Baseline December 28, 2015 Managers on the Fence About Unified Communications
Digital4 December 23, 2015

Shelfware: ecco come evitare di acquistare software inutile o


DDaily December 22, 2015 [기고] 기업 CIO, 사내 개인용 솔루션 사용 전략 재점검 해야 
Government Technology December 17, 2015 5 Cyber-Risk Trends CIOs Should Keep in Mind for 2016 
Business Wire December 16, 2015 ISACA Identifies Five Cyber Risk Trends for 2016 
eWeek December 13, 2015

Retailers Lack Proper Security Control and Visibility, Report


Information Management December 9, 2015

Retail Report Shows False Sense of Confidence Over Data


CIO Insight December 9, 2015 How Retailers Jeopardize Security With Temps 
Business Solutions December 9, 2015 Retailers Face Security Holes This Holiday Shopping Season
CSO Online December 8, 2015

Osterman study highlights false sense of security in the retail


TechTarget (SearchSecurity) December 8, 2015

Temporary workers cause access management troubles over the


DARK Reading December 8, 2015

Retailers Inadequately Secured Against Risks From Temporary


eSecurity Planet December 8, 2015

Over a Third of U.S. Retailers Don't Know Which Systems Their

Temporary Workers Have Accessed

Market Wired December 8, 2015

New Cyber Risk Report Discloses Gaping Holes in Retailers'

Information Security

eWeek November 29, 2015 10 Things to Look for in a Business Email Provider
Computerworld November 12, 2015 Apple wants a little iOS in every enterprise
PRNewswire November 12, 2015

DataMotion Hosts Webinar Featuring Osterman Research on

Content Encryption, Key Issues to Consider and Best Practices

Market Wired November 11, 2015

Metalogix Named in Osterman Research Report as an Essential

Cloud Management Software Provider to Enhance Office 365

IT Business Edge November 5, 2015 Why the Unified Communications Ecosystem is So Odd
eWeek November 5, 2015 Businesses Hesitant About Migration to Unified Communications
ITProPortal October 31, 2015 Taking back control of your corporate data 
IT Business Edge  

4 Issues Companies Should Address Before Adopting a UC


Computerworld October 30, 2015

Como assumir o controle do compartilhamento de informações

na sua empresa 

TNI October 27, 2015 Hacia un nuevo CIO 
MIS Asia October 27, 2015 Poor disposal of mobile devices creates massive security risk 
BusinessWire October 20, 2015

ownCloud Unveils First and Only Flexible Hybrid Cloud

Enterprise File Sync & Share Solution with on-Premise Control


Notícias October 18, 2015

4 dicas para reduzir riscos com ferramentas de sincronização e


Banking Exchange October 14, 2015 October: A month to measure cyber defenses 
Security Info Watch October 14, 2015 FTC Throws Down the Cyber Security Gauntlet 
CSO October 7, 2015 Quarter of films can't tell how hackers get in 
IT World October 7, 2015 Quarter of films can't tell how hackers get in 
Sys-Con Media October 6, 2015 

Osterman Research and DataMotion Whitepaper and Survey

Address Content Encryption Best Practice

IT News Africa October 6, 2015

It's time for CIOs to change strategy in the fight against consumer


Biztech Africa October 6, 2015

Time for CIOs to change strategy in the fight against consumer


Computerworld October 5, 2015

Gestão de soluções FSS em ambiente empresarial

MakeUseOf October 5, 2015 5 Devices You Do NOT Want to Connect to the Internet of Things
CSO October 2, 2015

Execs blame security breaches on user behavior, executive

leadership: CyberArk

InfoSecurity October 1, 2015 The Long Goodbye
IBN September 30, 2015

KnowBe4 Phishing Research Shows Men 225% More Prone to

Give up the Goods

DarkReading September 29, 2015

Why Many Organizations Still Don't Use Threat Intelligence


Cloud Hub September 22, 2015 IBM launches Cloud Security Enforcer to lockdown shadow IT
Partner Marketing September 17, 2015 You've Got Email (Malware)
IT World Canada September 8, 2015

Companies battle for control with consumer-grade file sharing


Business Cloud News September 8, 2015

Microsoft unveils cloud security plans for Adallom amid rising

cloud unrest

CloudTech September 7, 2015

More than three quarters of firms concerned over consumer

grade cloud storage

Windows IT Pro August 18, 2015 New report slams Office 365 compliance features unfairly
Idaho Business Review August 5, 2015 The 3 top security issues your firm needs to address
BusinessWire August 4, 2015

Smarsh Offers Enhanced Archiving Support for Microsoft Office

365 Environments

Channelnomics July 31, 2015 Compliance, Offie 365 needs call for partner assistance
Credit Union Times July 21, 2015 KnowBe4 Automates Security Training
ITProPortal July 13, 2015

High-profile breaches spark explosive demand for security

awareness training

ITProPortal July 12, 2015 Cloudy with a chance of data loss: Has corporate IT lost control?
DarkReading June 30, 2015 Spikes Security Introduces Isla, Web Malware Isolation System
The Legal Intelligencer June 23, 2015 Cybersecurity Threat-Sharing in the Legal Community
Above the Law May 20, 2015

Phishing and Malware Cyberattacks are Directed at Law Firms

(and Clients) - So it's Time to Train Employees

FierceMobileIT May 20, 2015

Good Technology gives employees mobile email tool to work with

Office documents

Lexology May 12, 2015

Phishing and malware cyberattacks are directed at law firms (and

clients) - so it's time to train employees

Sys-Con Media May 7, 2015 Breach Response Plans Often Overlooked in Higher Education
Fierce Content Management April 29, 2015 Are you archiving your Web content? You should be
Fox News April 18, 2015

Hacking into your home: TVs, refrigerators could be portal to most

sensitive info

BCW April 16, 2015

Zscaler Introduces World's First Cloud-Based Next Generation

Firewall with Zscaler Winter 2015

CSO March 26, 2015 Survey: 75% of firms would take hours or longer to spot breach
Business Solutions March 26, 2015

Study Shows Phishing Is Directly Related To 83% Of Security


Mother Nature Network March 18, 2015 Is your smart home safe or has it become an evil botnet?
PlumChoice March 17, 2015

PlumChoice: Cloud Application Success Requires Increased

Support for Product Adoption and Ongoing Use

CIO March 12, 2015

Addressing Your Shelfware Problems Can Help You Get Good

Cyber Security

Security Asia March 2, 2015 Is your security software sitting unused on the shelf?
CIO February 26, 2015 Is Your Security Software Sitting Unused on the Shelf? February 26, 2015

Osterman Research Finds a Lack of Good Information Governance

Increases Corporate Costs and Risk

Virtual-Strategy Magazine February 25, 2015

South River Technologies and Osterman Research: Enterprise IT Is

Losing Control Over Business Data

MarketWired February 25, 2015

South River Technologies and Osterman Research: Enterprise IT Is

Losing Control Over Business Data

Virtual-Strategy Magazine February 24, 2015

Osterman Research Finds Most Organizations at Significant Risk

from Use of Consumer File Sync and Share Tools

ElectroPages February 19, 2015 The BYOD ethos is a corporate cyber attack waiting to happen February 6, 2015 你的企业有多少安全软件只是“摆设”?
Reseaux Telecoms January 29, 2015

28% des logiciels de sécurité achetés par les entreprises ne sont

pas utilisés

Open Systems Publications January 29, 2015

Osterman: до 60% купленных для защиты компьютеров

программ остаются неиспользованными

CSO January 27, 2015 Twenty-eight percent of security spending wasted on shelfware
Newsfactor January 23, 2015 New Zero-Day Flaws Found in Adobe Flash
TechTarget Search Security January 21, 2015

Wasted spending on security shelfware affects small businesses


Politico Morning Cybersecurity January 21, 2015 Report Watch
Boan News January 21, 2015 각종 보안예산, 밑 빠진 독에 물 붓기 상태 
Security Week January 20, 2015 Security Spending Wasted When Software Goes Unimplemented 
Dark Reading January 16, 2015 A Lot of Security Purchases Remain Shelfware 
Corporate Counsel January 16, 2015 If It Stays on the Shelf, Security Software Won't Help 
PaymentsSource January 16, 2015 Many Security Software Investments Are Wasted: Trustwave 
MSPmentor January 16, 2015

Trustwave: Smaller Organizations Spend More on IT Security

Than Others 

Business News Daily January 16, 2015 Is Your Small Business Wasting Money on Security? 

Talkin' Cloud

January 15, 2015

Are Some Organizations Leaving IT Security Software "On the


eWeek January 14, 2015 Security Shelfware Continues to Be a Big Challenge
Entrepreneur January 7, 2015 The Top 5 Cloud IT Challenges Facing Businesses in 2015

PHONE: +1 206 683 5683

© 2001-2020 Osterman Research, Inc. All rights reserved.