpoint and Smarsh
December 2011Spam Morphs From a Nuisance to a ThreatAbaca
December 2011Social Media Issues for IIROC-Regulated FirmsActiance
November 2011Information Security Best Practices: Why Classification is KeyTITUS
October 2011Quantifying the Costs and Benefits of Archiving Your Email and Other Electronic ContentArcMail, Daegis/AXS-One, Mimecast, Reed Technology and Smarsh
September 2011How Business Users Can Address the Challenge of Sharing Content Securely, Safely and ReliablyYouSendIt
September 2011How SMBs Can Unleash the Power of the CloudIntermedia
September 2011Understanding the Benefits of Online Backup and Data SynchronizationBackblaze, Rackspace and Trend Micro
August 2011The Risks of Social Media and What Can be Done to Manage ThemCommVault and McAfee
August 2011Communication, Collaboration and Content Management Best Practices for Small BusinessesCleartext, McAfee and Safend
July 2011How to Quantify the Costs and Benefits of Web SecurityEdgeWave and McAfee
June 2011The Global Malware Problem: Complacency Can Be CostlyM86 Security
June 2011Pain Free Unified Communications and CollaborationIceWarp
May 2011Archiving Requirements and Considerations for Government AgenciesSmarsh
May 2011Key Issues to Consider in Mobile Device ManagementNotify and Smarsh
April 2011Key E-Discovery Issues to Consider in 2011Dell, EMC, Metalogix, Mimecast and Symantec.cloud
April 2011Why the Cloud is Not Killing Off the On-Premises Email MarketAlt-N Technologies and Sendmail
March 2011Messaging and Web Security Best Practices for 2011 and BeyondEdgewave, GFI, SpamTitan, Symantec.cloud and Websense
February 2011Why Your Organization Needs to Implement DLPSafend
February 2011Why You Need to Eliminate False Positives in Your Email SystemTrustSphere
January 2011The Impact of New Communications for Firms in the Energy IndustryActiance
December 2010Messaging Best Practices for 2011DataMotion, FaceTime and Global Relay
December 2010The Importance of Email ContinuityGoogle, LiveOffice, Neverfail and Quest Software
December 2010The Growing Challenges of Compliance in a Mobile WorldTextGuard
December 2010The Cost Benefits of the Cloud are More About Real Estate Than ITOsterman Research
November 2010The Case for Social Media Management and ArchivingFaceTime and Smarsh
November 2010Web Archiving: The Next Phase in the Evolution of ArchivingReed Tech Web Archiving Services, a member of the LexisNexis Group
November 2010Best Practices for Managing Financial Services ComplianceSymantec Hosted Services
November 2010Moving Your Email Security to the CloudZEROSPAM
October 2010What Are Your Obligations to Retain Email and Other Electronic Content?Astaro, C2C, The Linux Box and Proofpoint
October 2010Why Email Archiving is a Critical Best PracticeSonasoft
September 2010The Role of Third-Party Archiving in Exchange 2010Iron Mountain
September 2010Overcoming Key File Transfer ProblemsIpswitch File Transfer
September 2010Why You Need a Better Way to Manage Email AttachmentsYouSendIt
September 2010The Threat Landscape: How You Can Protect Your OrganizationMcAfee
August 2010Educating Decision Makers About the Need for EncryptionDataMotion, Smarsh and ZixCorp
August 2010Taking a New Look at SharePoint: Collaboration Benefits and IT GotchasAzaleos
July 2010Why You Need to Focus on Social Networking in Your CompanyFaceTime and Smarsh
June 2010Why Your Organization Needs to Implement DLPBlue Coat Systems
May 2010The Role of Email Archiving in the SMB MarketJatheon
May 2010Convincing Decision Makers of the Critical Need for ArchivingGoogle, Iron Mountain Mimosa Systems and Mimecast
May 2010The Need to Archive Social Networking ContentLiveOffice
April 2010Why Now is the Time to Consider an Alternative Email SystemIpswitch and Mirapoint
April 2010The Case for Outbound Content ManagementCertiVox, GWAVA, Messaging Architects, Safend, Sendmail, Symantec Hosted Services, Titus Labs, YouSendIt and ZixCorp
February 2010Why Hosted Security Makes Sense for Your CompanyWebroot Software
February 2010The Critical Need to Secure the Web in Your CompanyBlue Coat, FaceTime Communications, St. Bernard Software, Trend Micro and Webroot Software
January 2010The Concise Guide to E-DiscoveryGoogle, Guidance Software, Mimosa Systems, Recommind, Sherpa Software and Smarsh
January 2010The Importance of Mobile Messaging ComplianceTextGuard
November 2009Why You Should Consider Migrating to Hosted Exchange 2010Intermedia
November 2009The Case for Hosted Exchange123Together, Electric Mail and Rackspace Hosting
November 2009The Case for Third-Party Archiving in Microsoft Exchange Server 2010Estorian, Google, LiveOffice, Quest Software and Sunbelt Software
September 2009The Impact of New Communication Tools for Financial Services FirmsFaceTime
September 2009Key Issues in Improving Your Messaging CapabilitiesColdSpark
August 2009Portal Authentication: A Balancing Act Between Security, Usability and CompliancePistolStar
August 2009A Guide to Managing Documents in Today’s Law FirmsWorkshare
August 2009A Guide to Document Comparison and Security for Corporate LegalWorkshare
August 2009The Case for Lotus FoundationsIBM
August 2009Authentication in the Enterprise: Current and Changing RequirementsPistolStar
August 2009The Strategic Advantage of Cloud-Based Email and BlackBerry ServicesUSA.NET
July 2009The Critical Need for Encrypted Email and File Transfer SolutionsDataMotion, Echoworx, Electric Mail, PGP Corporation, Proofpoint, Smarsh and Webroot Software
June 2009Why You Should Consider an Alternative Email PlatformGecad Technologies
May 2009Comparing the Cost of Email SystemsNovell
May 2009The ROI Case for Alternative Messaging SystemsIpswitch
May 2009Choosing the Right Archiving SolutionC2C, HP, Ipswitch, Mirapoint and Quest Software
May 2009Key Issues in Selecting an Email Disaster Recovery and Business Continuity SolutionAzaleos and Neverfail
April 2009Reducing Messaging & Web Security Costs With Managed ServicesMX Logic
April 2009The Growing Importance of Microsoft SharePointAzaleos
March 2009Why You Need to Focus on Modernizing Your Email InfrastructureSendmail
March 2009IT Best Practices: To Support or Not Support Consumer-Owned SmartphonesZenprise
February 2009Using SaaS to Reduce the Costs of Email SecurityProofpoint
January 2009Why You Need an Intelligent File Transfer SolutionBiscom
January 2009The Need for SharePoint SecurityTrend Micro
January 2009Comparing Leading Email and SharePoint Security SolutionsTrend Micro
January 2009An Analysis of Sendio’s Anti-Spam OfferingSendio
January 2009Results of an Osterman Research Survey on Web SecurityPurewire
January 2009Instant Access to Information: The Return-on-Investment Case for Information ManagementDonnell Systems
December 2008Why You Should Consider Deploying Software AppliancesTrend Micro
December 2008Recession Proof Your Business Email Through OutsourcingUSA.NET
November 2008The Need to Unify Your Business InformationPointCross
October 2008Why Archiving is So Important in GroupWise EnvironmentsGWAVA and MessageSolution
October 2008Why Your Organization Should Consider Hosted ApplicationsGoogle 
October 2008Why Your Organization Needs to Implement DLPBlue Coat Systems, Code Green Networks, Smarsh and Trend Micro
October 2008Why Reducing File Size Should Be a Top Priority in Your OrganizationNXPowerLite 
September 2008A Review of MessageSolution Enterprise Email Archive and Enterprise File ArchiveMessageSolution 
September 2008Why You Need to Consider VirtualizationTrend Micro 
July 2008Why You Should Implement Messaging ArchivingPlasmon
July 2008 Focusing on Value-Added Services in a Hosted Messaging EnvironmentEveryone.net
July 2008 Should You Install Messaging Security Software on Your Exchange Server?Sunbelt Software 
June 2008The Growing Importance of E-Discovery on Your BusinessBarracuda Networks, C2C, CommVault, Global Relay, Google, GWAVA, Recommind, Smarsh and Trend Micro 
June 2008Reducing the Cost of MessagingMailtrust
June 2008IT Infrastructure Management: How to Tame the BeastDorado Software 
April 2008The Advantages of a Hosted Security ModelWebsense 
April 2008 What to Ask When Evaluating Messaging Security SystemsSunbelt Software 
April 2008 The Impact of Messaging and Web ThreatsAlt-N Technologies, Barracuda Networks, Commtouch, McAfee,Mimecast, Reflexion Networks, St. Bernard Software, Sunbelt Software and Trend Micro 
January 2008Why Should You Archive Your Email With a Hosted Service?Sonian 
January 2008A Guide to Messaging ArchivingArcMail Technology, Google, LiveOffice, Mimecast, Mimosa Systems, Quest Software, Smarsh, St. Bernard Software, Sunbelt Software andWaterford Technologies 
October 2007Key Issues in Messaging MobilityUSA.NET 
September 2007Archiving Email for Compliance and Competitive AdvantageArcMail Technology 
September 2007 Reducing the Load on Email ServersArcMail Technology 
August 2007A Guide to Understanding Hosted and Managed Messaging 123Together, Apptix, Bizcom Web Services, Cobweb Solutions,Concentric, Global Relay, LiveOffice, MailRevive, Postini, Symantec, Trend Micro, USA.NET, USi and ZANTAZ 
July 2007Planning for Improved Email AvailabilityNeverfail 
June 2007Why You Should Be Thinking About ArchivingMX Logic 
June 2007 Solving .PST Management Problems in Microsoft Exchange EnvironmentsSherpa Software 
June 2007Solving Key Management Problems in Lotus Notes/Domino EnvironmentsSherpa Software 
June 2007Why Web 2.0 is Critical to Your BusinessSocialtext 
June 2007Emerging Trends in Fighting SpamSymantec 
June 2007The Benefits of Deploying Powerful Search CapabilitiesOpenfind 
May 2007Why Your Organization Needs to Focus on Outbound ContentBorderWare, CertifiedMail, DYS Analytics, Mimosa Systems,Mirapoint, Postini, Symantec and Workshare 
April 2007Why You Should Consider Using a Hosted Messaging ProviderUSi 
March 2007 The Federal Rules of Civil Procedure, E-mail Discovery and YouLucid8 
February 2007 Why Organizations Need to Focus on Outbound SecurityReconnex 
January 2007The Advantages of Using Traffic-Shaping Techniques to Control SpamMailChannels
January 2007The Impact of the New FRCP Amendments on Your BusinessArcmail Technology, Apptix, Commvault, FaceTime, Fortiva,GFI, Hitachi Data Systems, Infocrossing, LiveOffice, Plasmon,Postini and Smarsh
October 2006ROI of Mass Notification3n 
October 2006Key Factors in Selecting a GroupWise Archiving SolutionMessaging Architects 
October 2006Why You Should Consider a Hosted Messaging Archiving SolutionMessageLabs 
September 2006Why You Should Consider a Hosted Messaging Archiving SolutionFortiva
September 2006Using Managed Services to Protect Your Business from Web-Based ThreatsScanSafe 
May 2006The Growing Need to Archive EmailWaLa Systems 
April 2006The New Realities of Email GovernanceSendmail 
January 2006How Small Business is Solving the Spam ProblemDigiPortal 
November 2005How Online Demonstrations Can Make Purchasing Software EasierCitrix 
October 2005The Advantage of an Appliance-Based File Transfer SystemAccellion 
September 2005Password Management Issues in Notes/Domino EnvironmentsPistolStar 
September 2005 Moving Beyond FTP for Large File TransfersAccellion 
July 2005Secure File Transfer as a Core Business ProcessAccellion 
July 2005The Need for a Better Way to Send Files and AttachmentsAccellion
May 2005The Impact of Sarbanes-Oxley on Data RetentionFrontBridge Technologies
May 2005Email Archiving Without SoftwareOsterman Research
May 2005The Value of Using the Right Collaboration TechnologySiteScape
May 2005Critical Success Factors for Deploying Real-Time CollaborationSiteScape
April 2005Addressing IT Compliance Challenges with Backup and Archiving TechnologiesVERITAS
March 2005Messaging in the Healthcare IndustryVircom
February 2005The Need for a New Paradigm in Managing Exchange EnvironmentsMimosa Systems
February 2005Critical Decision Factors for Messaging ManagementFrontBridge Technologies
October 2004The Advantages of Using a Managed Service Provider to Protect Your Messaging SystemMX Logic 
October 2004A Comparative Analysis of Leading Anti-Spam Solutions  
September 2004Managing IM and P2P Threats in the EnterpriseFaceTime 
August 2004Secure eMessaging: Analyzing the Total Cost of OwnershipZixCorp 
June 2004Toward More Efficient Document DeliveryAccellion 
March 2004The Role of Attachment Caching in E-Mail Server ConsolidationAccellion 
June 2003The Impact of Regulations on Email Archiving RequirementsIMR 
June 2003 How a Service Provider Can Eliminate Spam in the EnterpriseFrontBridge Technologies
April 2003 Current Email and Archiving Practices in the EnterpriseLegato
April 2003 Messaging Cost of Ownership in Service Provider EnvironmentsRockliffe 
September 2002 Case Study: Arthritis FoundationUSinternetworking 
March 2002 Case Study: WorldcomSun Microsystems
]]>
775