Here are our published white papers. Titles shown in purple are available for immediate download; titles shown in black will be sent upon request - please contact us at info@ostermanresearch.com.
Date | White Paper | Sponsor(s) |
February 2019 |
Best Practices for File Governance | Micro Focus |
January 2019 |
Addressing the Top 10 Security Issues Organizations Face | Carbon Black, Dell, KnowBe4, SlashNext and Zix |
January 2019 |
Why Your Company Needs Third-Party Solutions for Office 365 | Agari, Cayosoft, Cyren, Egress Software, NetGovern, Quest, Smarsh, Symantec, TransVault and Zix |
January 2019 |
The Importance of Choosing the Right CASB Solution | Avanan, Forcepoint and SonicWall |
December 2018 |
Data Center Transformation Requires Software-Based Cloud Storage | HubStor and Microsoft |
December 2018 |
Migrating to the Cloud? It's Not as Simple as it Seems | Trusted Data Solutions |
December 2018 |
Why You Should Seriously Consider Web Isolation Technology | Authentic8, Light Point Security and Proofpoint |
December 2018 |
Why You Must Archive Business Content and What You Can Do With It | Archive360, Mimecast and Zix |
December 2018 |
The Critical Need to Deal With Bot Attacks | Cequence Security |
November 2018 |
Best Practices for GDPR and CCPA Compliance | AccessData, Dell EMC, Ipswitch, Micro Focus and Netwrix |
October 2018 |
Best Practices for Implementing Security Awareness Training | InfoSec Institute, KnowBe4 and Mimecast |
August 2018 |
Reducing Risks to Your Salesforce Data: Making the Case for a Third-Party Backup Solution | Druva |
July |
A Buyers’ Guide to SecOps | Carbon Black |
July |
Migrating Email and Archives to Microsoft Platforms | BitTitan, ExchangeSavvy, Gimmal, Micro Focus and Quest |
May |
The GDPR Deadline Has Passed - What Should You Do | Druva |
April |
Best Practices for Protecting Against Phishing, Ransomware and BEC Attacks | Agari, Barracuda, Cofense, DomainTools, KnowBe4, Malwarebytes, Proofpoint, Quest, SonicWall and Trend Micro |
April |
Best Practices for the Next Generation of Content Archiving and Content Services | Dropsuite, HubStor, Smarsh and Viewpointe |
March |
What You Need to Know About the GDPR (eBook) | AccessData, Archive360, Dell EMC, GDPR Clinic, HubStor and RSA |
March |
Supplementing the Limitations in Office 365 | AccessData, Druva, ENow Software, Forcepoint, Netmail, Proofpoint, Trend Micro, Viewpointe, ZEROSPAM and ZL Technologies |
February |
The Procrastinator's Guide to Preparing for the GDPR | Archive360, Dell EMC, Ipswitch, MessageSolution, Mimecast, Proofpoint, Smarsh, StorageMadeEasy, Trustwave and ZL Technologies |
January 2018 |
Understanding the Critical Role of Disaster Recovery | Arcserve |
January 2018 |
Enterprise Vault Cost Analysis | Archive360 and Micro Focus |
January 2018 |
Protecting Corporate Data When Employees Leave Your Company | Proofpoint and RSA |
December 2017 |
Comparing Micro Focus Enterprise Messaging, Office 365, Exchange 2016 and Google G Suite | Micro Focus |
December 2017 |
The State of Privacy for Employee Personal Data | ZL Technologies |
November 2017 |
Best Practices for Securing Social Media and Collaboration Platforms | Actiance, Archive360, Proofpoint and Viewpointe |
October 2017 |
Filling the Gaps in Office 365 | Agari, AppRiver, Commvault, PortalGuard, Proofpoint, RSA, Sonian, Trend Micro, Viewpointe and Zix |
October 2017 |
Actiance, HubStor, Micro Focus, Mimecast, Proofpoint, Smarsh and Viewpointe | |
September 2017 |
Cyren | |
July 2017 |
Securing Office 365: How to Protect Against Targeted Attacks |
Agari |
July 2017 |
Assessing the Total Cost of Ownership for Veritas Enterprise Vault |
Actiance |
July 2017 |
Druva, HPE, KnowBe4, Nuix, Quest, RSA, Storage Made Easy, TITUS and ZL Technologies | |
July 2017 |
Forcepoint, Ipswitch, KnowBe4, Mimecast, Quest, South River Technologies, Spamhaus Technology, Storage Made Easy and Zix | |
June 2017 |
TeleMessage | |
May 2017 |
The Why, the What and the How of the SDDC (Executive summaries of this report are available in English, French, German, Japanese and Brazilian Portuguese) |
McAfee and VMware |
May 2017 |
Deploying and Managing Security in the Cloud | Barracuda, Forcepoint, Proofpoint and RSA |
April 2017 |
Cyber Security in Financial Services: A Complex Threat Requiring a Comprehensive Strategy | CipherCloud, Forcepoint, McAfee, Proofpoint, Smarsh and Wombat Security. |
April 2017 |
Key Issues for eDiscovery and Legal Compliance | Archive360, ArcMail, Barracuda, Exterro, Hewlett Packard Enterprise, Smarsh and Sonian |
March 2017 | The Critical Importance of File Analysis | ZL Technologies |
January 2017 | Techniques for Delaying with Ransomware, Business Email Compromise and Spearphishing | Cyren, Forcepoint, HPE, KnowBe4 and PhishMe |
January 2017 |
GDPR Compliance and Its Impact on Security and Data Protection Programs |
Actiance, CipherCloud, Forcepoint, HPE, janusNET, Mimecast, Sonian and Waterford Technologies |
December 2016 |
Best Practices for Protecting Your Data When Employees Leave Your Company |
Archive360, Druva, Intralinks, OpenText, Sonian, Spanning by Dell EMC, ThinkHR and VMware |
September 2016 |
Best Practices for eDiscovery and Regulatory Compliance inOffice 365 |
Archive360, bluesource, Proofpoint, Smarsh, Sonian |
September 2016 | Best Practices for Dealing With Phishing and Ransomware |
Barracuda, DomainTools, Intel Security, KnowBe4, Proofpoint, Spamhaus and Trustwave |
August 2016 | Important Considerations When Migrating Archives to the Cloud | TransVault |
June 2016 |
Forcepoint |
|
May 2016 |
dinCloud, IBM, Intel Security, Juniper Networks, OpenText Cloud, Red Hat and SME |
|
May 2016 |
Migration to Exchange Online and Office 365: A Step-by-Step Guide |
AppRiver, Archive360, BitTitan, Datto, GWAVA, Hewlett Packard Enterprise, Quest and Zix |
April 2016 |
Next-Generation Archiving: Extracting Intelligence From Your Electronic Archives |
GWAVA, Hewlett Packard Enterprise, Netmail, Smarsh and Sonian |
March 2016 | Best Practices for Social Media Archiving and Security | Actiance, GWAVA and Smarsh |
January 2016 |
The Growing Importance of Archiving Electronic Content for eDiscovery and Other Benefits |
Sonasoft |
January 2016 |
Why Archiving Makes Sense: Key Drivers and Proactive Benefits to Help Justify an Archiving Solution |
Gaggle |
November 2015 |
Echoworx, Metalogix, Mimecast, Proofpoint and ZixCorp |
|
November 2015 |
Bay Dynamics |
|
September 2015 |
Alt-N, DataMotion, Echoworx, HP and Mimecast |
|
August 2015 |
The Critical Need for Enterprise-Grade File Sync and Share Solutions |
AeroFS, CTERA, Intralinks, Netmail, Storage Made Easy and Topia Technology |
August 2015 |
AppRiver, GWAVA, Mimecast and Sonian |
|
July 2015 |
Actiance |
|
June 2015 |
Good Technology, GWAVA, KeepIT, KnowledgeVault, Mimecast and Smarsh |
|
June 2015 |
Spamhaus and MX Tools | |
May 2015 |
PleaseTech | |
April 2015 |
Third-Party Archiving Solutions Are Still Needed in Exchange 2013 Environments |
Jatheon |
April 2015 |
Improving the Compliance Management Process |
KnowBe4 |
April 2015 |
Best Practices for Migrating to Office 365 |
Akaibu, Barracuda, Globanet, Intel Security, Proofpoint, Symantec and Trend Micro |
April 2015 |
Best Practices for Dealing With Phishing and Next-Generation Malware |
GWAVA, Intel Security, KnowBe4 and ThreatTrack Security |
March 2015 | The Need for Third-Party Archiving in Office 365 |
Actiance, CommVault, GFI, GWAVA, OpenText, Sonian and Zovy |
February 2015 | The Need for Improved Software Quality | (ISC)2 |
February 2015 | The True ROI of Information Governance | Acaveo, GWAVA and IBM |
February 2015 | Archiving 2.0: What Can You Do Next? | Trustsphere and Intradyn |
February 2015 | South River Technologies | |
February 2015 | Trend Micro | |
January 2015 |
How Spamhaus Cost-Effectively Eliminates Spam, Malware and Botnet Threats |
Spamhaus and MX Tools |
December 2014 | IBM | |
October 2014 |
Improving the Security and Control of Your File Sync and Share Capabilities |
Intermedia |
September 2014 | Citrix, Cleo and ownCloud | |
August 2014 | Zix | |
August 2014 | Smarsh | |
July 2014 |
Using Email, File, Social Media and Mobile Archiving to Grow Your Business |
Actiance, Authority3, GWAVA, and Zovy |
July 2014 |
Why You Need to Protect Your Customers' Online Experience in Real Time |
RiskIQ |
June 2014 |
Evolving Toward the Next Phase of Email | IBM |
June 2014 |
Best Practices for Managing Archive Migrations |
Archive360, GWAVA, OpenText, QUADROTech, Smarsh and TransVault |
April 2014 |
Addressing Information Governance Challenges | HP Autonomy |
April 2014 |
How Online Identity Fraud Harms Businesses and What You Can Do About It |
E-HAWK |
April 2014 |
KnowBe4 | |
March 2014 | The Growing Need for Mobile Device Archiving | GWAVA, MobileGuard and Smarsh |
March 2014 | Best Practices for Social Media Management and Archiving | GWAVA, Proofpoint and Smarsh |
March 2014 |
Microsoft® Office 365® for the Enterprise: How to Strengthen Security, Compliance and Control |
McAfee, Mimecast, Sonian and TrustSphere |
February 2014 | Developing an Information Governance Strategy |
Actiance, ownCloud, StorageMadeEasy and Zovy |
February 2014 | PST Management: The Eliminate or Migrate Imperative | QUADROTech |
February 2014 | Email Archive Migration: Opportunities and Risks | QUADROTech |
February 2014 | Best Practices in Email, Web and Social Media Security |
SpamTitan and Trustwave |
February 2014 |
Portal Authentication: A Balancing Act Between Security, Usability and Compliance |
PortalGuard |
January 2014 | The Critical Need for Messaging Intelligence | TrustSphere |
December 2013 | The Need for Enterprise-Grade File Transfer | Attachmate |
November 2013 |
The Case For Third Party Archiving in Microsoft® Exchange Environments |
GWAVA, Messaging Architects, Smarsh and Symantec |
October 2013 | The Importance of Continuity in Office 365 Environments | Mimecast |
October 2013 |
Managing Growth and Driving Down Costs for Microsoft® SharePoint® |
Accellion, MessageSolution and Metalogix |
October 2013 | Why eDiscovery Should be a Top Priority for Your Organization |
HP Autonomy, Proofpoint and Smarsh |
September |
The Importance of File Archiving | HP Autonomy, Mimecast and Symantec |
July 2013 |
Best Practices for Managing Email Archiving | GWAVA |
July 2013 |
Why You Should Encrypt Email and What Happens if You Don't? | Symantec |
July 2013 |
Things to Look for in a Cloud Encryption Solution | Osterman Research |
July 2013 |
Practical Methods for Improving Authentication | SecureKey and VASCO |
July 2013 |
The Need for Third-Party Security, Compliance and Other Capabilities in Microsoft® Office 365® |
Erado, McAfee, Messaging Architects, Metalogix and Symantec |
June 2013 |
File Synchronization and Sharing Market Forecast, 2012-1017 | Osterman Research |
May 2013 |
Best Practices for Managing Information Archives | Akaibu |
May 2013 |
Key Issues in European eDiscovery | Imation |
May 2013 |
The Importance of Robust Email Security in the Financial Services Industry |
Edgewave |
May 2013 |
Enterprise Requirements for Secure Exchange of Corporate Files | Proofpoint |
May 2013 |
The Cost and ROI Advantages of IronKey Workspace W300 for Windows to Go |
Imation |
May 2013 |
The Case for Hosted Exchange | Rackspace Hosting |
April 2013 |
Managing BYOD in Corporate Environments |
Actiance, Armor5, BlackBerry, Box, Colligo, GWAVA and Smarsh |
February 2013 |
Best Practices for Messaging, Collaboration, Security, Archiving and Encryption in the Cloud |
Dell, GWAVA, Sendmail and Smarsh |
January 2013 | The Need for IT to Get in Front of the BYOD Problem | Dell |
December 2012 | File Archiving: The Next Big Thing or Just Big? |
Autonomy, EMC, OpenText, Proofpoint and Smarsh |
November 2012 | Achieving Rapid Payback With Mobile Device Management | Osterman Research |
November 2012 |
Assessing the Benefits of Cloud Computing for Small Businesses in Africa |
MynextMail |
October 2012 |
Why Securing Communications and Content is a Critical Best Practice |
Coolrock Software, DataMotion and Proofpoint |
October 2012 | Improving SharePoint Use and Governance | Azaleos and Symantec |
September 2012 | Key Issues in eDiscovery |
Autonomy, C2C, Globanet, GWAVA and Imation |
July 2012 |
Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable for the Channel |
Sonian |
July 2012 |
How the Cloud Can Make Government Archiving More Secure and Less Expensive |
Sonian |
July 2012 |
The Need for Enterprise-Grade File Sharing and Synchronization | Accellion, Email2 and YouSendIt |
June 2012 |
A Better Method of Authentication | Confident Technologies |
June 2012 |
Mobile Devices in the Enterprise: MDM Usage and Adoption Trends | Azaleos |
June 2012 |
Putting IT Back in Control of BYOD |
Accellion, Colligo Networks, Edgewave, HyperOffice, McAfee and YouSendIt |
May 2012 |
What is the Total Value of a Hosted PBX? | Intermedia |
May 2012 |
Why Third-Party Archiving is Still Necessary in Exchange 2010 | EMC, Mimecast and Symantec |
April 2012 |
Why All Organizations Need to Manage and Archive Social Media |
Actiance, Erado, GWAVA, Smarsh and Socialtext |
April 2012 |
Taking a Strategic Approach to Unified Communications: Best-of-Breed vs. Single Vendor Solutions |
Esnatech |
March 2012 |
Cloud vs. Cloud: Comparing the TCO of Office 365 and Private Clouds |
Azaleos |
February 2012 |
Important Issues for Government Agencies to Consider When Using Social Media and Unified Communications |
Actiance |
February 2012 | Making File Transfer Easier, Compliant and More Secure |
Accellion, Inc, Attachmate, FileCatalyst and Ipswitch File Transfer |
January 2012 |
Why Basic Email Discovery Capabilities are Important For Your Business |
Quest Software |
January 2012 | Why You Need to Consider Cloud-Based Security in 2012 |
AppRiver, GWAVA, Proofpoint and WebTitan |
December 2011 | The Policy Survey Project: Fall 2011 |
Dell, Messaging Architects and Contoural |
December 2011 | Making Office 365 More Secure and Compliant |
AppRiver, LiveOffice, Proofpoint and Smarsh |
December 2011 | Spam Morphs From a Nuisance to a Threat | Abaca |
December 2011 | Social Media Issues for IIROC-Regulated Firms | Actiance |
November 2011 | Information Security Best Practices: Why Classification is Key | TITUS |
October 2011 |
Quantifying the Costs and Benefits of Archiving Your Email and Other Electronic Content |
ArcMail, Daegis/AXS-One, Mimecast, Reed Technology and Smarsh |
September 2011 |
How Business Users Can Address the Challenge of Sharing Content Securely, Safely and Reliably |
YouSendIt |
September 2011 | How SMBs Can Unleash the Power of the Cloud | Intermedia |
September 2011 | Understanding the Benefits of Online Backup and Data Synchronization | Backblaze, Rackspace and Trend Micro |
August 2011 | The Risks of Social Media and What Can be Done to Manage Them | CommVault and McAfee |
August 2011 |
Communication, Collaboration and Content Management Best Practices for Small Businesses |
Cleartext, McAfee and Safend |
July 2011 |
How to Quantify the Costs and Benefits of Web Security | EdgeWave and McAfee |
June 2011 |
The Global Malware Problem: Complacency Can Be Costly | M86 Security |
June 2011 |
Pain Free Unified Communications and Collaboration | IceWarp |
May 2011 |
Archiving Requirements and Considerations for Government Agencies |
Smarsh |
May 2011 |
Key Issues to Consider in Mobile Device Management | Notify and Smarsh |
April 2011 |
Key E-Discovery Issues to Consider in 2011 |
Dell, EMC, Metalogix, Mimecast and Symantec.cloud |
April 2011 |
Why the Cloud is Not Killing Off the On-Premises Email Market | Alt-N Technologies and Sendmail |
March 2011 | Messaging and Web Security Best Practices for 2011 and Beyond |
Edgewave, GFI, SpamTitan, Symantec.cloud and Websense |
February 2011 | Why Your Organization Needs to Implement DLP | Safend |
February 2011 | Why You Need to Eliminate False Positives in Your Email System | TrustSphere |
January 2011 |
The Impact of New Communications for Firms in the Energy Industry |
Actiance |
December 2010 | Messaging Best Practices for 2011 |
DataMotion, FaceTime and Global Relay |
December 2010 | The Importance of Email Continuity |
Google, LiveOffice, Neverfail and Quest Software |
December 2010 | The Growing Challenges of Compliance in a Mobile World | TextGuard |
December 2010 | The Cost Benefits of the Cloud are More About Real Estate Than IT | Osterman Research |
November 2010 | The Case for Social Media Management and Archiving | FaceTime and Smarsh |
November 2010 | Web Archiving: The Next Phase in the Evolution of Archiving |
Reed Tech Web Archiving Services, a member of the LexisNexis Group |
November 2010 | Best Practices for Managing Financial Services Compliance | Symantec Hosted Services |
November 2010 | Moving Your Email Security to the Cloud | ZEROSPAM |
October 2010 |
What Are Your Obligations to Retain Email and Other Electronic Content? |
Astaro, C2C, The Linux Box and Proofpoint |
October 2010 | Why Email Archiving is a Critical Best Practice | Sonasoft |
September 2010 | The Role of Third-Party Archiving in Exchange 2010 | Iron Mountain |
September 2010 | Overcoming Key File Transfer Problems | Ipswitch File Transfer |
September 2010 | Why You Need a Better Way to Manage Email Attachments | YouSendIt |
September 2010 | The Threat Landscape: How You Can Protect Your Organization | McAfee |
August 2010 | Educating Decision Makers About the Need for Encryption | DataMotion, Smarsh and ZixCorp |
August 2010 |
Taking a New Look at SharePoint: Collaboration Benefits and IT Gotchas |
Azaleos |
July 2010 |
Why You Need to Focus on Social Networking in Your Company | FaceTime and Smarsh |
June 2010 |
Why Your Organization Needs to Implement DLP | Blue Coat Systems |
May 2010 |
The Role of Email Archiving in the SMB Market | Jatheon |
May 2010 |
Convincing Decision Makers of the Critical Need for Archiving |
Google, Iron Mountain Mimosa Systems and Mimecast |
May 2010 |
The Need to Archive Social Networking Content | LiveOffice |
April 2010 |
Why Now is the Time to Consider an Alternative Email System | Ipswitch and Mirapoint |
April 2010 |
The Case for Outbound Content Management |
CertiVox, GWAVA, Messaging Architects, Safend, Sendmail, Symantec Hosted Services, Titus Labs, YouSendIt and ZixCorp |
February 2010 | Why Hosted Security Makes Sense for Your Company | Webroot Software |
February 2010 | The Critical Need to Secure the Web in Your Company |
Blue Coat, FaceTime Communications, St. Bernard Software, Trend Micro and Webroot Software |
January 2010 | The Concise Guide to E-Discovery |
Google, Guidance Software, Mimosa Systems, Recommind, Sherpa Software and Smarsh |
January 2010 | The Importance of Mobile Messaging Compliance | TextGuard |
November 2009 | Why You Should Consider Migrating to Hosted Exchange 2010 | Intermedia |
November 2009 | The Case for Hosted Exchange |
123Together, Electric Mail and Rackspace Hosting |
November 2009 |
The Case for Third Party Archiving in Microsoft® Exchange Server 2010 |
Estorian, Google, LiveOffice, Quest Software and Sunbelt Software |
September 2009 |
The Impact of New Communication Tools for Financial Services Firms |
FaceTime |
September 2009 | Key Issues in Improving Your Messaging Capabilities | ColdSpark |
August 2009 |
Portal Authentication: A Balancing Act Between Security, Usability and Compliance |
PistolStar |
August 2009 | A Guide to Managing Documents in Today's Law Firms | Workshare |
August 2009 | A Guide to Document Comparison and Security for Corporate Legal | Workshare |
August 2009 | The Case for Lotus Foundations | IBM |
August 2009 |
Authentication in the Enterprise: Current and Changing Requirements |
PistolStar |
August 2009 |
The Strategic Advantage of Cloud-Based Email and BlackBerry Services |
USA.NET |
July 2009 |
The Critical Need for Encrypted Email and File Transfer Solutions |
DataMotion, Echoworx, Electric Mail, PGP Corporation, Proofpoint, Smarsh and Webroot Software |
June 2009 |
Why You Should Consider an Alternative Email Platform | Gecad Technologies |
May 2009 |
Comparing the Cost of Email Systems | Novell |
May 2009 |
The ROI Case for Alternative Messaging Systems | Ipswitch |
May 2009 |
Choosing the Right Archiving Solution |
C2C, HP, Ipswitch, Mirapoint and Quest Software |
May 2009 |
Key Issues in Selecting an Email Disaster Recovery and Business Continuity Solution |
Azaleos and Neverfail |
April 2009 |
Reducing Messaging & Web Security Costs With Managed Services | MX Logic |
April 2009 |
The Growing Importance of Microsoft SharePoint | Azaleos |
March 2009 | Why You Need to Focus on Modernizing Your Email Infrastructure | Sendmail |
March 2009 |
IT Best Practices: To Support or Not Support Consumer-Owned Smartphones |
Zenprise |
February 2009 | Using SaaS to Reduce the Costs of Email Security | Proofpoint |
January 2009 | Why You Need an Intelligent File Transfer Solution | Biscom |
January 2009 | The Need for SharePoint Security | Trend Micro |
January 2009 | Comparing Leading Email and SharePoint Security Solutions | Trend Micro |
January 2009 | An Analysis of Sendio's Anti-Spam Offering | Sendio |
January 2009 | Results of an Osterman Research Survey on Web Security | Purewire |
January 2009 |
Instant Access to Information: The Return-on-Investment Case for Information Management |
Donnell Systems |
December 2008 | Why You Should Consider Deploying Software Appliances | Trend Micro |
December 2008 | Recession Proof Your Business Email Through Outsourcing | USA.NET |
November 2008 | The Need to Unify Your Business Information | PointCross |
October 2008 | Why Archiving is So Important in GroupWise Environments | GWAVA and MessageSolution |
October 2008 | Why Your Organization Should Consider Hosted Applications |
Google
|
October 2008 | Why Your Organization Needs to Implement DLP |
Blue Coat Systems, Code Green Networks, Smarsh and Trend Micro |
October 2008 |
Why Reducing File Size Should Be a Top Priority in Your Organization |
NXPowerLite |
September 2008 |
A Review of MessageSolution Enterprise Email Archive and Enterprise File Archive |
MessageSolution |
September 2008 | Why You Need to Consider Virtualization | Trend Micro |
July 2008 |
Why You Should Implement Messaging Archiving | Plasmon |
July 2008 |
Focusing on Value-Added Services in a Hosted Messaging Environment |
Everyone.net |
July 2008 |
Should You Install Messaging Security Software on Your Exchange Server? |
Sunbelt Software |
June 2008 |
The Growing Importance of E-Discovery on Your Business |
Barracuda Networks, C2C, CommVault, Global Relay, Google, GWAVA, Recommind, Smarsh and Trend Micro |
June 2008 |
Reducing the Cost of Messaging | Mailtrust |
June 2008 |
IT Infrastructure Management: How to Tame the Beast | Dorado Software |
April 2008 |
The Advantages of a Hosted Security Model | Websense |
April 2008 |
What to Ask When Evaluating Messaging Security Systems | Sunbelt Software |
April 2008 |
The Impact of Messaging and Web Threats |
Alt-N Technologies, Barracuda Networks, Commtouch, McAfee, Mimecast, Reflexion Networks, St. Bernard Software, Sunbelt Software and Trend Micro |
January 2008 | Why Should You Archive Your Email With a Hosted Service? | Sonian |
January 2008 | A Guide to Messaging Archiving |
ArcMail Technology, Google, LiveOffice, Mimecast, Mimosa Systems, Quest Software, Smarsh, St. Bernard Software, Sunbelt Software and Waterford Technologies |
October 2007 | Key Issues in Messaging Mobility | USA.NET |
September 2007 | Archiving Email for Compliance and Competitive Advantage | ArcMail Technology |
September 2007 | Reducing the Load on Email Servers | ArcMail Technology |
August 2007 | A Guide to Understanding Hosted and Managed Messaging |
123Together, Apptix, Bizcom Web Services, Cobweb Solutions, Concentric, Global Relay, LiveOffice, MailRevive, Postini, Symantec, Trend Micro, USA.NET, USi and ZANTAZ |
July 2007 |
Planning for Improved Email Availability | Neverfail |
June 2007 |
Why You Should Be Thinking About Archiving | MX Logic |
June 2007 |
Solving .PST Management Problems in Microsoft Exchange Environments |
Sherpa Software |
June 2007 |
Solving Key Management Problems in Lotus Notes/Domino Environments |
Sherpa Software |
June 2007 |
Why Web 2.0 is Critical to Your Business | Socialtext |
June 2007 |
Emerging Trends in Fighting Spam | Symantec |
June 2007 |
The Benefits of Deploying Powerful Search Capabilities | Openfind |
May 2007 |
Why Your Organization Needs to Focus on Outbound Content |
BorderWare, CertifiedMail, DYS Analytics, Mimosa Systems, Mirapoint, Postini, Symantec and Workshare |
April 2007 |
Why You Should Consider Using a Hosted Messaging Provider | USi |
March 2007 | The Federal Rules of Civil Procedure, E-mail Discovery and You | Lucid8 |
February 2007 | Why Organizations Need to Focus on Outbound Security | Reconnex |
January 2007 |
The Advantages of Using Traffic-Shaping Techniques to Control Spam |
MailChannels |
January 2007 | The Impact of the New FRCP Amendments on Your Business |
Arcmail Technology, Apptix, Commvault, FaceTime, Fortiva, GFI, Hitachi Data Systems, Infocrossing, LiveOffice, Plasmon, Postini and Smarsh |
October 2006 | ROI of Mass Notification | 3n |
October 2006 | Key Factors in Selecting a GroupWise Archiving Solution | Messaging Architects |
October 2006 | Why You Should Consider a Hosted Messaging Archiving Solution | MessageLabs |
September 2006 | Why You Should Consider a Hosted Messaging Archiving Solution | Fortiva |
September 2006 |
Using Managed Services to Protect Your Business from Web-Based Threats |
ScanSafe |
May 2006 |
The Growing Need to Archive Email | WaLa Systems |
April 2006 |
The New Realities of Email Governance | Sendmail |
January 2006 | How Small Business is Solving the Spam Problem | DigiPortal |
November 2005 | How Online Demonstrations Can Make Purchasing Software Easier | Citrix |
October 2005 | The Advantage of an Appliance-Based File Transfer System | Accellion |
September 2005 | Password Management Issues in Notes/Domino Environments | PistolStar |
September 2005 | Moving Beyond FTP for Large File Transfers | Accellion |
July 2005 |
Secure File Transfer as a Core Business Process | Accellion |
July 2005 |
The Need for a Better Way to Send Files and Attachments | Accellion |
May 2005 |
The Impact of Sarbanes-Oxley on Data Retention | FrontBridge Technologies |
May 2005 |
Email Archiving Without Software | Osterman Research |
May 2005 |
The Value of Using the Right Collaboration Technology | SiteScape |
May 2005 |
Critical Success Factors for Deploying Real-Time Collaboration | SiteScape |
April 2005 |
Addressing IT Compliance Challenges with Backup and Archiving Technologies |
VERITAS |
March 2005 | Messaging in the Healthcare Industry | Vircom |
February 2005 |
The Need for a New Paradigm in Managing Exchange Environments |
Mimosa Systems |
February 2005 | Critical Decision Factors for Messaging Management | FrontBridge Technologies |
October 2004 |
The Advantages of Using a Managed Service Provider to Protect Your Messaging System |
MX Logic |
October 2004 | A Comparative Analysis of Leading Anti-Spam Solutions | |
September 2004 | Managing IM and P2P Threats in the Enterprise | FaceTime |
August 2004 | Secure eMessaging: Analyzing the Total Cost of Ownership | ZixCorp |
June 2004 | Toward More Efficient Document Delivery | Accellion |
March 2004 | The Role of Attachment Caching in E-Mail Server Consolidation | Accellion |
June 2003 |
The Impact of Regulations on Email Archiving Requirements | IMR |
June 2003 |
How a Service Provider Can Eliminate Spam in the Enterprise | FrontBridge Technologies |
April 2003 |
Current Email and Archiving Practices in the Enterprise | Legato |
April 2003 |
Messaging Cost of Ownership in Service Provider Environments | Rockliffe |
September 2002 | Case Study: Arthritis Foundation | USinternetworking |
March 2002 | Case Study: Worldcom | Sun Microsystems |