WHITE PAPERS

Here are currently available downloads, all available at no charge. For highlights of Osterman Research's surveys, please click here.

White papers published during the past two years are listed by category; white papers older than two years are listed in the Older White Papers section below.


ARCHIVING
Date White Paper Sponsor(s)
April 2015 Third-Party Archiving Solutions Are Still Needed in Exchange 2013 Environments Jatheon
March 2015 The Need for Third-Party Archiving in Office 365 Actiance, CommVault, GFI, GWAVA, OpenText, Sonian and Zovy
February 2015 Archiving 2.0: What Can You Do Next? Trustsphere and Intradyn
July 2014 Using Email, File, Social Media and Mobile Archiving to Grow Your Business Actiance, Authority3, GWAVA and Zovy
March 2014 The Growing Need for Mobile Device Archiving GWAVA, MobileGuard and Smarsh
March 2014 Best Practices for Social Media Management and Archiving GWAVA, Proofpoint and Smarsh
November 2013 The Case For Third Party Archiving in Microsoft® Exchange Environments GWAVA, Messaging Architects, Smarsh and Symantec
July 2013 Best Practices for Managing Email Archiving GWAVA
COMPLIANCE, eDISCOVERY
Date White Paper Sponsor(s)
June 2015 The Role of Third-Party Tools for Office 365 Compliance Good Technology, GWAVA, KeepIT, KnowledgeVault, Mimecast and Smarsh
April 2014 Improving the Compliance Management Process KnowBe4
October 2013 Why eDiscovery Should be a Top Priority for Your Organization HP Autonomy, Proofpoint and Smarsh
EMAIL
Date White Paper Sponsor(s)
December 2014 Evolving Toward the Next Phase of Email (updated) IBM
June 2014 Evolving Toward the Next Phase of Email IBM
ENCRYPTION
Date White Paper Sponsor(s)
August 2014 Email Encryption is an Essential Best Practice ZixCorp
July 2013 Why You Should Encrypt Email and What Happens if You Don't? Symantec
July 2013 Things to Look for in a Cloud Encryption Solution Osterman Research
FILE SYNC AND SHARE, FILE TRANSFER
Date White Paper Sponsor(s)
February 2015 The Need for Enterprise-Grade File Sync and Share South River Technologies
September 2014 Best Practices for File Sharing Citrix, Cleo and ownCloud
October 2014 Improving the Security and Control of Your File Sync and Share Capabilities Intermedia
December 2013 The Need for Enterprise-Grade File Transfer Attachmate
June 2013 File Synchronization and Sharing Market Forecast, 2012-1017 Osterman Research
INFORMATION GOVERNANCE
Date White Paper Sponsor(s)
February 2015 The True ROI of Information Governance Acaveo, GWAVA and IBM
April 2014 Addressing Information Governance Challenges HP Autonomy
February 2014 Developing an Information Governance Strategy Actiance, ownCloud, StorageMadeEasy and Zovy
MICROSOFT OFFICE 365
Date White Paper Sponsor(s)
April 2015 Best Practices for Migrating to Office 365 Akaibu, Barracuda, Globanet, Intel Security, Proofpoint, Symantec and Trend Micro
March 2015 The Need for Third-Party Archiving in Office 365 Actiance, CommVault, GFI, GWAVA, OpenText, Sonian and Zovy
March 2014 Microsoft® Office 365® for the Enterprise: How to Strengthen Security, Compliance and Control McAfee, Mimecast, Sonian and TrustSphere
July 2013 The Need for Third-Party Security, Compliance and Other Capabilities in Microsoft® Office 365® Erado, McAfee, Messaging Architects, Metalogix and Symantec
MIGRATION ISSUES
Date White Paper Sponsor(s)
April 2015 Best Practices for Migrating to Office 365 Akaibu, Barracuda, Globanet, Intel Security, Proofpoint, Symantec and Trend Micro
June 2014 Best Practices for Managing Archive Migrations Archive360, GWAVA, OpenText, QUADROTech, Smarsh and TransVault
February 2014 PST Management: The Eliminate or MIgrate Imperative QUADROTech
February 2014 Email Archive Migration: Opportunities and Risks QUADROTech
SECURITY
Date White Paper Sponsor(s)
June 2015 Using DNS RPZ to Protect Against Web Threats Spamhaus and MX Tools
April 2015 Best Practices for Dealing with Phishing and Next-Generation Malware GWAVA, Intel Security, KnowBe4 and ThreatTrack Security
February 2015 Dealing With the Problem of Targeted Email Attacks Trend Micro
January 2015 How Spamhaus Cost-Effectively Eliminates Spam, Malware and Botnet Threats Spamhaus and MX Tools
July 2014 Why You Need to Protect Your Customers’ Online Experience in Real Time RiskIQ
April 2014 How Online Identity Fraud Harms Businesses and What You Can Do About It E-HAWK
February 2014 Best Practices in Email, Web and Social Media Security SpamTitan and Trustwave
SOCIAL MEDIA
Date White Paper Sponsor(s)
August 2014 Managing Content in Enterprise Social Networks Smarsh
UNIFIED COMMUNICATIONS
Date White Paper Sponsor(s)
     
OTHER ISSUES
Date White Paper Sponsor(s)
May 2015 Better Tools Mean Happier and More Productive Workers PleaseTech
February 2015 The Need for Improved Software Quality (ISC)2
February 2014 Portal Authentication: A Balancing Act Between Security, Usability and Compliance PortalGuard
January 2014 The Critical Need for Messaging Intelligence TrustSphere
October 2013 The Importance of Continuity in Office 365 Environments Mimecast
October 2013 Managing Growth and Driving Down Costs for Microsoft® SharePoint® Accellion, MessageSolution and Metalogix
July 2013 Practical Methods for Improving Authentication SecureKey and VASCO
WHITE PAPERS PUBLISHED BEFORE JUNE 2013
Date White Paper Sponsor(s)
May 2013 Best Practices for Managing Information Archives Akaibu
May 2013 Key Issues in European eDiscovery Imation
May 2013 The Importance of Robust Email Security in the Financial Services Industry EdgeWave
May 2013 Enterprise Requirements for Secure Exchange of Corporate Files Proofpoint
May 2013 The Cost and ROI Advantages of IronKey Workspace W300 for Windows to Go Imation
May 2013 The Case for Hosted Exchange Rackspace Hosting
April 2013 Managing BYOD in Corporate Environments Actiance, Armor5, BlackBerry, Box, Colligo, GWAVA and Smarsh
February 2013 Best Practices for Messaging, Collaboration, Security, Archiving and Encryption in the Cloud Dell, GWAVA, Sendmail and Smarsh
January 2013 The Need for IT to Get in Front of the BYOD Problem Dell
December 2012 File Archiving: The Next Big Thing or Just Big? Autonomy, EMC, OpenText, Proofpoint and Smarsh
November 2012 Achieving Rapid Payback With Mobile Device Management Osterman Research
November 2012 Assessing the Benefits of Cloud Computing for Small Businesses in Africa MynextMail
October 2012 Why Securing Communications and Content is a Critical Best Practice Coolrock Software, DataMotion and Proofpoint
October 2012 Improving SharePoint Use and Governance Azaleos and Symantec
September 2012 Key Issues in eDiscovery Autonomy, C2C, Globanet, GWAVA and Imation
July 2012 Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable for the Channel Sonian
July 2012 How the Cloud Can Make Government Archiving More Secure and Less Expensive Sonian
July 2012 The Need for Enterprise-Grade File Sharing and Synchronization Accellion, Email2 and YouSendIt
June 2012 A Better Method of Authentication Confident Technologies
June 2012 Mobile Devices in the Enterprise: MDM Usage and Adoption Trends Azaleos
June 2012 Putting IT Back in Control of BYOD Accellion, Colligo Networks, EdgeWave, HyperOffice, McAfee and YouSendIt
May 2012 What is the Total Value of a Hosted PBX? Intermedia
May 2012 Why Third-Party Archiving is Still Necessary in Exchange 2010 EMC, Mimecast and Symantec
April 2012 Why All Organizations Need to Manage and Archive Social Media Actiance, Erado, GWAVA, Smarsh and Socialtext
April 2012 Taking a Strategic Approach to Unified Communications: Best-of-Breed vs. Single Vendor Solutions Esnatech
March 2012 Cloud vs. Cloud: Comparing the TCO of Office 365 and Private Clouds Azaleos
February 2012 Important Issues for Government Agencies to Consider When Using Social Media and Unified Communications Actiance
February 2012 Making File Transfer Easier, Compliant and More Secure Accellion, Inc., Attachmate, FileCatalyst and Ipswitch File Transfer
January 2012 Why Basic Email Discovery Capabilities are Important For Your Business Quest Software
January 2012 Why You Need to Consider Cloud-Based Security in 2012 AppRiver, Proofpoint and SpamTitan
December 2011 The Policy Survey Project: Fall 2011 Dell, Messaging Architects and Contoural
December 2011 Making Office 365 More Secure and Compliant AppRiver, LiveOffice, Proofpoint and Smarsh
December 2011 Spam Morphs From a Nuisance to a Threat Abaca
December 2011 Social Media Issues for IIROC-Regulated Firms Actiance
November 2011 Information Security Best Practices: Why Classification is Key TITUS
October 2011 Quantifying the Costs and Benefits of Archiving Your Email and Other Electronic Content ArcMail, Daegis/AXS-One, Mimecast, Reed Technology and Smarsh
September 2011 How Business Users Can Address the Challenge of Sharing Content Securely, Safely and Reliably YouSendIt
September 2011 How SMBs Can Unleash the Power of the Cloud Intermedia
August 2011 The Risks of Social Media and What Can be Done to Manage Them CommVault and McAfee
August 2011 Communication, Collaboration and Content Management Best Practices for Small Businesses Cleartext, McAfee and Safend
July 2011 How to Quantify the Costs and Benefits of Web Security EdgeWave and McAfee
June 2011 The Global Malware Problem: Complacency Can Be Costly M86 Security
June 2011 Pain Free Unified Communications and Collaboration IceWarp
May 2011 Archiving Requirements and Considerations for Government Agencies Smarsh
May 2011 Key Issues to Consider in Mobile Device Management Notify and Smarsh
April 2011 Key E-Discovery Issues to Consider in 2011 Dell, EMC, Metalogix, Mimecast and Symantec.cloud
April 2011 Why the Cloud is Not Killing Off the On-Premises Email Market Alt-N Technologies and Sendmail
March 2011 Messaging and Web Security Best Practices for 2011 and Beyond Edgewave, GFI, SpamTitan, Symantec.cloud and Websense
February 2011 Why Your Organization Needs to Implement DLP Safend
February 2011 Why You Need to Eliminate False Positives in Your Email System TrustSphere
January 2011 The Impact of New Communications for Firms in the Energy Industry Actiance
December 2010 Messaging Best Practices for 2011 DataMotion, FaceTime and Global Relay
December 2010 The Importance of Email Continuity Google, LiveOffice, Neverfail and Quest Software
December 2010 The Growing Challenges of Compliance in a Mobile World TextGuard
December 2010 The Cost Benefits of the Cloud are More About Real Estate Than IT Osterman Research
November 2010 The Case for Social Media Management and Archiving FaceTime and Smarsh
November 2010 Web Archiving: The Next Phase in the Evolution of Archiving Reed Tech Web Archiving Services, a member of the LexisNexis Group
November 2010 Best Practices for Managing Financial Services Compliance Symantec Hosted Services
November 2010 Moving Your Email Security to the Cloud ZEROSPAM
October 2010 What Are Your Obligations to Retain Email and Other Electronic Content? Astaro, C2C, The Linux Box and Proofpoint
October 2010 Why Email Archiving is a Critical Best Practice SonaSoft
September 2010 The Role of Third-Party Archiving in Exchange 2010 Iron Mountain
September 2010 Overcoming Key File Transfer Problems Ipswitch File Transfer
September 2010 Why You Need a Better Way to Manage Email Attachments YouSendIt
September 2010 The Threat Landscape:  How You Can Protect Your Organization McAfee
August 2010 Educating Decision Makers About the Need for Encryption DataMotion, Smarsh and ZixCorp
August 2010 Taking a New Look at SharePoint: Collaboration Benefits and IT Gotchas Azaleos
July 2010 Why You Need to Focus on Social Networking in Your Company FaceTime and Smarsh
June 2010 Why Your Organization Needs to Implement DLP Blue Coat Systems
May 2010 The Role of Email Archiving in the SMB Market Jatheon
May 2010 Convincing Decision Makers of the Critical Need for Archiving Google, Iron Mountain Mimosa Systems and Mimecast
May 2010 The Need to Archive Social Networking Content LiveOffice
April 2010 Why Now is the Time to Consider an Alternative Email System Ipswitch and Mirapoint
April 2010 The Case for Outbound Content Management CertiVox, GWAVA, Messaging Architects, Safend, Sendmail, Symantec Hosted Services, Titus Labs, YouSendIt and ZixCorp
February 2010 Why Hosted Security Makes Sense for Your Company Webroot Software
February 2010 The Critical Need to Secure the Web in Your Company Blue Coat, FaceTime Communications, St. Bernard Software, Trend Micro and Webroot Software
January 2010 The Concise Guide to E-Discovery Google, Guidance Software, Mimosa Systems, Recommind, Sherpa Software and Smarsh
January 2010 The Importance of Mobile Messaging Compliance TextGuard
November 2009 Why You Should Consider Migrating to Hosted Exchange 2010 Intermedia
November 2009 The Case for Hosted Exchange 123Together, Electric Mail and Rackspace Hosting
November 2009 The Case for Third Party Archiving in Microsoft® Exchange Server 2010 Estorian, Google, LiveOffice, Quest Software and Sunbelt Software
September 2009 The Impact of New Communication Tools for Financial Services Firms FaceTime
September 2009 Key Issues in Improving Your Messaging Capabilities ColdSpark
August 2009 Portal Authentication: A Balancing Act Between Security, Usability & Compliance PistolStar
August 2009 A Guide to Managing Documents in Today's Law Firms Workshare
August 2009 A Guide to Document Comparison and Security for Corporate Legal Workshare
August 2009 The Case for Lotus Foundations IBM
August 2009 Authentication in the Enterprise: Current and Changing Requirements PistolStar
August 2009 The Strategic Advantage of Cloud-Based Email and BlackBerry Services USA.NET
July 2009 The Critical Need for Encrypted Email and File Transfer Solutions DataMotion, Echoworx, Electric Mail, PGP Corporation, Proofpoint, Smarsh and Webroot Software
June 2009 Why You Should Consider an Alternative Email Platform Gecad Technologies
May 2009 Comparing the Cost of Email Systems Novell
May 2009 The ROI Case for Alternative Messaging Systems Ipswitch
May 2009 Choosing the Right Archiving Solution C2C, HP, Ipswitch, Mirapoint and Quest Software
May 2009 Key Issues in Selecting an Email Disaster Recovery and Business Continuity Solution Azaleos and Neverfail
April 2009 Reducing Messaging & Web Security Costs With Managed Services MX Logic
April 2009 The Growing Importance of Microsoft SharePoint Azaleos
March 2009 Why You Need to Focus on Modernizing Your Email Infrastructure Sendmail
March 2009 IT Best Practices: To Support or Not Support Consumer-Owned Smartphones Zenprise
February 2009 Using SaaS to Reduce the Costs of Email Security Proofpoint
January 2009 Why You Need an Intelligent File Transfer Solution Biscom
January 2009 The Need for SharePoint Security Trend Micro
January 2009 Comparing Leading Email and SharePoint Security Solutions Trend Micro
January 2009 An Analysis of Sendio's Anti-Spam Offering Sendio
January 2009 Results of an Osterman Research Survey on Web Security Purewire
January 2009 Instant Access to Information:  The Return-on-Investment Case for Information Management Donnell Systems
December 2008 Why You Should Consider Deploying Software Appliances Trend Micro
December 2008 Recession Proof Your Business Email Through Outsourcing USA.NET
November 2008 The Need to Unify Your Business Information PointCross
October 2008 Why Archiving is So Important in GroupWise Environments GWAVA and MessageSolution
October 2008 Why Your Organization Should Consider Hosted Applications Google
October 2008 Why Your Organization Needs to Implement DLP Blue Coat Systems, Code Green Networks, Smarsh and Trend Micro
October 2008 Why Reducing File Size Should Be a Top Priority in Your Organization NXPowerLite
September 2008 A Review of MessageSolution Enterprise Email Archive and Enterprise File Archive MessageSolution
September 2008 Why You Need to Consider Virtualization Trend Micro
July 2008 Why You Should Implement Messaging Archiving Plasmon
July 2008 Focusing on Value-Added Services in a Hosted Messaging Environment Everyone.net
July 2008 Should You Install Messaging Security Software on Your Exchange Server? Sunbelt Software
June 2008 The Growing Importance of E-Discovery on Your Business Barracuda Networks, C2C, CommVault, Global Relay, Google, GWAVA, Recommind, Smarsh and Trend Micro
June 2008 Reducing the Cost of Messaging Mailtrust
June 2008 IT Infrastructure Management:  How to Tame the Beast Dorado Software
April 2008 The Advantages of a Hosted Security Model Websense
April 2008 What to Ask When Evaluating Messaging Security Systems Sunbelt Software
April 2008 The Impact of Messaging and Web Threats Alt-N Technologies, Barracuda Networks, Commtouch, McAfee, Mimecast, Reflexion Networks, St. Bernard Software, Sunbelt Software and Trend Micro
January 2008 Why Should You Archive Your Email With a Hosted Service? Sonian
January 2008 A Guide to Messaging Archiving ArcMail Technology, Google, LiveOffice, Mimecast, Mimosa Systems, Quest Software, Smarsh, St. Bernard Software, Sunbelt Software and Waterford Technologies
October 2007 Key Issues in Messaging Mobility USA.NET
September 2007 Archiving Email for Compliance and Competitive Advantage ArcMail Technology
September 2007 Reducing the Load on Email Servers ArcMail Technology
August 2007 A Guide to Understanding Hosted and Managed Messaging 123Together, Apptix, BizCom Web Services, Cobweb Solutions, Concentric, Global Relay, LiveOffice, MailRevive, Postini, Symantec, Trend Micro, USA.NET, USi, and ZANTAZ
July 2007 Planning for Improved Email Availability Neverfail
June 2007 Why You Should Be Thinking About Archiving MX Logic
June 2007 Solving .PST Management Problems in Microsoft Exchange Environments Sherpa Software
June 2007 Solving Key Management Problems in Lotus Notes/Domino Environments Sherpa Software
June 2007 Why Web 2.0 is Critical to Your Business Socialtext
June 2007 Emerging Trends in Fighting Spam Symantec
June 2007 The Benefits of Deploying Powerful Search Capabilities Openfind
May 2007 Why Your Organization Needs to Focus on Outbound Content BorderWare, CertifiedMail, DYS Analytics, Mimosa Systems,
Mirapoint, Postini, Symantec and Workshare
April 2007 Why You Should Consider Using a Hosted Messaging Provider USi
March 2007 The Federal Rules of Civil Procedure, E-mail Discovery and You Lucid8
February 2007 Why Organizations Need to Focus on Outbound Security Reconnex
January 2007 The Advantages of Using Traffic-Shaping Techniques to Control Spam MailChannels
January 2007 The Impact of the New FRCP Amendments on Your Business Arcmail Technology, Apptix, Commvault, FaceTime, Fortiva,
GFI, Hitachi Data Systems, Infocrossing, LiveOffice, Plasmon, Postini and Smarsh
October 2006 ROI of Mass Notification 3n
October 2006 Key Factors in Selecting a GroupWise Archiving Solution Messaging Architects
October 2006 Why You Should Consider a Hosted Messaging Archiving Solution MessageLabs
September 2006 Why You Should Consider a Hosted Messaging Archiving Solution Fortiva
September 2006 Using Managed Services to Protect Your Business from Web-Based Threats ScanSafe
May 2006 The Growing Need to Archive Email WaLa Systems
April 2006 The New Realities of Email Governance Sendmail
January 2006 How Small Business is Solving the Spam Problem DigiPortal
November 2005 How Online Demonstations Can Make Purchasing Software Easier Citrix
October 2005 The Advantage of an Appliance-Based File Transfer System Accellion
September 2005 Password Management Issues in Notes/Domino Environments PistolStar
September 2005 Moving Beyond FTP for Large File Transfers Accellion
July 2005 Secure File Transfer as a Core Business Process Accellion
July 2005 The Need for a Better Way to Send Files and Attachments Accellion
May 2005 The Impact of Sarbanes-Oxley on Data Retention FrontBridge Technologies
May 2005 Email Archiving Without Software Osterman Research
May 2005 The Value of Using the Right Collaboration Technology SiteScape
May 2005 Critical Success Factors for Deploying Real-Time Collaboration SiteScape
April 2005 Addressing IT Compliance Challenges with Backup and Archiving Technologies VERITAS
March 2005 Messaging in the Healthcare Industry Vircom
February 2005 The Need for a New Paradigm in Managing Exchange Environments Mimosa Systems
February 2005 Critical Decision Factors for Messaging Management FrontBridge Technologies
October 2004 The Advantages of Using a Managed Service Provider to Protect Your Messaging System MX Logic
October 2004 A Comparative Analysis of Leading Anti-Spam Solutions  
September 2004 Managing IM and P2P Threats in the Enterprise FaceTime
August 2004 Securing eMessaging:  Analyzing the Total Cost of Ownership ZixCorp
June 2004 Toward More Efficient Document Delivery Accellion
March 2004 The Role of Attachment Caching in E-Mail Server Consolidation Accellion
June 2003 The Impact of Regulations on Email Archiving Requirements IMR
June 2003 How a Service Provider Can Eliminate Spam in the Enterprise FrontBridge Technologies
April 2003 Current Email and Archiving Practices in the Enterprise Legato
April 2003 Messaging Cost of Ownership in Service Provider Environments Rockliffe
September 2002 Case Study: Arthritis Foundation USinternetworking
March 2002 Case Study: Worldcom Sun Microsystems


  
BACK TO TOP

 

©2001-2014 Osterman Research, Inc.
All rights reserved.