Quantifying business value – Osterman Research https://ostermanresearch.com Insightful research that impacts organizations Mon, 10 Mar 2025 18:04:44 +0000 en-US hourly 1 https://i0.wp.com/ostermanresearch.com/wp-content/uploads/2021/01/cropped-or-site-icon.png?fit=32%2C32&ssl=1 Quantifying business value – Osterman Research https://ostermanresearch.com 32 32 187703764 Policy-Based Enterprise Endpoint Backup in a OneDrive World – webinar with Micro Focus https://ostermanresearch.com/2021/10/15/webinar-microfocus-backup/ Thu, 14 Oct 2021 23:00:00 +0000 https://ostermanresearch.com/?p=1624 Hosted by Micro Focus

Presented on: October 15, 2021

Endpoints enable productive work and connect employees to the organization’s intellectual property. Endpoints are also a risk and threat vector.

Michael Sampson from Osterman Research and Ed Gavin from Micro Focus offer a candid conversation on the organizations rejecting the implementation of a strong backup approach for endpoints and instead preferring to sync only some data with OneDrive.

In this session you will learn:

  • Why OneDrive is not enough to reduce risk or organizational threats
  • What the current organizational threats are: insider threats, the risk of lost and stolen devices, and ransomware incidents (among others) that continue to threaten the integrity of endpoints
  • How the core drivers for endpoint backup are ones that benefit the organization: data retention, disaster recovery, legal hold and eDiscovery, and counteracting insider threats, among others
  • How hidden productivity loss and help desk costs are realized every time devices are compromised, lost, or stolen

]]>
1624
Security Awareness Training as a Key Element in Changing the Security Culture – multi-client white paper https://ostermanresearch.com/2020/09/30/orwp_0332/ Tue, 29 Sep 2020 23:00:00 +0000 https://ostermanresearch.com/?p=19 Sponsored by Infosec, KnowBe4, MediaPRO and Mimecast

Published September 2020

Executive summary

The goal of any corporate security infrastructure is to protect corporate data, access to on-premises and cloud-based systems, various types of sensitive information like login credentials and customer data, and even the physical assets used to manage networks and endpoints.

The conventional method of accomplishing the objective of securing these assets has been the deployment of various types of security hardware, software and cloud services, including firewalls, endpoint detection and response solutions, anti-virus software, secure email gateways, web application firewalls, and a host of other solutions. Underscoring just how important this approach has been is the fact that at least 2,336 vendorsi of these types of solutions currently operate worldwide, with new entrants joining the market continually.

However, cybersecurity technology can go only so far in protecting an organization. Because bad actors increasingly target users of corporate systems and services, these users must be adequately equipped to deal with a growing variety of threats directed at them, sometimes specifically at their role within the organization. Consequently, good security awareness training is essential in protecting the organization from security threats and the damage they can cause. But the goal of security awareness training should be the development of fundamental change in users – change in the way they think about security – that will translate into the development of a robust security culture.

Includes both our white paper and the associated survey report.

Request a copy

By downloading this white paper, you are opting into receiving marketing communications from Osterman Research and any of the sponsors of this white paper
]]>
19