Osterman Research

  • Osterman Research

    Sep 26, 2019

    Top 5 Data Protection Gaps in Office 365 – Webinar

    Office 365 offers basic protection to deal with some of the things that could damage your data, but there are things it doesn’t protect you from, and there are side effects to some of the optional protection features. An examination of improving data protection. Sponsored by Druva. Continue Reading

    Read More: Top 5 Data Protection Gaps in Office 365 – Webinar
  • Osterman Research

    Sep 25, 2019

    Web & Email Isolation: Why It Matters to Secure Your Organization and End Users – Webinar

    Using web and email isolation technology to ensure the security of critical data, financial systems and other assets. Sponsored by Proofpoint and SecureWorld. Continue Reading

    Read More: Web & Email Isolation: Why It Matters to Secure Your Organization and End Users – Webinar
  • Osterman Research

    Sep 20, 2019

    Adding Third-Party Capabilities to Microsoft 365 – Webinar

    Review of Osterman’s latest research on the performance gaps in Microsoft 365 in the areas of security, archiving, eDiscovery and more. Sponsored by Cyren. Continue Reading

    Read More: Adding Third-Party Capabilities to Microsoft 365 – Webinar
  • Osterman Research

    Sep 17, 2019

    The Evolving Email Threat Landscape – Webinar

    Exploring the evolving email threat landscape, with a focus on the threat of compromised email accounts. Sponsored by Agari. Continue Reading

    Read More: The Evolving Email Threat Landscape – Webinar
  • Osterman Research

    Sep 17, 2019

    Third-Party Code: The Hidden Risk in Your Website – White Paper

    Learn how you can manage risk from third-party code and better protect your applications. Sponsored by PerimeterX. Continue Reading

    Read More: Third-Party Code: The Hidden Risk in Your Website – White Paper
  • Osterman Research

    Sep 16, 2019

    Using Third-Party Solutions With Office 365 – White Paper

    Exploring areas where focused third-party vendors with deep industry and solution experience are able to deliver deeper and better capabilities compared to Microsoft in Office 365. Sponsored by Censornet, Cyren, NetGovern, odix, Proofpoint, Quest Software and Symantec. Continue Reading

    Read More: Using Third-Party Solutions With Office 365 – White Paper
  • Osterman Research

    Aug 23, 2019

    To Automate or Not to Automate Is Not the Question – Where and How Is – Webinar

    Exploring the current state of automation in security, including artificial intelligence and machine learning. Where is the greatest business impact? Sponsored by Skybox Security. Continue Reading

    Read More: To Automate or Not to Automate Is Not the Question – Where and How Is – Webinar
  • Osterman Research

    Aug 20, 2019

    New Methods for Solving Phishing, Business Email Compromise, Account Takeovers and Other Security Threats – White Paper

    The network in most organizations has a dramatically expanded attack surface. There is no longer a defensible perimeter that can fully protect corporate data, and so new approaches, technologies and practices are needed to protect corporate data and finances. Sponsored by Agari, Carbon Black, GoSecure, KnowBe4, MDaemon, Proofpoint, SlashNext, Trend Micro, Trustwave and Zix Continue Reading

    Read More: New Methods for Solving Phishing, Business Email Compromise, Account Takeovers and Other Security Threats – White Paper
  • Osterman Research

    Aug 19, 2019

    The ROI of Security Awareness Training – White Paper

    Discusses the financial justification for deploying a robust security awareness training program and demonstrates the significant return-on-investment (ROI) that can result. Sponsored by CybeReady, Infosec, KnowBe4 and Mimecast. Continue Reading

    Read More: The ROI of Security Awareness Training – White Paper
  • Osterman Research

    Aug 1, 2019

    Why Security Must Be Part of the Software Life Cycle – Webinar

    Why current approaches to security management are no longer adequate, and why security should be part of the software development process. Sponsored by ZeroNorth. Continue Reading

    Read More: Why Security Must Be Part of the Software Life Cycle – Webinar
Previous Page
1 … 19 20 21 22 23 … 27
Next Page

Osterman
Research.

Insightful research that impacts organizations.

  • What we do
  • Our research
  • Clients
  • Privacy policy

  • Blog
  • Press mentions
  • Contact
  • LinkedIn
  • Newsletter

© 2025, Osterman Research Limited. All rights reserved.

 

Loading Comments...