WHITE PAPERS

Here are currently available downloads, all available at no charge.
For highlights of Osterman Research's surveys, please click here.

Please click on a link below to browse our white papers by focus area:
  
Alternative Messaging Platforms
Archiving and Related Issues
Authentication
Classification
Collaboration
Disaster Recovery / Business Continuity
Electronic Discovery
Encryption
Energy
Financial Services
Government
Healthcare

Legal

Managed File Transfer
Messaging Total Cost of Ownership
Messaging Servers
Microsoft SharePoint
Mobile Messaging
Policy Issues
SaaS / Cloud Computing
Security
Social Media
Telephony
Unified Communications
Virtualization
Other Issues (including BYOD)

    

LATEST WHITE PAPERS
How Online Identity Fraud Harms Businesses and What You Can Do About It

April 2014 (sponsored by E-HAWK)

Improving the Compliance Management Process
April 2014 (sponsored by KnowBe4)

Addressing Information Governance Challenges
April 2014 (sponsored by HP Autonomy)

The Growing Need for Mobile Device Archiving
March 2014 (sponsored by GWAVA, MobileGuard and Smarsh)

Best Practices for Social Media Management and Archiving
March 2014 (sponsored by GWAVA, Proofpoint and Smarsh)

Microsoft® Office 365® for the Enterprise: How to Strengthen Security, Compliance and Control
March 2014 (sponsored by McAfee, Mimecast, Sonian and TrustSphere)

Portal Authentication: A Balancing Act Between Security, Usability and Compliance
February 2014 (sponsored by PortalGuard)

Email Archive Migration: Opportunities and Risks
February 2014 (sponsored by QUADROTech)

PST Management: The Eliminate or MIgrate Imperative
February 2014 (sponsored by QUADROTech)

Developing an Information Governance Strategy
February 2014 (sponsored by Actiance, ownCloud, Rand Secure Data, StorageMadeEasy)

Best Practices in Email, Web and Social Media Security
February 2014 (sponsored by SpamTitan and Trustwave)

The Critical Need for Messaging Intelligence
January 2014 (sponsored by TrustSphere)

The Need for Enterprise-Grade File Transfer
December 2013 (sponsored by Attachmate)

The Case For Third Party Archiving in Microsoft® Exchange Environments
November 2013 (sponsored by GWAVA, Messaging Architects, Smarsh and Symantec)

The Importance of Continuity in Office 365 Environments
October 2013 (sponsored by Mimecast)

Why eDiscovery Should be a Top Priority for Your Organization
October 2013 (sponsored by GWAVA, HP Autonomy, Proofpoint and Smarsh)

Managing Growth and Driving Down Costs for Microsoft® SharePoint®
October 2013 (sponsored by Accellion, MessageSolution and Metalogix)

The Importance of File Archiving
September 2013 (sponsored by HP Autonomy, Mimecast and Symantec)

Why You Should Encrypt Email and What Happens if You Don't?
July 2013 (sponsored by Symantec)

Best Practices for Managing Email Archiving
July 2013 (sponsored by GWAVA)

Things to Look for in a Cloud Encryption Solution
July 2013 (sponsored internally by Osterman Research
)

The Need for Third-Party Security, Compliance and Other Capabilities in Microsoft® Office 365®
July 2013 (sponsored by Erado, McAfee, Messaging Architects, Metalogix and Symantec)

Practical Methods for Improving Authentication
July 2013 (sponsored by SecureKey and VASCO)

File Synchronization and Sharing Market Forecast, 2012-1017
June 2013

BACK TO TOP


Alternative Messaging Platforms
Messaging Best Practices for 2011
December 2010
(sponsored by DataMotion, FaceTime and Global Relay)

Why Now is the Time to Consider an Alternative Email System
April 2010
(sponsored by Ipswitch and Mirapoint)

Why You Should Consider an Alternative Email Platform
June 2009
(sponsored by Gecad Technologies)

The ROI Case for Alternative Messaging Systems
May 2009
(sponsored by Ipswitch)

Why You Need to Focus on Modernizing Your Email Infrastructure
March 2009
(sponsored by Sendmail)

Why You Should Consider Deploying Software Appliances
December 2008
(sponsored by Trend Micro)
  
BACK TO TOP


Archiving and Related Issues
Address Information Governance Challenges
April 2014 (sponsored by HP Autonomy)

The Growing Need for Mobile Device Archiving
March 2014 (sponsored by GWAVA, MobileGuard and Smarsh)

Best Practices for Social Media Management and Archiving
March 2014 (sponsored by GWAVA, Proofpoint and Smarsh)

Email Archive Migration: Opportunities and Risks
February 2014 (sponsored by QUADROTech)

The Case For Third Party Archiving in Microsoft® Exchange Environments
November 2013 (sponsored by GWAVA, Messaging Architects, Smarsh and Symantec)

Best Practices for Managing Email Archiving
July 2013 (sponsored by GWAVA)

Best Practices for Managing Information Archives
May 2013 (sponsored by Akaibu
)

File Archiving: The Next Big Thing or Just Big?
December 2012 (sponsored by Autonomy, EMC, OpenText, Proofpoint and Smarsh
)

Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable for the Channel
July 2012 (sponsored by Sonian)

How the Cloud Can Make Government Archiving More Secure and Less Expensive
July 2012 (sponsored by Sonian)

Why Third-Party Archiving is Still Necessary in Exchange 2010
May 2012 (sponsored by EMC, Mimecast and Symantec)

Quantifying the Costs and Benefits of Archiving Your Email and Other Electronic Content
October 2011 (sponsored by ArcMail, Daegis/AXS-One, Mimecast, Reed Technology and Smarsh)

Archiving Requirements and Considerations for Government Agencies
May 2011 (sponsored by Smarsh)

Web Archiving: The Next Phase in the Evolution of Archiving
November 2010
(sponsored by Reed Tech Web Archiving Services, a member of the LexisNexis Group)

What Are Your Obligations to Retain Email and Other Electronic Content?
October 2010
(sponsored by Astaro, C2C, The Linux Box and Proofpoint)

Why Email Archiving is a Critical Best Practice
October 2010
(sponsored by SonaSoft)

The Role of Third-Party Archiving in Exchange 2010
September 2010
(sponsored by Iron Mountain)

The Role of Email Archiving in the SMB Market
May 2010
(sponsored by Jatheon)

Convincing Decision Makers of the Critical Need for Archiving
May 2010
(sponsored by Google, Iron Mountain Mimosa Systems and Mimecast)

The Need to Archive Social Networking Content
May 2010
(sponsored by LiveOffice)

Choosing the Right Archiving Solution
May 2009
(sponsored by C2C, HP, Ipswitch, Mirapoint and Quest Software)

Why Archiving is So Important in GroupWise Environments
October 2008
(sponsored by GWAVA and MessageSolution)

A Review of MessageSolution Enterprise Email Archive and Enterprise File Archive
September 2008 (sponsored by MessageSolution)

Why You Should Implement Messaging Archiving
July 2008
(sponsored by Plasmon)

The Growing Importance of E-Discovery on Your Business
June 2008
(sponsored by Barracuda Networks, C2C, CommVault, Global Relay, Google, GWAVA, Recommind, Smarsh and Trend Micro)

A Guide to Messaging Archiving
January 2008 (sponsored by ArcMail Technology, Google, LiveOffice, Mimecast, Mimosa Systems, Quest Software, Smarsh, St. Bernard Software, Sunbelt Software and Waterford Technologies)

Archiving Email for Compliance and Competitive Advantage
September 2007
(sponsored by ArcMail Technology)

Reducing the Load on Email Servers
September 2007
(sponsored by ArcMail Technology)

Why You Should Be Thinking About Archiving
June 2007
(sponsored by MX Logic)

The Federal Rules of Civil Procedure, E-mail Discovery and You
March 2007
(sponsored by Lucid8)

The Impact of the New FRCP Amendments on Your Business
January 2007
(sponsored by Arcmail Technology, Apptix, Commvault, FaceTime, Fortiva,
GFI, Hitachi Data Systems, Infocrossing, LiveOffice, Plasmon, Postini and Smarsh)

Key Factors in Selecting a GroupWise Archiving Solution
October 2006
(sponsored by Messaging Architects)

Why You Should Consider a Hosted Messaging Archiving Solution
October 2006
(sponsored by MessageLabs)

Why You Should Consider a Hosted Messaging Archiving Solution
September 2006
(sponsored by Fortiva)

The Growing Need to Archive Email
May 2006
(sponsored by WaLa Systems)
  
The New Realities of Email Governance

April 2006
(sponsored by Sendmail)

The Impact of Sarbanes-Oxley on Data Retention
May
2005 (sponsored by FrontBridge Technologies)
  
Email Archiving Without Software
May
2005 (sponsored by Osterman Research)

Addressing IT Compliance Challenges with Backup and Archiving Technologies
April
2005 (sponsored by VERITAS)

The Need for a New Paradigm in Managing Exchange Environments
February
2005 (sponsored by Mimosa Systems)

The Impact of Regulations on Email Archiving Requirements
June 2003 (sponsored by IMR)

Current Email and Archiving Practices in the Enterprise
April 2003 (sponsored by Legato)
  
BACK TO TOP


Authentication
Portal Authentication: A Balancing Act Between Security, Usability and Compliance

February 2014 (sponsored by PortalGuard)

Practical Methods for Improving Authentication
July 2013 (sponsored by SecureKey and VASCO)

A Better Method of Authentication
June 2012 (sponsored by Confident Technologies)

Authentication in the Enterprise: Current and Changing Requirements
August 2009
(sponsored by PistolStar)

Portal Authentication: A Balancing Act Between Security, Usability & Compliance
August 2009
(sponsored by PistolStar)

Password Management Issues in Notes/Domino Environments
September
2005 (sponsored by PistolStar)
  
BACK TO TOP


Classification
Information Security Best Practices: Why Classification is Key

November 2011 (sponsored by TITUS)

   
BACK TO TOP


Collaboration
The Need to Unify Your Business Information
November 2008
(sponsored by PointCross)

The Value of Using the Right Collaboration Technology
May
2005 (sponsored by SiteScape)
  
Critical Success Factors for Deploying Real-Time Collaboration
May
2005 (sponsored by SiteScape)
  
BACK TO TOP


Disaster Recovery / Business Continuity
The Importance of Continuity in Office 365 Environments
October 2013 (sponsored by Mimecast)

The Importance of Email Continuity
December 2010
(sponsored by Google, LiveOffice, Neverfail and Quest Software)

Key Issues in Selecting an Email Disaster Recovery and Business Continuity Solution
May 2009
(sponsored by Azaleos and Neverfail)

Planning for Improved Email Availability
July 2007
(sponsored by Neverfail)
  
BACK TO TOP


Electronic Discovery
Why eDiscovery Should be a Top Priority for Your Organization
October 2013 (sponsored by HP Autonomy, Proofpoint and Smarsh)

Key Issues in European eDiscovery
May 2013 (sponsored by Imation
)

Key Issues in eDiscovery
September 2012 (sponsored by
Autonomy, C2C, Globanet, GWAVA and Imation)

Why Basic Email Discovery Capabilities are Important For Your Business
January 2012 (sponsored by Quest Software)

Key E-Discovery Issues to Consider in 2011
April 2011 (sponsored by Dell, EMC, Metalogix, Mimecast and Symantec.cloud)

The Concise Guide to E-Discovery
January 2010
(sponsored by Google, Guidance Software, Mimosa Systems, Recommind, Sherpa Software and Smarsh)
  
BACK TO TOP


Encryption
Why You Should Encrypt Email and What Happens if You Don't?

July 2013 (sponsored by Symantec)

Things to Look for in a Cloud Encryption Solution
July 2013 (sponsored internally by Osterman Research
)

Why Securing Communications and Content is a Critical Best Practice
October 2012 (sponsored by Coolrock Software, DataMotion and Proofpoint
)

Educating Decision Makers About the Need for Encryption
August 2010
(sponsored by DataMotion, Smarsh and ZixCorp)

The Critical Need for Encrypted Email and File Transfer Solutions
July 2009
(sponsored by DataMotion, Echoworx, Electric Mail, PGP Corporation, Proofpoint, Smarsh and Webroot Software)
  
BACK TO TOP


Energy
The Impact of New Communications for Firms in the Energy Industry

January 2011
(sponsored by Actiance)
  
BACK TO TOP


Financial Services
The Importance of Robust Email Security in the Financial Services Industry

May 2013 (sponsored by EdgeWave
)

Best Practices for Managing Financial Services Compliance
November 2010
(sponsored by Symantec Hosted Services)

The Impact of New Communication Tools for Financial Services Firms
September 2009
(sponsored by FaceTime)
  
BACK TO TOP


Government
Important Issues for Government Agencies to Consider When Using Social Media and Unified Communications

February 2012 (sponsored by Actiance)

Archiving Requirements and Considerations for Government Agencies
May 2011 (sponsored by Smarsh)

   
BACK TO TOP


Healthcare
Messaging in the Healthcare Industry
March
2005 (sponsored by Vircom)
  
BACK TO TOP


Legal
A Guide to Managing Documents in Today's Law Firms
August 2009
(sponsored by Workshare)

A Guide to Document Comparison and Security for Corporate Legal
August 2009
(sponsored by Workshare)
  
BACK TO TOP


Managed File Transfer, etc.
The Need for Enterprise-Grade File Transfer
December 2013 (sponsored by Attachmate)

File Synchronization and Sharing Market Forecast, 2012-1017
June 2013

Enterprise Requirements for Secure Exchange of Corporate Files
May 2013 (sponsored by Proofpoint
)

The Need for Enterprise-Grade File Sharing and Synchronization
July 2012 (sponsored by Accellion, Email2 and YouSendIt)

Making File Transfer Easier, Compliant and More Secure
February 2012 (sponsored by Accellion, Inc., Attachmate, FileCatalyst and Ipswitch File Transfer)

How Business Users Can Address the Challenge of Sharing Content Securely, Safely and Reliably
September 2011 (sponsored by YouSendIt)

Overcoming Key File Transfer Problems
September 2010 (sponsored by
Ipswitch File Transfer)

Why You Need a Better Way to Manage Email Attachments
September 2010 (sponsored by YouSendIt)

Why You Need an Intelligent File Transfer Solution
January 2009 (sponsored by Biscom)

The Advantage of an Appliance-Based File Transfer System
October
2005 (sponsored by Accellion)

Moving Beyond FTP for Large File Transfers
September
2005 (sponsored by Accellion)
  
Secure File Transfer as a Core Business Process
July
2005 (sponsored by Accellion)
  
The Need for a Better Way to Send Files and Attachments
July
2005 (sponsored by Accellion)

Toward More Efficient Document Delivery
June 2004 (sponsored by Accellion)
  
The Role of Attachment Caching in E-Mail Server Consolidation
March 2004 (sponsored by Accellion)
  
BACK TO TOP


Messaging Total Cost of Ownership
PST Management: The Eliminate or MIgrate Imperative
February 2014 (sponsored by QUADROTech)

The Cost and ROI Advantages of IronKey Workspace W300 for Windows to Go
May 2013 (sponsored by Imation
)

Comparing the Cost of Email Systems
May 2009
(sponsored by Novell)

Reducing the Cost of Messaging
June 2008
(sponsored by Mailtrust)

Securing eMessaging:  Analyzing the Total Cost of Ownership
August 2004 (sponsored by ZixCorp)

Messaging Cost of Ownership in Service Provider Environments
April 2003 (sponsored by Rockliffe)
  
BACK TO TOP


Messaging Servers
Key Issues in Improving Your Messaging Capabilities
September 2009
(sponsored by ColdSpark)

The Case for Lotus Foundations
August 2009
(sponsored by IBM)
  
BACK TO TOP


Microsoft SharePoint
Managing Growth and Driving Down Costs for Microsoft® SharePoint®
October 2013 (sponsored by Accellion, MessageSolution and Metalogix)

Improving SharePoint Use and Governance
October 2012 (sponsored by Azaleos and Symantec
)

Taking a New Look at SharePoint: Collaboration Benefits and IT Gotchas
August 2010
(sponsored by Azaleos)

The Growing Importance of Microsoft SharePoint
April 2009
(sponsored by Azaleos)

The Need for SharePoint Security
January 2009
(sponsored by Trend Micro)

Comparing Leading Email and SharePoint Security Solutions
January 2009
(sponsored by Trend Micro)
  
BACK TO TOP


Mobile Messaging
Achieving Rapid Payback With Mobile Device Management
November 2012 (sponsored internally by Osterman Research
)

Mobile Devices in the Enterprise: MDM Usage and Adoption Trends
June 2012 (sponsored by Azaleos)

Key Issues to Consider in Mobile Device Management
May 2011 (sponsored by Notify and Smarsh)

The Growing Challenges of Compliance in a Mobile World
December 2010 (sponsored by TextGuard)

The Importance of Mobile Messaging Compliance
January 2010 (sponsored by TextGuard)

IT Best Practices: To Support or Not Support Consumer-Owned Smartphones
March 2009
(sponsored by Zenprise)

Key Issues in Messaging Mobility
October 2007
(sponsored by USA.NET)
  
BACK TO TOP


Policy Issues
The Policy Survey Project: Fall 2011
December 2011 (sponsored by Dell, Messaging Architects and Contoural)
  
 
BACK TO TOP


SaaS / Cloud Computing / Hosted Services
Microsoft® Office 365® for the Enterprise: How to Strengthen Security, Compliance and Control
March 2014 (sponsored by McAfee, Mimecast, Sonian and TrustSphere)

The Need for Third-Party Security, Compliance and Other Capabilities in Microsoft® Office 365®
July 2013 (sponsored by Erado, McAfee, Messaging Architects, Metalogix and Symantec)

The Case for Hosted Exchange
May 2013 (sponsored by Rackspace Hosting
)

Best Practices for Messaging, Collaboration, Security, Archiving and Encryption in the Cloud
February 2013 (sponsored by Dell, GWAVA, Sendmail and Smarsh
)

Assessing the Benefits of Cloud Computing for Small Businesses in Africa
November 2012 (sponsored by MynextMail
)

Cloud vs. Cloud: Comparing the TCO of Office 365 and Private Clouds
March 2012 (sponsored by Azaleos)

Making Office 365 More Secure and Compliant
December 2011 (sponsored by AppRiver, LiveOffice, Proofpoint and Smarsh)

How SMBs Can Unleash the Power of the Cloud
September 2011 (sponsored by Intermedia)

Why the Cloud is Not Killing Off the On-Premises Email Market
April 2011 (Alt-N Technologies and Sendmail)

The Cost Benefits of the Cloud are More About Real Estate Than IT
December 2010
(sponsored by Osterman Research)

Moving Your Email Security to the Cloud
November 2010
(sponsored by ZEROSPAM)

Why Hosted Security Makes Sense for Your Company
February 2010
(sponsored by Webroot Software)

Why You Should Consider Migrating to Hosted Exchange 2010
November 2009
(sponsored by Intermedia)

The Case for Hosted Exchange
November 2009
(sponsored by 123Together, Electric Mail and Rackspace Hosting)

The Case for Third Party Archiving in Microsoft® Exchange Server 2010
November 2009
(sponsored by Estorian, Google, LiveOffice, Quest Software and Sunbelt Software)

The Strategic Advantage of Cloud-Based Email and BlackBerry Services
August 2009
(sponsored by USA.NET)

Reducing Messaging & Web Security Costs With Managed Services
April 2009
(sponsored by MX Logic)

Using SaaS to Reduce the Costs of Email Security
February 2009
(sponsored by Proofpoint)

Recession Proof Your Business Email Through Outsourcing
December 2008
(sponsored by USA.NET)

Why Your Organization Should Consider Hosted Applications
October 2008
(sponsored by Google)

Focusing on Value-Added Services in a Hosted Messaging Environment
July 2008
(sponsored by Everyone.net)

The Advantages of a Hosted Security Model
April 2008
(sponsored by Websense)

Why Should You Archive Your Email With a Hosted Service?
January 2008
(sponsored by Sonian)

A Guide to Understanding Hosted and Managed Messaging
August 2007
(sponsored by 123Together, Apptix, BizCom Web Services, Cobweb Solutions, Concentric, Global Relay, LiveOffice, MailRevive, Postini, Symantec, Trend Micro, USA.NET, USi, and ZANTAZ)

Why You Should Consider Using a Hosted Messaging Provider
April 2007
(sponsored by USi)

Using Managed Services to Protect Your Business from Web-Based Threats
September 2006
(sponsored by ScanSafe)

Critical Decision Factors for Messaging Management
February
2005 (sponsored by FrontBridge Technologies)

The Advantages of Using a Managed Service Provider to Protect Your Messaging System
October
2004 (sponsored by MX Logic)
  
BACK TO TOP


Security
How Online Identity Fraud Harms Businesses and What You Can Do About It

April 2014 (sponsored by E-HAWK)

Best Practices in Email, Web and Social Media Security
February 2014 (sponsored by SpamTitan and Trustwave)

Why You Need to Consider Cloud-Based Security in 2012
January 2012 (sponsored by AppRiver, Proofpoint and SpamTitan)

Spam Morphs From a Nuisance to a Threat
December 2011 (sponsored by Abaca)

How to Quantify the Costs and Benefits of Web Security
July 2011 (sponsored by EdgeWave and McAfee)

The Global Malware Problem: Complacency Can Be Costly
June 2011 (sponsored by M86 Security)

Messaging and Web Security Best Practices for 2011 and Beyond
March 2011 (sponsored by Edgewave, GFI, SpamTitan, Symantec.cloud and Websense)

Why Your Organization Needs to Implement DLP
February 2011 (sponsored by Safend)

Why You Need to Eliminate False Positives in Your Email System
February 2011 (sponsored by TrustSphere)

Moving Your Email Security to the Cloud
November 2010
(sponsored by ZEROSPAM)

The Threat Landscape:  How You Can Protect Your Organization
September 2010 (sponsored by McAfee)

Why Your Organization Needs to Implement DLP
June 2010 (sponsored by Blue Coat Systems)

The Case for Outbound Content Management
April 2010 (sponsored by CertiVox, GWAVA, Messaging Architects, Safend, Sendmail, Symantec Hosted Services, Titus Labs, YouSendIt and ZixCorp)

The Critical Need to Secure the Web in Your Company
February 2010 (sponsored by Blue Coat, FaceTime Communications, St. Bernard Software, Trend Micro and Webroot Software)

An Analysis of Sendio's Anti-Spam Offering
January 2009 (sponsored by Sendio)

Results of an Osterman Research Survey on Web Security
January 2009 (sponsored by Purewire)

Why Your Organization Needs to Implement DLP
October 2008
(sponsored by Blue Coat Systems, Code Green Networks, Smarsh and Trend Micro)

Should You Install Messaging Security Software on Your Exchange Server?
July 2008
(sponsored by Sunbelt Software)

What to Ask When Evaluating Messaging Security Systems
April 2008
(sponsored by Sunbelt Software)
  
The Impact of Messaging and Web Threats
April 2008 (sponsored by Alt-N Technologies, Barracuda Networks, Commtouch, McAfee, Mimecast, Reflexion Networks, St. Bernard Software, Sunbelt Software and Trend Micro)

Emerging Trends in Fighting Spam
June 2007
(sponsored by Symantec)

Why Your Organization Needs to Focus on Outbound Content
May 2007
(sponsored by BorderWare, CertifiedMail, DYS Analytics, Mimosa Systems,
Mirapoint, Postini, Symantec and Workshare)

Why Organizations Need to Focus on Outbound Security
February 2007
(sponsored by Reconnex)

The Advantages of Using Traffic-Shaping Techniques to Control Spam
January 2007
(sponsored by MailChannels)

How Small Business is Solving the Spam Problem
January 2006
(sponsored by DigiPortal)

A Comparative Analysis of Leading Anti-Spam Solutions
October
2004
  
Managing IM and P2P Threats in the Enterprise
September
2004 (sponsored by FaceTime)

How a Service Provider Can Eliminate Spam in the Enterprise
June 2003 (sponsored by FrontBridge Technologies)
  
BACK TO TOP


Social Media
Best Practices for Social Media Management and Archiving
March 2014 (sponsored by GWAVA, Proofpoint and Smarsh)

Why All Organizations Need to Manage and Archive Social Media
April 2012 (sponsored by Actiance, Erado, GWAVA, Smarsh and Socialtext)

Social Media Issues for IIROC-Regulated Firms
December 2011 (sponsored by Actiance)

The Risks of Social Media and What Can be Done to Manage Them
August 2011 (sponsored by CommVault and McAfee)

The Case for Social Media Management and Archiving
November 2010 (sponsored by FaceTime and Smarsh)

Why You Need to Focus on Social Networking in Your Company
July 2010 (sponsored by FaceTime and Smarsh)
  
BACK TO TOP


Telephony
What is the Total Value of a Hosted PBX?
May 2012 (sponsored by Intermedia)

Taking a Strategic Approach to Unified Communications: Best-of-Breed vs. Single Vendor Solutions
April 2012 (sponsored by Esnatech)

 
BACK TO TOP


Unified Communications
Pain Free Unified Communications and Collaboration
June 2011 (sponsored by IceWarp)

  
BACK TO TOP


Virtualization
Why You Need to Consider Virtualization
September 2008 (sponsored by Trend Micro)
  
BACK TO TOP


Other Issues
Improving the Compliance Management Process
April 2014 (sponsored by KnowBe4)

Developing an Information Governance Strategy
February 2014 (sponsored by Actiance, ownCloud, Rand Secure Data, StorageMadeEasy)

The Critical Need for Messaging Intelligence
January 2014 (sponsored by TrustSphere)

Managing BYOD in Corporate Environments
April 2013 (sponsored by Actiance, Armor5, BlackBerry, Box, Colligo, GWAVA and Smarsh
)

The Need for IT to Get in Front of the BYOD Problem
January 2013 (sponsored by Dell
)

Putting IT Back in Control of BYOD
June 2012 (sponsored by Accellion, Colligo Networks, EdgeWave, HyperOffice, McAfee and YouSendIt)

Information Security Best Practices: Why Classification is Key
November 2011 (sponsored by TITUS)

Communication, Collaboration and Content Management Best Practices for Small Businesses
August 2011 (sponsored by Cleartext, McAfee and Safend)

Instant Access to Information:  The Return-on-Investment Case for Information Management
January 2009 (sponsored by Donnell Systems)

Why Reducing File Size Should Be a Top Priority in Your Organization
October 2008
(sponsored by NXPowerLite)

IT Infrastructure Management:  How to Tame the Beast
June 2008
(sponsored by Dorado Software)

The Benefits of Deploying Powerful Search Capabilities
June 2007
(sponsored by Openfind)

Why Web 2.0 is Critical to Your Business
June 2007
(sponsored by Socialtext)

Solving Key Management Problems in Lotus Notes/Domino Environments
June 2007
(sponsored by Sherpa Software)

Solving .PST Management Problems in Microsoft Exchange Environments
June 2007
(sponsored by Sherpa Software)

ROI of Mass Notification
October 2006
(sponsored by 3n)

How Online Demonstations Can Make Purchasing Software Easier
November
2005 (sponsored by Citrix)

Case Study: Arthritis Foundation
September 2002 (sponsored by USinternetworking)
  
Case Study: Worldcom
March 2002 (sponsored by Sun Microsystems)
  
BACK TO TOP
 

©2001-2012 Osterman Research, Inc.
All rights reserved.