Why Security Must be Part of the Software Lifecycle

July 31, 2019

Sponsored by: ZeroNorth


What Are You Doing About Office 365 Security?

June 27, 2019

Sponsored by: Cyren


The Critical Role of Endpoint Detection and Response (EDR)

June 26, 2019

Sponsored by: SonicWall 


Best Practices for File Governance: An Analyst's View for Keeping Data Safe

May 9, 2019

Sponsored by: Micro Focus 


The Critical Role of Endpoint Detection and Response

April 30, 2019

Sponsored by: Nyotron


Securing Your SaaS Landscape

April 3, 2019

Sponsored by: SonicWall 


Why Your Company Needs Third-Party Solutions for Office 365

February 21, 2019

Sponsored by: Egress


Archive Your Business Content and Unlock its Potential

January 24, 2019

Sponsored by: Archive360


10 Proven Security Awareness Tips

December 10, 2018 

Sponsored by: Infosec


Best Practices for Implementing Security Awareness Training

November 27, 2018 

Sponsored by: Mimecast


Next-Generation Archiving

November 14, 2018 

Sponsored by: Micro Focus


Best Practices to Tackle Phishing, Ransomware and Email Fraud

June 12, 2018 

Sponsored by: DomainTools


Enterprise Vault Cost Analysis

February 6, 2018 

Sponsored by: Micro Focus


Strategies for Archiving in Hybrid Environments

December 7, 2017 

Sponsored by: Micro Focus


Managing the Challenge of GDPR: Osterman Research Survey Results

November 3, 2017 

Sponsored by: RSA


Osterman Research: Filling in the Gaps in Office 365

July 19, 2017 

Sponsored by: Agari


Fake or Real CEO Email?

June 22, 2017

Sponsored by: Trend Micro and MSExchange


The Why, the What and the How of the SDDC

May 23, 2017

Sponsored by: McAfee and VMware


Strategies for Countering Ransomware, BEC and Spearphishing by Strengthening Your Weakest Link

April 19, 2017

Sponsored by: KnowBe4


Updated Trends and Statistics on the Cloud

November 2, 2016

Sponsored by:  dinCloud


Demystifying Cloud Encryption: Industry Survey Results
October 13, 2016


Sponsored by:  CipherCloud


Important Considerations When Migrating Archives to the Cloud

July 12, 2016

Sponsored by:  TransVault


Surprises in Your Data Inventory: Seven Stories from Real Companies

May 12, 2016

Sponsored by:  Acaveo


Proactive Information Governance for Cyber Security, eDiscovery and Compliance

September 15, 2015

Sponsored by:  HP


Better Tools Mean Happier and More Productive Workers

June 4, 2015

Sponsored by:  PleaseTech


The True ROI of Information Governance

February 26, 2015

Sponsored by:  GWAVA


CloudCON 2014 - Messaging Track

December 11, 2014

Sponsored by:  Voltage Security


Countering Web Site and Mobile Threats in Real Time

September 24, 2014

Sponsored by:  RiskIQ


The Growing Need for Mobile Device Archiving

February 25, 2014

Sponsored by:  GWAVA


Why Social Media Management and Archiving is a Best Practice

February 19, 2014

Sponsored by:  GWAVA

PHONE: +1 206 683 5683

© 2001-2019 Osterman Research, Inc. All rights reserved.