Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

osterman research

Results 1 - 25 of 36Sort Results By: Published Date | Title | Company Name
Published By: Mimecast     Published Date: Oct 17, 2013
This white paper discusses the important issues related to email and Office 365 continuity and offers recommendations for decision makers to consider as they develop their continuity plans. The paper also provides a brief overview of Mimecast, the sponsor of this paper, as well as their relevant solutions.
Tags : 
mimecast, unified email management, osterman research, business continuity, office 265 environments, email reliability, email downtime prevention, growth of office 365, extensive use of email, primary file transport, content management systems, reduced employee productivity, extended productivity loss, it disruption, security management risks, content management risks, email security, security management, data protection
    
Mimecast
Published By: Intralinks     Published Date: Nov 23, 2015
This report focuses on the use of CFSS tools in the workplace, the problems that their use causes, and it offers several recommendations as well as data from an in-depth survey on file-sharing practices conducted by Osterman Research during July 2015.
Tags : 
osterman, enterprise, file sync, share solutions, file-share, cfss, efss, networking, knowledge management, enterprise applications
    
Intralinks
Published By: Intralinks     Published Date: Oct 14, 2015
This report focuses on the use of CFSS tools in the workplace, the problems that their use causes, and it offers several recommendations as well as data from an in-depth survey on file-sharing practices conducted by Osterman Research during July 2015.
Tags : 
osterman, enterprise, file sync, share solutions, file-share, cfss, efss, networking, knowledge management, enterprise applications
    
Intralinks
Published By: IBM     Published Date: Jul 08, 2016
This paper from Osterman Research, explores the origins of the "information problem" many organizations are now facing and presents a detailed discussion of how to calculate your current information costs as well as how to calculate the ROI of an information governance program.
Tags : 
ibm, osterman, roi, big data, data, analytics, information governance, knowledge management, data management, data center
    
IBM
Published By: Mimecast     Published Date: Jun 22, 2015
Read the report now to get the knowledge you need to plan the perfect enterprise-class Office 365 environment.
Tags : 
limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity, compliance, control, data management, business continuity, security management, software compliance
    
Mimecast
Published By: Websense     Published Date: Feb 16, 2010
This paper from Osterman Research highlights the cost savings of hybrid Web security with data loss prevention, and demonstrates how your organization can save time, money, and resources thereby lowering the cost of securing your enterprise. Register to access a complimentary copy of this Osterman Research white paper on the benefits of hybrid Web security and learn more.
Tags : 
tco, websense, web security, osterman, hybrid, security solutions, security management, security policies, web service security, total cost of ownership
    
Websense
Published By: Trend Micro     Published Date: May 03, 2018
Osterman Research wants to make it clear at the outset that we believe Microsoft Office 365 to be a robust and capable platform, one that will serve most organizations well. If your organization is using Office 365, we recommend you continue to do so. If you’re not using it, we recommend you consider it. Microsoft offers a large, varied and growing number of features and functions in Office 365, and at a wide range of price points that will satisfy different markets. Decision makers evaluating the efficacy of Office 365 to meet their business requirements must be aware of its shortcomings in the areas of data protection, archiving, security, encryption, authentication and eDiscovery (among others) covering workloads like Exchange Online, SharePoint Online, OneDrive for Business, Skype for Business, and Azure Active Directory. An awareness of these shortcomings enables decision makers to plan for the mitigations required to assure the proper business performance of Office 365.
Tags : 
    
Trend Micro
Published By: YouSendIt     Published Date: Apr 19, 2012
This white paper provides a brief overview of the trend toward consumerized IT and Osterman Research's recommendations for addressing it.
Tags : 
yousendit, manufacturing, email maketing, ecommerce, healthcare, business managers, email, marketing, collaboration, productivity, revenue, sharing, workforce
    
YouSendIt
Published By: McAfee     Published Date: Nov 19, 2013
This white paper focuses on key issues that organizations should address in the context of cybercrime delivered through email.
Tags : 
osterman research, cybercriminals, mcafee email protection, clickprotect; mcafee email security, monitoring, authentication, email security, hacker detection
    
McAfee
Published By: Druva -AWS     Published Date: Apr 28, 2018
In this report by Osterman Research, you’ll learn about the reducing the limits of Microsoft Office 365 including potential data loss, security risks, missing recovery functions and more.
Tags : 
    
Druva -AWS
Published By: Attachmate     Published Date: Mar 20, 2013
This whitepaper discusses the critical importance of finding a better alternative to email as a file-sharing mechanism. It also provides information on the sponsor of this white paper – Attachmate – and its relevant solutions.
Tags : 
download ftp program, secure sftp, secure large file transfer, managed file transfer, ftp automation, file transfer software, file transfer management, ftp client security, secure dropbox alternatives, enterprise file sharing, enterprise file sharing, automated secure file transfer, automated file transfer, file transfer automation, secure file transfer automation, alternatives to cloud file transfer, secure ftp software, secure ftp automation, filexpress managed file transfer, security
    
Attachmate
Published By: Attachmate     Published Date: Dec 05, 2013
From email to Dropbox and FTP, the file transfer process in most organizations is fraught with risk and simply does not meet most organizations’ corporate governance requirements. The result is that the status quo of file transfer in most organizations can be considered UFT—or Unmanaged File Transfer. What is needed to overcome the problem, therefore, is Managed File Transfer (MFT)—a solution that will enable complete control over content, its lifecycle, access rights to that information, the maintenance of an audit trail, and disposition of data according to corporate governance requirements. This white paper, sponsored by Attachmate and based on a survey conducted by Osterman Research, describes current file transfer practices and the extent of risk that organizations face by not managing file transfer properly. It also explains the benefits of MFT, provides guidelines for evaluating file transfer vendors, and describes FileXpress®, Attachmate’s MFT solution.
Tags : 
filexpress managed file transfer, download ftp program, secure sftp, secure large file transfer, managed file transfer, ftp automation, file transfer software, file transfer management, ftp client security, secure dropbox alternatives, enterprise file sharing, enterprise file sharing, automated secure file transfer, automated file transfer, file transfer automation, secure file transfer automation, alternatives to cloud file transfer, secure ftp software, secure ftp automation, security
    
Attachmate
Published By: Proofpoint     Published Date: Apr 23, 2010
This free email encryption whitepaper from Osterman Research discusses key issues around the encryption of both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption.
Tags : 
proofpoint, encrypted email, secure file transfer, data breach prevention, encryption, email security, intrusion detection, intrusion prevention, email archiving
    
Proofpoint
Published By: Proofpoint     Published Date: Apr 06, 2012
Download this white paper from Osterman Research and Proofpoint to learn how the protection of corporate data from sophisticated malware and phishing attacks is at top of mind of IT decision makers.
Tags : 
cloud-based security, advanced persistent threat, threat protection, cloud security, phishing, malware, anti-malware, security, spam, osterman research, proofpoint, whitepaper, white paper, email archiving, email security, cloud, report, convergence, distributed computing, governance
    
Proofpoint
Published By: Trend Micro SaaS     Published Date: Apr 02, 2009
Gehostete (d. h. webbasierte) Lösungen für Messaging-Sicherheit finden bei Unternehmen aller Größen immer mehr Anklang. Einige haben sich bereits für gehostete Services entschieden, während andere sich langsam mit der Idee anfreunden und nun eher Services von Dritten zur Verwaltung ihrer Sicherheits-infrastruktur nutzen als noch vor einem Jahr. Entscheidungsträger erkennen gerade jetzt im Zuge der aktuellen Wirtschaftskrise, dass gehostete Lösungen für E-Mail-Sicherheit eine kostengünstige Alternative darstellen und gleichzeitig die Sicherheit erhöhen.
Tags : 
trend micro, messaging-sicherheit, lösungen, osterman research, messaging-services, prozentsatz
    
Trend Micro SaaS
Published By: YouSendIt     Published Date: Oct 26, 2011
Mail server management is a balancing act between server performance and user satisfaction. In this white paper from Osterman Research, find out how to improve mail server performance and boost user productivity by integrating a secure, cloud-based file sharing solution into your Microsoft Exchange migration. In addition, learn why integration plays a key role, and how choosing a solution that works seamlessly with Outlook can support how users want to communicate, while reducing the burden on IT. The Osterman white paper is offered courtesy of YouSendIt, the first business content collaboration service to offer an integrated approach for sending, sharing and signing documents online. Download the white paper.
Tags : 
yousendit, technology, email, exchange, windows. osterman research, application integration, business intelligence, business management, windows, messaging, service management
    
YouSendIt
Published By: GFI Software     Published Date: Mar 31, 2011
In this white paper, Osterman Research discusses how the daily occurrence of malware within organizations has become decidedly worse over the past several years.
Tags : 
gfi, sunbelt, messaging, web security best practices, threats, anti spam, anti spyware, anti virus, hacker detection, internet security, web service security, best practices
    
GFI Software
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Data breaches can carry very serious consequences, such as the revelation in February 2008 that that the Hannaford Brothers chain of supermarkets lost more than four million debit and credit card numbers to hackers. The bottom line is that organizations must implement Data Loss Prevention (DLP) systems to protect themselves against the growing array of threats they face from inadvertent and malicious data leaks from email, instant messaging and other systems.
Tags : 
trend micro, data breach, dlp, credit cards, breaches, data breaches, data loss prevention, dlp, hackers, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection, encryption, ip loss, intellectual property, loss of intellectual property, loss of reputation
    
Trend Micro, Inc.
Published By: McAfee     Published Date: Nov 12, 2014
This paper discusses the Office 365 platform, its applicability for organizations of all sizes, and the need for third-party solutions which complement the platform to maintain a strong security posture.
Tags : 
office 365, osterman research, security for office 365, security, best practices
    
McAfee
Published By: McAfee     Published Date: Nov 12, 2014
This paper discusses key issues organizations should address in the context of cybercrime carried out through email, and practical advice on what organizations should do to protect themselves.
Tags : 
osterman research, cybercriminals, cybercrime, email-based malware, spearphishing, short urls, advanced persistent threats, phishing emails, man-in-the-middle attacks, spam, botnets, ransomware, scareware, mcafee email protection, security, it management, business intelligence
    
McAfee
Published By: RSA     Published Date: Sep 19, 2017
The General Data Protection Regulation (GDPR) has been approved by the European Union and demands significant data protection safeguards to be implemented by organizations around the world. Learn how you can successfully prepare for GDPR with advice from Osterman Research.
Tags : 
gdpr, data protection, rsa, rsa security, personal data, privacy, compliance, security policies, data loss prevention
    
RSA
Published By: Sunbelt Software     Published Date: Aug 10, 2007
Sunbelt Software engaged Osterman Research to survey organizations that are using five different email management systems including Barracuda Spam Firewall, GFI MailEssentials, McAfee GroupShield for Microsoft Exchange, and Symantec Brightmail and Sunbelt Ninja Email Security.
Tags : 
email management, email, email security, messaging, spam, anti spam, spyware, anti spyware, virus, anti virus, sunbelt, sunbelt software, architecture, phishing, policy based, policy-based, malware, trojan, trojans, mail server
    
Sunbelt Software
Published By: Sunbelt Software     Published Date: Mar 13, 2008
Messaging archiving can help organizations solve all of these problems and can satisfy a wide range of legal compliance, regulatory, storage management, knowledge management and other problems. This Osterman Research white paper discusses the several reasons to implement a messaging archiving system and provide an overview of Sunbelt Software’s offering focused squarely on the archiving space.
Tags : 
email archiving, pst, archive, archiving, compliance, records storage, sunbelt, knowledge management, storage management, records management, sarbanes oxley compliance
    
Sunbelt Software
Published By: Intermedia     Published Date: Nov 10, 2008
This WebCast introduces Osterman Research who shows and overview of Exchange 2007 and it's growth in terms to help security issues faced by Financial Services and how Exchange 2007 addresses them. Focused on the messaging, Web and collaboration industries. There are also practice areas which include archiving, security, encryption, content management, etc...download to learn more!
Tags : 
intermedia, email security, exchange 2007, archiving, encryption, content management, security, compliance, microsoft exchange
    
Intermedia
Published By: Osterman Research, Inc.     Published Date: Jul 08, 2011
Join Michael Osterman of Osterman Research and GFI Software who will discuss the current state of the dangers of simple Web surfing and what you can do to address these concerns quickly and easily.
Tags : 
web monitoring, gfi, osterman, messaging, directory, email, e-mail, directories, spam, archive, archiving, instant, backup, mail, white, paper, whitepaper, migration, disaster, recovery
    
Osterman Research, Inc.
Previous   1 2    Next    
Search