Click on the slide!

Don't Be Another Headline

Coming Up!               Learn how to implement data security best practices on Nov. 4

Click on the slide!

Are You Securing Hadoop?

On-Demand               Learn about Securing Hadoop by adopting a Data-Centric Approach.

Click on the slide!

Building a Secure, Compliant Cloud.

On-Demand               Play and now learn the key concepts and best practices to build your…

Frontpage Slideshow (version 2.0.0) - Copyright © 2006-2008 by JoomlaWorks
Osterman Research Blog
A blog focused on messaging, Web, social networking and collaboration issues, including email, instant messaging, VoIP, Web conferencing and other technologies that help people communicate more efficiently and effectively.

  • You Don’t Need to Know Everything
    Many years ago when I was early in my career, I worked for one of the leading market research companies in the San Francisco Bay Area. Shortly after I joined the company it was acquired by DRI, a small subsidiary of McGraw-Hill. After the acquisition, a DRI employee was transferred into our offices to serve […]

  • Security 101: Securing the Malware Ingress Points in SMBs
    Our research, as well as that of many other firms, has revealed that malware infiltration has impacted most organizations and that the problem is getting worse over time, particularly for small and mid-sized businesses (SMBs). While it is essential that every potential ingress point for malware be monitored, many organizations have holes in their defenses […]

  • Cost Justifying an Archiving Solution
    There are a number of ways to justify the cost of an archiving solution. We have just published a new white paper in which we present three “before and after” scenarios that will cover a variety of scenarios for archiving and how they can help to reduce corporate costs. Here is one of the examples we […]

  • Preventing Attacks Through the Web
    The Web is a dangerous place. A recent Osterman Research survey found that 73% of mid-sized and large organizations have had malware infiltrate their corporate networks through the Web during the previous 12 months. By contrast, malware has successfully infiltrated through email in 59% of organizations and through social media in 17%. Our data is […]

  • Are you asking – and can you answer – some important questions?
    Obviously, information security and risk management are critical issues for any organization, regardless of its size or the industry in which it participates. But maintaining the security of your information and others’ information that you possess, as well as mitigating the risk associated with data breaches, is difficult and getting tougher all the time. This […]

  • Organizations’ Plans for Archive Migration
    In late May 2014, Osterman Research conducted an in-depth survey of 164 organizations and their archiving system migration plans. We surveyed primarily mid-sized and large organizations across a wide range of industries. Key findings from the research include the following: The typical archiving solution has been in place four years and eight months (median is […]

  • The Next Phase of Email
    Osterman Research conducted a survey during March 2014 with 294 information workers to determine how they employ email, how they manage various information-focused work processes, and the changes they would like to see in these processes. Our research found that according to most corporate decision makers and influencers, email is the single most important application […]

  • Are Extroverts a Threat to Your Corporate Security?
    There has been substantial press coverage about how recruiters examine job candidates’ social media profiles to gain a bit more insight about prospective employees. While the merits and ethics of doing so are subject to substantial debate, there is evidence to suggest that social media can provide some interesting clues about how vulnerable some people […]

  • Some Thoughts on EMC World
    Years ago I worked for Dr. John Ryan, a very bright man who is now a senior manager at Google. He would periodically mention in talks that fighter jets are getting lighter and faster over time, so much so that if you extrapolated their weight and speed far enough into the future, they would eventually […]

  • Messaging in the Healthcare Industry
    We have recently conducted a healthcare-focused survey for Netmail and found that HIPAA violations are just waiting to happen. For example, our research found that: 33% of the organizations we surveyed do not have a data loss prevention (DLP) solution that will monitor outbound email for potential HIPAA/HITECH violations. 20% have not established any anti-spam, […]