SELECTED WEBINARS AND REPLAYS

Why Security Must be Part of the Software Lifecycle

July 31, 2019

 

 

 

 

Sponsored by: ZeroNorth

 

What Are You Doing About Office 365 Security?

June 27, 2019

 

 

 

 

 

Sponsored by: Cyren

 

The Critical Role of Endpoint Detection and Response (EDR)

June 26, 2019

 

 

 

 

 

 

Sponsored by: SonicWall 

 

Best Practices for File Governance: An Analyst's View for Keeping Data Safe

May 9, 2019

 

 

 

 

 

 

 

Sponsored by: Micro Focus 

 

 

The Critical Role of Endpoint Detection and Response

April 30, 2019

 

 

 

Sponsored by: Nyotron

 

Securing Your SaaS Landscape

April 3, 2019

 

 

 

 

 

 

 

Sponsored by: SonicWall 

 

Why Your Company Needs Third-Party Solutions for Office 365

February 21, 2019

 

 

 

 

Sponsored by: Egress

 

Archive Your Business Content and Unlock its Potential

January 24, 2019

 

 

 

 

Sponsored by: Archive360

 

10 Proven Security Awareness Tips

December 10, 2018 

 

 

 

Sponsored by: Infosec

 

Best Practices for Implementing Security Awareness Training

November 27, 2018 

 

 

Sponsored by: Mimecast

 

Next-Generation Archiving

November 14, 2018 

 

Sponsored by: Micro Focus

 

Best Practices to Tackle Phishing, Ransomware and Email Fraud

June 12, 2018 

Sponsored by: DomainTools

 

Enterprise Vault Cost Analysis

February 6, 2018 

Sponsored by: Micro Focus

 

Strategies for Archiving in Hybrid Environments

December 7, 2017 

Sponsored by: Micro Focus

 

Managing the Challenge of GDPR: Osterman Research Survey Results

November 3, 2017 

Sponsored by: RSA

 

Osterman Research: Filling in the Gaps in Office 365

July 19, 2017 

Sponsored by: Agari

 

Fake or Real CEO Email?

June 22, 2017

Sponsored by: Trend Micro and MSExchange

 

The Why, the What and the How of the SDDC

May 23, 2017

Sponsored by: McAfee and VMware

 

Strategies for Countering Ransomware, BEC and Spearphishing by Strengthening Your Weakest Link

April 19, 2017

Sponsored by: KnowBe4

 

Updated Trends and Statistics on the Cloud

November 2, 2016

Sponsored by:  dinCloud

 

Demystifying Cloud Encryption: Industry Survey Results
October 13, 2016

 

Sponsored by:  CipherCloud

 

Important Considerations When Migrating Archives to the Cloud

July 12, 2016

Sponsored by:  TransVault

 

Surprises in Your Data Inventory: Seven Stories from Real Companies

May 12, 2016

Sponsored by:  Acaveo

 

Proactive Information Governance for Cyber Security, eDiscovery and Compliance

September 15, 2015

Sponsored by:  HP

 

Better Tools Mean Happier and More Productive Workers

June 4, 2015

Sponsored by:  PleaseTech

 

The True ROI of Information Governance

February 26, 2015

Sponsored by:  GWAVA

 

CloudCON 2014 - Messaging Track

December 11, 2014

Sponsored by:  Voltage Security

 

Countering Web Site and Mobile Threats in Real Time

September 24, 2014

Sponsored by:  RiskIQ

 

The Growing Need for Mobile Device Archiving

February 25, 2014

Sponsored by:  GWAVA

 

Why Social Media Management and Archiving is a Best Practice

February 19, 2014

Sponsored by:  GWAVA

PHONE: +1 206 683 5683


© 2001-2019 Osterman Research, Inc. All rights reserved.