Osterman Research

Displaying 1-27 of 27 results

  • White Papers // Nov 2012

    Assessing the Benefits of Cloud Computing for Small Businesses in Africa

    The "Cloud" is a frequent topic of discussion among small business owners, hardware and software vendors, analysts, consultants, and many others. Most vendors today offer cloud-based services, and the issue of cloud-based communication has become part of the greater discussion about every aspect of computing. The cloud is important for...

    Provided By Osterman Research

  • White Papers // Aug 2012

    The Cloud Advantage: Increased Security and Lower Costs for SMBs

    By enabling faster access to threat intelligence through a cloud-client architecture, resellers can improve their customers' security posture while reducing their security management costs, employee productivity losses, and the number of security breaches that customers would otherwise suffer. This paper conducted a survey specifically for this SMB Security white paper...

    Provided By Osterman Research

  • White Papers // Dec 2010

    The Growing Challenges of Compliance in a Mobile World

    Mobility in its greater context - namely, enabling employees to work from any location - is becoming more common as a means of increasing organizational flexibility, reducing operating expenses, reducing taxes and improving customer service. Mobile messaging is a key component of this trend by enabling properly equipped workers -...

    Provided By Osterman Research

  • White Papers // May 2010

    The Need To Archive Social Networking Content

    Social networking tools like Twitter, Face book, Orkut, Yelp, LinkedIn and a growing number of other platforms are often used to inform others of important news like the desire to "Fall into a burrito food coma" or notifying the world that you're wearing your significant others' clothes1. However, these tools...

    Provided By Osterman Research

  • White Papers // Mar 2010

    Why Cloud Based Security and Archiving Make Sense

    Cloud computing is one of the most significant trends in IT today. Organizations of all sizes are evaluating various cloud computing solutions that can improve their performance. Increased productivity, lower cost, better security and reliability are all benefits that can be achieved with cloud computing solutions. Coincidentally, IT organizations are...

    Provided By Osterman Research

  • White Papers // Jan 2010

    The Critical Need to Secure the Web in Your Company

    This white paper discusses the key issues surrounding Web security and the need for organizations of all sizes to implement robust Web security processes and technologies - namely, a secure Web gateway. This paper was sponsored by five leading providers of Web security solutions: Blue Coat, FaceTime Communications, St. Bernard...

    Provided By Osterman Research

  • White Papers // Sep 2009

    The Impact of New Communication Tools for Financial Services Firms

    Securities traders, banks, investment advisors and others in the financial services industry have long embraced new communication tools. Email, for example, and more recently instant messaging can provide individuals within these firms with a distinct competitive advantage by providing information more quickly or allowing them to make more well-informed decisions....

    Provided By Osterman Research

  • White Papers // Aug 2009

    Authentication in the Enterprise: Current and Changing Requirements

    Organizations of all sizes possess information and a variety of other electronic assets, including email data stores, corporate portal document repositories, customer relationship management systems, desktop productivity suites, financial systems and a host of other tools and capabilities. These systems contain a growing quantity - and a growing proportion -...

    Provided By Osterman Research

  • White Papers // Aug 2009

    Portal Authentication: A Balancing Act Between Security, Usability & Compliance

    Virtually every organization maintains highly sensitive information to which it must control strict access. These data sources might include customer databases, CRM systems, repositories of financial information and the like. Increasingly, these content sources are accessed through portals built in IBM WebSphere Portal, the leading portal software provider1, and Microsoft...

    Provided By Osterman Research

  • White Papers // Aug 2009

    Comparing Email Management Systems That Protect Against Against Spam, Viruses, Malware and Phishing Attacks

    On several levels, email is the most important application used in business today: email is more important than the telephone for the vast majority of users, about 75% of the critical business content that users need on a daily basis is somehow bound up in their email system, and the...

    Provided By Osterman Research

  • White Papers // Jul 2009

    The Critical Need for Encrypted Email and File Transfer Solutions

    Email and file encryption are absolutely critical for a variety of reasons, including compliance with regulatory obligations to protect the integrity of sensitive data and best practices focused on maintaining the confidentiality of corporate data. However, most emails sent today - including those that contain highly sensitive content - are...

    Provided By Osterman Research

  • White Papers // Jul 2009

    The Critical Need for Encrypted Email and Secure File Transfer Solutions

    A growing number of organizations are turning to dedicated file transfer systems to address the growing number of files they send, to manage larger attachments that cannot be sent through email, and to alleviate the load on email servers. Increasingly, these systems are a critical component of essential business processes...

    Provided By Osterman Research

  • White Papers // May 2009

    Key Issues in Selecting an Email Disaster Recovery and Business Continuity Solution

    Email is the primary tool for most organizations' communications and file transport capabilities and the backbone for a growing number of mission-critical business processes and workflows. Clearly, then, email is critical and, despite the growing use of social media, wikis, blogs, realtime communications, unified communications and other modes of communicating...

    Provided By Osterman Research

  • White Papers // May 2009

    The ROI Case for Alternative Messaging Systems

    This white paper, sponsored by Ipswitch, offers an overview of the key features that will meet the needs of smaller organizations, and it offers a compelling Return-on-Investment (ROI) model for smaller organizations. It also provides some information on Ipswitch's alternative to Exchange, IMail Server vii. IT departments in smaller organizations...

    Provided By Osterman Research

  • White Papers // Apr 2009

    Protecting Your Network Against the Growing Danger of Web Attacks

    After email, the World Wide Web is among the most important tools available to people who use a computer as they perform their job. It offers a ready source of current information, an infrastructure for developing various types of content, and a platform for communications and collaboration. However, the Web...

    Provided By Osterman Research

  • White Papers // Apr 2009

    How to Lower Email Costs While Increasing Reliability

    This paper, sponsored by Concentric, discusses the critical nature of email and the importance of understanding the total cost of ownership for providing email. It also provides some examples of the cost of providing Exchange on-premise for organizations of various sizes developed from a cost model developed by Osterman Research....

    Provided By Osterman Research

  • White Papers // Mar 2009

    Why You Need to Focus on Modernizing Your Email Infrastructure

    Email is the most critical communications tool employed by users in most organizations. It has also become the primary file transport mechanism by the vast majority of users who employ email. As a result, email has become somewhat like a utility - a critical conduit for information and decision-making that...

    Provided By Osterman Research

  • White Papers // Feb 2009

    Why You Should Consider Hosted Messaging Security

    Hosted messaging security offers a number of advantages over on-premise systems and can serve as either a replacement for or a supplement to, an on-premise security infrastructure. Hosted offerings can be significantly less expensive than on-premise infrastructure, while offering better protection and the same level of flexibility and control. They...

    Provided By Osterman Research

  • White Papers // Jan 2009

    The Need for SharePoint Security

    SharePoint use is on the increase, due in part to its efficacy for team sharing, document management, portal development and other uses; and also due to Microsoft's aggressive licensing policies for SharePoint. However, many organizations have not deployed SharePoint-specific security, instead relying on security deployed at the endpoints of the...

    Provided By Osterman Research

  • White Papers // Jan 2009

    Comparing Leading Email and SharePoint Security Solutions

    This paper discusses the results of two separate research programs that were focused on four leading mail server security solutions designed for Microsoft Exchange environments, as well as SharePoint collaboration server security solutions. The four solutions - from Trend Micro, Symantec, Microsoft and McAfee - were the focus of a...

    Provided By Osterman Research

  • White Papers // Jan 2009

    Results of an Osterman Research Survey on Web Security

    Osterman Research conducted a survey, commissioned by Purewire, to understand the problems and issues that organizations are having with employee use of the Web and Web applications. The online survey was conducted with 139 respondents who are knowledgeable about their organization's use of Web tools and applications. The Web and...

    Provided By Osterman Research

  • White Papers // Jan 2009

    An Analysis of Sendio's Anti-Spam Offering

    The benefits should not be underestimated. In an environment of increasing financial pressures caused by a faltering economy, coupled with the continuing need to protect users and organizations from the growing onslaught of spam and increasingly sophisticated and virulent malware, decision makers must provide the highest level of threat protection...

    Provided By Osterman Research

  • White Papers // Jan 2009

    Instant Access to Information: The Return-on-Investment for Information Management Systems

    Information Management Systems can offer significant benefits by improving the speed and quality of access to information, reducing document management and storage costs, and streamlining data-intensive processes for improved employee productivity. These systems will become even more important for organizations to consider during difficult economic times when both IT and...

    Provided By Osterman Research

  • White Papers // Dec 2008

    Recession Proof Your Business Email Through Outsourcing

    Email's importance is overshadowed only by the formidable task of keeping everything up and running as close to 24x7 as possible, adding new capabilities to the email infrastructure over time, protecting against new and ever more virulent threats, and ensuring that email can support current and future business processes. These...

    Provided By Osterman Research

  • White Papers // Dec 2008

    Why You Should Consider Deploying Software Appliances

    Most messaging, Web, network and other security capabilities will continue to be deployed using on-premise hardware and software, notwithstanding significant growth in both the hosted and hybrid delivery models. An increasing proportion of on-premise deployments will be appliances because the self-contained nature of these devices makes them easy to deploy,...

    Provided By Osterman Research

  • White Papers // Oct 2008

    Why Your Organization Needs to Implement DLP

    Osterman Research believes that most organizations are waking up to the fact that they need to implement DLP capabilities. Outbound content sent from any communications tools or stored on laptops and removable storage devices must be monitored and managed in order to minimize risk and to ensure that the content...

    Provided By Osterman Research

  • White Papers // Sep 2008

    Why You Need to Consider Virtualization

    While virtualization has been in use for decades, it has become a hot topic of conversation in IT departments because of increasing requirements to reduce IT costs, improve the availability of the IT infrastructure and make IT departments and staff more efficient. Virtualization offers a number of advantages in the...

    Provided By Osterman Research

  • White Papers // Nov 2012

    Assessing the Benefits of Cloud Computing for Small Businesses in Africa

    The "Cloud" is a frequent topic of discussion among small business owners, hardware and software vendors, analysts, consultants, and many others. Most vendors today offer cloud-based services, and the issue of cloud-based communication has become part of the greater discussion about every aspect of computing. The cloud is important for...

    Provided By Osterman Research

  • White Papers // Aug 2012

    The Cloud Advantage: Increased Security and Lower Costs for SMBs

    By enabling faster access to threat intelligence through a cloud-client architecture, resellers can improve their customers' security posture while reducing their security management costs, employee productivity losses, and the number of security breaches that customers would otherwise suffer. This paper conducted a survey specifically for this SMB Security white paper...

    Provided By Osterman Research

  • White Papers // Dec 2008

    Why You Should Consider Deploying Software Appliances

    Most messaging, Web, network and other security capabilities will continue to be deployed using on-premise hardware and software, notwithstanding significant growth in both the hosted and hybrid delivery models. An increasing proportion of on-premise deployments will be appliances because the self-contained nature of these devices makes them easy to deploy,...

    Provided By Osterman Research

  • White Papers // Oct 2008

    Why Your Organization Needs to Implement DLP

    Osterman Research believes that most organizations are waking up to the fact that they need to implement DLP capabilities. Outbound content sent from any communications tools or stored on laptops and removable storage devices must be monitored and managed in order to minimize risk and to ensure that the content...

    Provided By Osterman Research

  • White Papers // Jul 2009

    The Critical Need for Encrypted Email and File Transfer Solutions

    Email and file encryption are absolutely critical for a variety of reasons, including compliance with regulatory obligations to protect the integrity of sensitive data and best practices focused on maintaining the confidentiality of corporate data. However, most emails sent today - including those that contain highly sensitive content - are...

    Provided By Osterman Research

  • White Papers // Sep 2008

    Why You Need to Consider Virtualization

    While virtualization has been in use for decades, it has become a hot topic of conversation in IT departments because of increasing requirements to reduce IT costs, improve the availability of the IT infrastructure and make IT departments and staff more efficient. Virtualization offers a number of advantages in the...

    Provided By Osterman Research

  • White Papers // Feb 2009

    Why You Should Consider Hosted Messaging Security

    Hosted messaging security offers a number of advantages over on-premise systems and can serve as either a replacement for or a supplement to, an on-premise security infrastructure. Hosted offerings can be significantly less expensive than on-premise infrastructure, while offering better protection and the same level of flexibility and control. They...

    Provided By Osterman Research

  • White Papers // Jan 2009

    The Need for SharePoint Security

    SharePoint use is on the increase, due in part to its efficacy for team sharing, document management, portal development and other uses; and also due to Microsoft's aggressive licensing policies for SharePoint. However, many organizations have not deployed SharePoint-specific security, instead relying on security deployed at the endpoints of the...

    Provided By Osterman Research

  • White Papers // Jan 2009

    Comparing Leading Email and SharePoint Security Solutions

    This paper discusses the results of two separate research programs that were focused on four leading mail server security solutions designed for Microsoft Exchange environments, as well as SharePoint collaboration server security solutions. The four solutions - from Trend Micro, Symantec, Microsoft and McAfee - were the focus of a...

    Provided By Osterman Research

  • White Papers // Jul 2009

    The Critical Need for Encrypted Email and Secure File Transfer Solutions

    A growing number of organizations are turning to dedicated file transfer systems to address the growing number of files they send, to manage larger attachments that cannot be sent through email, and to alleviate the load on email servers. Increasingly, these systems are a critical component of essential business processes...

    Provided By Osterman Research

  • White Papers // Jan 2009

    Results of an Osterman Research Survey on Web Security

    Osterman Research conducted a survey, commissioned by Purewire, to understand the problems and issues that organizations are having with employee use of the Web and Web applications. The online survey was conducted with 139 respondents who are knowledgeable about their organization's use of Web tools and applications. The Web and...

    Provided By Osterman Research

  • White Papers // Aug 2009

    Authentication in the Enterprise: Current and Changing Requirements

    Organizations of all sizes possess information and a variety of other electronic assets, including email data stores, corporate portal document repositories, customer relationship management systems, desktop productivity suites, financial systems and a host of other tools and capabilities. These systems contain a growing quantity - and a growing proportion -...

    Provided By Osterman Research

  • White Papers // Aug 2009

    Portal Authentication: A Balancing Act Between Security, Usability & Compliance

    Virtually every organization maintains highly sensitive information to which it must control strict access. These data sources might include customer databases, CRM systems, repositories of financial information and the like. Increasingly, these content sources are accessed through portals built in IBM WebSphere Portal, the leading portal software provider1, and Microsoft...

    Provided By Osterman Research

  • White Papers // May 2009

    Key Issues in Selecting an Email Disaster Recovery and Business Continuity Solution

    Email is the primary tool for most organizations' communications and file transport capabilities and the backbone for a growing number of mission-critical business processes and workflows. Clearly, then, email is critical and, despite the growing use of social media, wikis, blogs, realtime communications, unified communications and other modes of communicating...

    Provided By Osterman Research

  • White Papers // May 2009

    The ROI Case for Alternative Messaging Systems

    This white paper, sponsored by Ipswitch, offers an overview of the key features that will meet the needs of smaller organizations, and it offers a compelling Return-on-Investment (ROI) model for smaller organizations. It also provides some information on Ipswitch's alternative to Exchange, IMail Server vii. IT departments in smaller organizations...

    Provided By Osterman Research

  • White Papers // Mar 2009

    Why You Need to Focus on Modernizing Your Email Infrastructure

    Email is the most critical communications tool employed by users in most organizations. It has also become the primary file transport mechanism by the vast majority of users who employ email. As a result, email has become somewhat like a utility - a critical conduit for information and decision-making that...

    Provided By Osterman Research

  • White Papers // Jan 2009

    An Analysis of Sendio's Anti-Spam Offering

    The benefits should not be underestimated. In an environment of increasing financial pressures caused by a faltering economy, coupled with the continuing need to protect users and organizations from the growing onslaught of spam and increasingly sophisticated and virulent malware, decision makers must provide the highest level of threat protection...

    Provided By Osterman Research

  • White Papers // Jan 2009

    Instant Access to Information: The Return-on-Investment for Information Management Systems

    Information Management Systems can offer significant benefits by improving the speed and quality of access to information, reducing document management and storage costs, and streamlining data-intensive processes for improved employee productivity. These systems will become even more important for organizations to consider during difficult economic times when both IT and...

    Provided By Osterman Research

  • White Papers // Dec 2008

    Recession Proof Your Business Email Through Outsourcing

    Email's importance is overshadowed only by the formidable task of keeping everything up and running as close to 24x7 as possible, adding new capabilities to the email infrastructure over time, protecting against new and ever more virulent threats, and ensuring that email can support current and future business processes. These...

    Provided By Osterman Research

  • White Papers // Sep 2009

    The Impact of New Communication Tools for Financial Services Firms

    Securities traders, banks, investment advisors and others in the financial services industry have long embraced new communication tools. Email, for example, and more recently instant messaging can provide individuals within these firms with a distinct competitive advantage by providing information more quickly or allowing them to make more well-informed decisions....

    Provided By Osterman Research

  • White Papers // Apr 2009

    How to Lower Email Costs While Increasing Reliability

    This paper, sponsored by Concentric, discusses the critical nature of email and the importance of understanding the total cost of ownership for providing email. It also provides some examples of the cost of providing Exchange on-premise for organizations of various sizes developed from a cost model developed by Osterman Research....

    Provided By Osterman Research

  • White Papers // Apr 2009

    Protecting Your Network Against the Growing Danger of Web Attacks

    After email, the World Wide Web is among the most important tools available to people who use a computer as they perform their job. It offers a ready source of current information, an infrastructure for developing various types of content, and a platform for communications and collaboration. However, the Web...

    Provided By Osterman Research

  • White Papers // Aug 2009

    Comparing Email Management Systems That Protect Against Against Spam, Viruses, Malware and Phishing Attacks

    On several levels, email is the most important application used in business today: email is more important than the telephone for the vast majority of users, about 75% of the critical business content that users need on a daily basis is somehow bound up in their email system, and the...

    Provided By Osterman Research

  • White Papers // Jan 2010

    The Critical Need to Secure the Web in Your Company

    This white paper discusses the key issues surrounding Web security and the need for organizations of all sizes to implement robust Web security processes and technologies - namely, a secure Web gateway. This paper was sponsored by five leading providers of Web security solutions: Blue Coat, FaceTime Communications, St. Bernard...

    Provided By Osterman Research

  • White Papers // Mar 2010

    Why Cloud Based Security and Archiving Make Sense

    Cloud computing is one of the most significant trends in IT today. Organizations of all sizes are evaluating various cloud computing solutions that can improve their performance. Increased productivity, lower cost, better security and reliability are all benefits that can be achieved with cloud computing solutions. Coincidentally, IT organizations are...

    Provided By Osterman Research

  • White Papers // May 2010

    The Need To Archive Social Networking Content

    Social networking tools like Twitter, Face book, Orkut, Yelp, LinkedIn and a growing number of other platforms are often used to inform others of important news like the desire to "Fall into a burrito food coma" or notifying the world that you're wearing your significant others' clothes1. However, these tools...

    Provided By Osterman Research

  • White Papers // Dec 2010

    The Growing Challenges of Compliance in a Mobile World

    Mobility in its greater context - namely, enabling employees to work from any location - is becoming more common as a means of increasing organizational flexibility, reducing operating expenses, reducing taxes and improving customer service. Mobile messaging is a key component of this trend by enabling properly equipped workers -...

    Provided By Osterman Research