Click on the slide!

Realizing SecureData Potential

Live Webcast!             Join us as we discuss how to realize effective data security across an enterprise.

Click on the slide!

Enabling Risk Based IT Gov

On-Demand               Play now for the key concepts and challenges with IT governance.

Click on the slide!

A Breach Prevention Plan

On-Demand               Play now to gain insights and some key steps to prevent payment card…

Click on the slide!

Best Practices for eGRC

On-Demand               Play now and learn how to implement best practices for eGRC.

Frontpage Slideshow (version 2.0.0) - Copyright © 2006-2008 by JoomlaWorks
Osterman Research Blog
A blog focused on messaging, Web, social networking and collaboration issues, including email, instant messaging, VoIP, Web conferencing and other technologies that help people communicate more efficiently and effectively.

  • What Threats Should You Be Concerned About? (Part 2)
    Last week, I enumerated a list of things that decision makers should be concerned about with regard to potential security holes, focused both on malicious content that might make its way into your organization, as well as for valuable data assets that might make their way out. We continue that list of issues here: Employee […]

  • The Importance of Good Authentication and Data Asset Management
    Stories about the use of easy-to-guess passwords based on common words, consecutive numerical strings, or simply the use of “password” are fairly common. Millions of users, in an effort to make their passwords easy to remember, fall prey to this problem, or they will write their passwords down on sticky notes, not change them periodically, […]

  • How Have Email and Instant Messaging Use Changed Since 2001?
    Osterman Research has been in business nearly 14 years and has tracked the growth and changes in the use of email, instant messaging and other communication tools since our inception. We have focused continually on how individuals and organizations communicate and collaborate using these tools, and how they plan to do so in the future. […]

  • You Don’t Need to Know Everything
    Many years ago when I was early in my career, I worked for one of the leading market research companies in the San Francisco Bay Area. Shortly after I joined the company it was acquired by DRI, a small subsidiary of McGraw-Hill. After the acquisition, a DRI employee was transferred into our offices to serve […]

  • Security 101: Securing the Malware Ingress Points in SMBs
    Our research, as well as that of many other firms, has revealed that malware infiltration has impacted most organizations and that the problem is getting worse over time, particularly for small and mid-sized businesses (SMBs). While it is essential that every potential ingress point for malware be monitored, many organizations have holes in their defenses […]

  • Cost Justifying an Archiving Solution
    There are a number of ways to justify the cost of an archiving solution. We have just published a new white paper in which we present three “before and after” scenarios that will cover a variety of scenarios for archiving and how they can help to reduce corporate costs. Here is one of the examples we […]

  • Preventing Attacks Through the Web
    The Web is a dangerous place. A recent Osterman Research survey found that 73% of mid-sized and large organizations have had malware infiltrate their corporate networks through the Web during the previous 12 months. By contrast, malware has successfully infiltrated through email in 59% of organizations and through social media in 17%. Our data is […]

  • Are you asking – and can you answer – some important questions?
    Obviously, information security and risk management are critical issues for any organization, regardless of its size or the industry in which it participates. But maintaining the security of your information and others’ information that you possess, as well as mitigating the risk associated with data breaches, is difficult and getting tougher all the time. This […]

  • Organizations’ Plans for Archive Migration
    In late May 2014, Osterman Research conducted an in-depth survey of 164 organizations and their archiving system migration plans. We surveyed primarily mid-sized and large organizations across a wide range of industries. Key findings from the research include the following: The typical archiving solution has been in place four years and eight months (median is […]

  • The Next Phase of Email
    Osterman Research conducted a survey during March 2014 with 294 information workers to determine how they employ email, how they manage various information-focused work processes, and the changes they would like to see in these processes. Our research found that according to most corporate decision makers and influencers, email is the single most important application […]

air max pas cher nike air max pas cher air max pas cher nike air max pas cher air max pas cher nike air max pas cher air max pas cher nike air max pas cher air max pas cher nike air max pas cher air max pas cher air max pas cher air max 90 pas cher nike air max pas cher air max pas cher nike tn pas cher nike air max pas cher nike tn nike tn pas cher tn pas cher louboutin pas cher chaussure louboutin pas cher louboutin soldes air max pas cher air max pas cher nike air max pas cher doudoune moncler pas cher doudoune moncler barbour paris barbour paris pas cher hogan outlet hogan outlet online scarpe hogan outlet tiffany outlet tiffany outlet italia air jordan air jordan pas cher jordan pas cher air jordan site officiel