Here’s our white papers from 2002 to 2014. If you’d like a copy, please get in touch.
December 2014 | Evolving Toward the Next Phase of Email (updated) | IBM |
October 2014 | Improving the Security and Control of Your File Sync and Share Capabilities | Intermedia |
September 2014 | Best Practices for File Sharing | Citrix, Cleo and ownCloud |
August 2014 | Email Encryption is an Essential Best Practice | Zix |
August 2014 | Managing Content in Enterprise Social Networks | Smarsh |
July 2014 | Using Email, File, Social Media and Mobile Archiving to Grow Your Business | Actiance, Authority3, GWAVA, and Zovy |
July 2014 | Why You Need to Protect Your Customers’ Online Experience in Real-Time | RiskIQ |
June 2014 | Evolving Toward the Next Phase of Email | IBM |
June 2014 | Best Practices for Managing Archive Migrations | Archive360, GWAVA, OpenText, QUADROTech, Smarsh and TransVault |
April 2014 | Addressing Information Governance Challenges | HP Autonomy |
April 2014 | How Online Identity Fraud Harms Businesses and What You Can Do About It | E-HAWK |
April 2014 | Improving the Compliance Management Process | KnowBe4 |
March 2014 | The Growing Need for Mobile Device Archiving | GWAVA, MobileGuard and Smarsh |
March 2014 | Best Practices for Social Media Management and Archiving | GWAVA, Proofpoint and Smarsh |
March 2014 | Microsoft Office 365 for the Enterprise: How to Strengthen Security, Compliance and Control | McAfee, Mimecast, Sonian and TrustSphere |
February 2014 | Developing an Information Governance Strategy | Actiance, ownCloud, StorageMadeEasy and Zovy |
February 2014 | PST Management: The Eliminate or Migrate Imperative | QUADROTech |
February 2014 | Email Archive Migration: Opportunities and Risks | QUADROTech |
February 2014 | Best Practices in Email, Web and Social Media Security | SpamTitan and Trustwave |
February 2014 | Portal Authentication: A Balancing Act Between Security, Usability and Compliance | PortalGuard |
January 2014 | The Critical Need for Messaging Intelligence | TrustSphere |
December 2013 | The Need for Enterprise-Grade File Transfer | Attachmate |
November 2013 | The Case For Third-Party Archiving in Microsoft Exchange Environments | GWAVA, Messaging Architects, Smarsh and Symantec |
October 2013 | The Importance of Continuity in Office 365 Environments | Mimecast |
October 2013 | Managing Growth and Driving Down Costs for Microsoft SharePoint | Accellion, MessageSolution and Metalogix |
October 2013 | Why eDiscovery Should be a Top Priority for Your Organization | HP Autonomy, Proofpoint and Smarsh |
September 2013 | The Importance of File Archiving | HP Autonomy, Mimecast and Symantec |
July 2013 | Best Practices for Managing Email Archiving | GWAVA |
July 2013 | Why You Should Encrypt Email and What Happens if You Don’t? | Symantec |
July 2013 | Things to Look for in a Cloud Encryption Solution | Osterman Research |
July 2013 | Practical Methods for Improving Authentication | SecureKey and VASCO |
July 2013 | The Need for Third-Party Security, Compliance and Other Capabilities in Microsoft Office 365 | Erado, McAfee, Messaging Architects, Metalogix and Symantec |
June 2013 | File Synchronization and Sharing Market Forecast, 2012-1017 | Osterman Research |
May 2013 | Best Practices for Managing Information Archives | Akaibu |
May 2013 | Key Issues in European eDiscovery | Imation |
May 2013 | The Importance of Robust Email Security in the Financial Services Industry | Edgewave |
May 2013 | Enterprise Requirements for Secure Exchange of Corporate Files | Proofpoint |
May 2013 | The Cost and ROI Advantages of IronKey Workspace W300 for Windows to Go | Imation |
May 2013 | The Case for Hosted Exchange | Rackspace Hosting |
April 2013 | Managing BYOD in Corporate Environments | Actiance, Armor5, BlackBerry, Box, Colligo, GWAVA and Smarsh |
February 2013 | Best Practices for Messaging, Collaboration, Security, Archiving and Encryption in the Cloud | Dell, GWAVA, Sendmail and Smarsh |
January 2013 | The Need for IT to Get in Front of the BYOD Problem | Dell |
December 2012 | File Archiving: The Next Big Thing or Just Big? | Autonomy, EMC, OpenText, Proofpoint and Smarsh |
November 2012 | Achieving Rapid Payback With Mobile Device Management | Osterman Research |
November 2012 | Assessing the Benefits of Cloud Computing for Small Businesses in Africa | MynextMail |
October 2012 | Why Securing Communications and Content is a Critical Best Practice | Coolrock Software, DataMotion and Proofpoint |
October 2012 | Improving SharePoint Use and Governance | Azaleos and Symantec |
September 2012 | Key Issues in eDiscovery | Autonomy, C2C, Globanet, GWAVA and Imation |
July 2012 | Secure, Reliable and Compliant: How the Cloud Can Make Archiving Profitable for the Channel | Sonian |
July 2012 | How the Cloud Can Make Government Archiving More Secure and Less Expensive | Sonian |
July 2012 | The Need for Enterprise-Grade File Sharing and Synchronization | Accellion, Email2 and YouSendIt |
June 2012 | A Better Method of Authentication | Confident Technologies |
June 2012 | Mobile Devices in the Enterprise: MDM Usage and Adoption Trends | Azaleos |
June 2012 | Putting IT Back in Control of BYOD | Accellion, Colligo Networks, Edgewave, HyperOffice, McAfee and YouSendIt |
May 2012 | What is the Total Value of a Hosted PBX? | Intermedia |
May 2012 | Why Third-Party Archiving is Still Necessary in Exchange 2010 | EMC, Mimecast and Symantec |
April 2012 | Why All Organizations Need to Manage and Archive Social Media | Actiance, Erado, GWAVA, Smarsh and Socialtext |
April 2012 | Taking a Strategic Approach to Unified Communications: Best-of-Breed vs. Single Vendor Solutions | Esnatech |
March 2012 | Cloud vs. Cloud: Comparing the TCO of Office 365 and Private Clouds | Azaleos |
February 2012 | Important Issues for Government Agencies to Consider When Using Social Media and Unified Communications | Actiance |
February 2012 | Making File Transfer Easier, Compliant and More Secure | Accellion, Inc, Attachmate, FileCatalyst and Ipswitch File Transfer |
January 2012 | Why Basic Email Discovery Capabilities are Important For Your Business | Quest Software |
January 2012 | Why You Need to Consider Cloud-Based Security in 2012 | AppRiver, GWAVA, Proofpoint and WebTitan |
December 2011 | The Policy Survey Project: Fall 2011 | Dell, Messaging Architects and Contoural |
December 2011 | Making Office 365 More Secure and Compliant | AppRiver, LiveOffice, Proofpoint and Smarsh |
December 2011 | Spam Morphs From a Nuisance to a Threat | Abaca |
December 2011 | Social Media Issues for IIROC-Regulated Firms | Actiance |
November 2011 | Information Security Best Practices: Why Classification is Key | TITUS |
October 2011 | Quantifying the Costs and Benefits of Archiving Your Email and Other Electronic Content | ArcMail, Daegis/AXS-One, Mimecast, Reed Technology and Smarsh |
September 2011 | How Business Users Can Address the Challenge of Sharing Content Securely, Safely and Reliably | YouSendIt |
September 2011 | How SMBs Can Unleash the Power of the Cloud | Intermedia |
September 2011 | Understanding the Benefits of Online Backup and Data Synchronization | Backblaze, Rackspace and Trend Micro |
August 2011 | The Risks of Social Media and What Can be Done to Manage Them | CommVault and McAfee |
August 2011 | Communication, Collaboration and Content Management Best Practices for Small Businesses | Cleartext, McAfee and Safend |
July 2011 | How to Quantify the Costs and Benefits of Web Security | EdgeWave and McAfee |
June 2011 | The Global Malware Problem: Complacency Can Be Costly | M86 Security |
June 2011 | Pain Free Unified Communications and Collaboration | IceWarp |
May 2011 | Archiving Requirements and Considerations for Government Agencies | Smarsh |
May 2011 | Key Issues to Consider in Mobile Device Management | Notify and Smarsh |
April 2011 | Key E-Discovery Issues to Consider in 2011 | Dell, EMC, Metalogix, Mimecast and Symantec.cloud |
April 2011 | Why the Cloud is Not Killing Off the On-Premises Email Market | Alt-N Technologies and Sendmail |
March 2011 | Messaging and Web Security Best Practices for 2011 and Beyond | Edgewave, GFI, SpamTitan, Symantec.cloud and Websense |
February 2011 | Why Your Organization Needs to Implement DLP | Safend |
February 2011 | Why You Need to Eliminate False Positives in Your Email System | TrustSphere |
January 2011 | The Impact of New Communications for Firms in the Energy Industry | Actiance |
December 2010 | Messaging Best Practices for 2011 | DataMotion, FaceTime and Global Relay |
December 2010 | The Importance of Email Continuity | Google, LiveOffice, Neverfail and Quest Software |
December 2010 | The Growing Challenges of Compliance in a Mobile World | TextGuard |
December 2010 | The Cost Benefits of the Cloud are More About Real Estate Than IT | Osterman Research |
November 2010 | The Case for Social Media Management and Archiving | FaceTime and Smarsh |
November 2010 | Web Archiving: The Next Phase in the Evolution of Archiving | Reed Tech Web Archiving Services, a member of the LexisNexis Group |
November 2010 | Best Practices for Managing Financial Services Compliance | Symantec Hosted Services |
November 2010 | Moving Your Email Security to the Cloud | ZEROSPAM |
October 2010 | What Are Your Obligations to Retain Email and Other Electronic Content? | Astaro, C2C, The Linux Box and Proofpoint |
October 2010 | Why Email Archiving is a Critical Best Practice | Sonasoft |
September 2010 | The Role of Third-Party Archiving in Exchange 2010 | Iron Mountain |
September 2010 | Overcoming Key File Transfer Problems | Ipswitch File Transfer |
September 2010 | Why You Need a Better Way to Manage Email Attachments | YouSendIt |
September 2010 | The Threat Landscape: How You Can Protect Your Organization | McAfee |
August 2010 | Educating Decision Makers About the Need for Encryption | DataMotion, Smarsh and ZixCorp |
August 2010 | Taking a New Look at SharePoint: Collaboration Benefits and IT Gotchas | Azaleos |
July 2010 | Why You Need to Focus on Social Networking in Your Company | FaceTime and Smarsh |
June 2010 | Why Your Organization Needs to Implement DLP | Blue Coat Systems |
May 2010 | The Role of Email Archiving in the SMB Market | Jatheon |
May 2010 | Convincing Decision Makers of the Critical Need for Archiving | Google, Iron Mountain Mimosa Systems and Mimecast |
May 2010 | The Need to Archive Social Networking Content | LiveOffice |
April 2010 | Why Now is the Time to Consider an Alternative Email System | Ipswitch and Mirapoint |
April 2010 | The Case for Outbound Content Management | CertiVox, GWAVA, Messaging Architects, Safend, Sendmail, Symantec Hosted Services, Titus Labs, YouSendIt and ZixCorp |
February 2010 | Why Hosted Security Makes Sense for Your Company | Webroot Software |
February 2010 | The Critical Need to Secure the Web in Your Company | Blue Coat, FaceTime Communications, St. Bernard Software, Trend Micro and Webroot Software |
January 2010 | The Concise Guide to E-Discovery | Google, Guidance Software, Mimosa Systems, Recommind, Sherpa Software and Smarsh |
January 2010 | The Importance of Mobile Messaging Compliance | TextGuard |
November 2009 | Why You Should Consider Migrating to Hosted Exchange 2010 | Intermedia |
November 2009 | The Case for Hosted Exchange | 123Together, Electric Mail and Rackspace Hosting |
November 2009 | The Case for Third-Party Archiving in Microsoft Exchange Server 2010 | Estorian, Google, LiveOffice, Quest Software and Sunbelt Software |
September 2009 | The Impact of New Communication Tools for Financial Services Firms | FaceTime |
September 2009 | Key Issues in Improving Your Messaging Capabilities | ColdSpark |
August 2009 | Portal Authentication: A Balancing Act Between Security, Usability and Compliance | PistolStar |
August 2009 | A Guide to Managing Documents in Today’s Law Firms | Workshare |
August 2009 | A Guide to Document Comparison and Security for Corporate Legal | Workshare |
August 2009 | The Case for Lotus Foundations | IBM |
August 2009 | Authentication in the Enterprise: Current and Changing Requirements | PistolStar |
August 2009 | The Strategic Advantage of Cloud-Based Email and BlackBerry Services | USA.NET |
July 2009 | The Critical Need for Encrypted Email and File Transfer Solutions | DataMotion, Echoworx, Electric Mail, PGP Corporation, Proofpoint, Smarsh and Webroot Software |
June 2009 | Why You Should Consider an Alternative Email Platform | Gecad Technologies |
May 2009 | Comparing the Cost of Email Systems | Novell |
May 2009 | The ROI Case for Alternative Messaging Systems | Ipswitch |
May 2009 | Choosing the Right Archiving Solution | C2C, HP, Ipswitch, Mirapoint and Quest Software |
May 2009 | Key Issues in Selecting an Email Disaster Recovery and Business Continuity Solution | Azaleos and Neverfail |
April 2009 | Reducing Messaging & Web Security Costs With Managed Services | MX Logic |
April 2009 | The Growing Importance of Microsoft SharePoint | Azaleos |
March 2009 | Why You Need to Focus on Modernizing Your Email Infrastructure | Sendmail |
March 2009 | IT Best Practices: To Support or Not Support Consumer-Owned Smartphones | Zenprise |
February 2009 | Using SaaS to Reduce the Costs of Email Security | Proofpoint |
January 2009 | Why You Need an Intelligent File Transfer Solution | Biscom |
January 2009 | The Need for SharePoint Security | Trend Micro |
January 2009 | Comparing Leading Email and SharePoint Security Solutions | Trend Micro |
January 2009 | An Analysis of Sendio’s Anti-Spam Offering | Sendio |
January 2009 | Results of an Osterman Research Survey on Web Security | Purewire |
January 2009 | Instant Access to Information: The Return-on-Investment Case for Information Management | Donnell Systems |
December 2008 | Why You Should Consider Deploying Software Appliances | Trend Micro |
December 2008 | Recession Proof Your Business Email Through Outsourcing | USA.NET |
November 2008 | The Need to Unify Your Business Information | PointCross |
October 2008 | Why Archiving is So Important in GroupWise Environments | GWAVA and MessageSolution |
October 2008 | Why Your Organization Should Consider Hosted Applications | |
October 2008 | Why Your Organization Needs to Implement DLP | Blue Coat Systems, Code Green Networks, Smarsh and Trend Micro |
October 2008 | Why Reducing File Size Should Be a Top Priority in Your Organization | NXPowerLite |
September 2008 | A Review of MessageSolution Enterprise Email Archive and Enterprise File Archive | MessageSolution |
September 2008 | Why You Need to Consider Virtualization | Trend Micro |
July 2008 | Why You Should Implement Messaging Archiving | Plasmon |
July 2008 | Focusing on Value-Added Services in a Hosted Messaging Environment | Everyone.net |
July 2008 | Should You Install Messaging Security Software on Your Exchange Server? | Sunbelt Software |
June 2008 | The Growing Importance of E-Discovery on Your Business | Barracuda Networks, C2C, CommVault, Global Relay, Google, GWAVA, Recommind, Smarsh and Trend Micro |
June 2008 | Reducing the Cost of Messaging | Mailtrust |
June 2008 | IT Infrastructure Management: How to Tame the Beast | Dorado Software |
April 2008 | The Advantages of a Hosted Security Model | Websense |
April 2008 | What to Ask When Evaluating Messaging Security Systems | Sunbelt Software |
April 2008 | The Impact of Messaging and Web Threats | Alt-N Technologies, Barracuda Networks, Commtouch, McAfee,Mimecast, Reflexion Networks, St. Bernard Software, Sunbelt Software and Trend Micro |
January 2008 | Why Should You Archive Your Email With a Hosted Service? | Sonian |
January 2008 | A Guide to Messaging Archiving | ArcMail Technology, Google, LiveOffice, Mimecast, Mimosa Systems, Quest Software, Smarsh, St. Bernard Software, Sunbelt Software andWaterford Technologies |
October 2007 | Key Issues in Messaging Mobility | USA.NET |
September 2007 | Archiving Email for Compliance and Competitive Advantage | ArcMail Technology |
September 2007 | Reducing the Load on Email Servers | ArcMail Technology |
August 2007 | A Guide to Understanding Hosted and Managed Messaging | 123Together, Apptix, Bizcom Web Services, Cobweb Solutions,Concentric, Global Relay, LiveOffice, MailRevive, Postini, Symantec, Trend Micro, USA.NET, USi and ZANTAZ |
July 2007 | Planning for Improved Email Availability | Neverfail |
June 2007 | Why You Should Be Thinking About Archiving | MX Logic |
June 2007 | Solving .PST Management Problems in Microsoft Exchange Environments | Sherpa Software |
June 2007 | Solving Key Management Problems in Lotus Notes/Domino Environments | Sherpa Software |
June 2007 | Why Web 2.0 is Critical to Your Business | Socialtext |
June 2007 | Emerging Trends in Fighting Spam | Symantec |
June 2007 | The Benefits of Deploying Powerful Search Capabilities | Openfind |
May 2007 | Why Your Organization Needs to Focus on Outbound Content | BorderWare, CertifiedMail, DYS Analytics, Mimosa Systems,Mirapoint, Postini, Symantec and Workshare |
April 2007 | Why You Should Consider Using a Hosted Messaging Provider | USi |
March 2007 | The Federal Rules of Civil Procedure, E-mail Discovery and You | Lucid8 |
February 2007 | Why Organizations Need to Focus on Outbound Security | Reconnex |
January 2007 | The Advantages of Using Traffic-Shaping Techniques to Control Spam | MailChannels |
January 2007 | The Impact of the New FRCP Amendments on Your Business | Arcmail Technology, Apptix, Commvault, FaceTime, Fortiva,GFI, Hitachi Data Systems, Infocrossing, LiveOffice, Plasmon,Postini and Smarsh |
October 2006 | ROI of Mass Notification | 3n |
October 2006 | Key Factors in Selecting a GroupWise Archiving Solution | Messaging Architects |
October 2006 | Why You Should Consider a Hosted Messaging Archiving Solution | MessageLabs |
September 2006 | Why You Should Consider a Hosted Messaging Archiving Solution | Fortiva |
September 2006 | Using Managed Services to Protect Your Business from Web-Based Threats | ScanSafe |
May 2006 | The Growing Need to Archive Email | WaLa Systems |
April 2006 | The New Realities of Email Governance | Sendmail |
January 2006 | How Small Business is Solving the Spam Problem | DigiPortal |
November 2005 | How Online Demonstrations Can Make Purchasing Software Easier | Citrix |
October 2005 | The Advantage of an Appliance-Based File Transfer System | Accellion |
September 2005 | Password Management Issues in Notes/Domino Environments | PistolStar |
September 2005 | Moving Beyond FTP for Large File Transfers | Accellion |
July 2005 | Secure File Transfer as a Core Business Process | Accellion |
July 2005 | The Need for a Better Way to Send Files and Attachments | Accellion |
May 2005 | The Impact of Sarbanes-Oxley on Data Retention | FrontBridge Technologies |
May 2005 | Email Archiving Without Software | Osterman Research |
May 2005 | The Value of Using the Right Collaboration Technology | SiteScape |
May 2005 | Critical Success Factors for Deploying Real-Time Collaboration | SiteScape |
April 2005 | Addressing IT Compliance Challenges with Backup and Archiving Technologies | VERITAS |
March 2005 | Messaging in the Healthcare Industry | Vircom |
February 2005 | The Need for a New Paradigm in Managing Exchange Environments | Mimosa Systems |
February 2005 | Critical Decision Factors for Messaging Management | FrontBridge Technologies |
October 2004 | The Advantages of Using a Managed Service Provider to Protect Your Messaging System | MX Logic |
October 2004 | A Comparative Analysis of Leading Anti-Spam Solutions | |
September 2004 | Managing IM and P2P Threats in the Enterprise | FaceTime |
August 2004 | Secure eMessaging: Analyzing the Total Cost of Ownership | ZixCorp |
June 2004 | Toward More Efficient Document Delivery | Accellion |
March 2004 | The Role of Attachment Caching in E-Mail Server Consolidation | Accellion |
June 2003 | The Impact of Regulations on Email Archiving Requirements | IMR |
June 2003 | How a Service Provider Can Eliminate Spam in the Enterprise | FrontBridge Technologies |
April 2003 | Current Email and Archiving Practices in the Enterprise | Legato |
April 2003 | Messaging Cost of Ownership in Service Provider Environments | Rockliffe |
September 2002 | Case Study: Arthritis Foundation | USinternetworking |
March 2002 | Case Study: Worldcom | Sun Microsystems |