Skip to content
  • Home
  • What We Do
    • Market research services for technology vendors
    • Consulting services for end-user organizations
  • Resources
  • Clients
  • Press
  • Mailing List
  • Contact
Osterman Research

Osterman Research

Delivering insight on cybersecurity, data protection and information governance

  • Home
  • What We Do
    • Market research services for technology vendors
    • Consulting services for end-user organizations
  • Resources
  • Clients
  • Press
  • Mailing List
  • Contact
Posted on June 27, 2019January 14, 2021

The Critical Role of Endpoint Detection and Response – Webinar

Priorities for Endpoint Detection and Response, and top concerns with deploying advanced endpoint anti-malware solutions. Sponsored by SonicWall.

Posted on May 8, 2019January 15, 2021

Endpoint Detection and Response – Past, Present and Future – Webinar

A discussion on the critical role of EDR in modern organizations, and how it must evolve to keep pace with the ever-changing threat landscape. Sponsored by Nyotron.

Posted on April 29, 2019January 21, 2021

The Critical Role of Endpoint Detection and Response – White Paper

Conventional security solutions are useful and provide some level of protection from current security threats, but they are not enough. A rapidly growing number of organizations are deploying endpoint detection and response solutions as a supplement to their existing security defenses. Sponsored by Nyotron, Rapid7, SonicWall and Trend Micro.

Resources by Type

White Papers

Survey Reports

Webinars

Podcast Episodes

Infographics

Interviews

Blog Posts

Resources by Topic

  • Application Security
  • Archiving
  • Authentication
  • Cloud Migration
  • Cloud Security
  • Cloud Storage
  • COVID-19
  • Cybersecurity
  • Cybersecurity in Financial Services
  • Cybersecurity in Government
  • Cybersecurity in Healthcare
  • Data Breaches
  • Data Center Transformation
  • Data Exfiltration
  • Data Protection
  • eDiscovery
  • Email Migration
  • Email Security
  • Endpoint Backup
  • Endpoint Detection and Response
  • Endpoint Security
  • File Sync and Share
  • Identity
  • Information Governance
  • Information Overload
  • Internet of Things
  • Machine Learning
  • Messaging
  • Microsoft 365
  • Mobile Computing
  • Network Management
  • Operational Resilience
  • Phishing
  • Ransomware
  • Regulatory Compliance
  • Security Automation
  • Security Awareness Training
  • Security Management
  • Security Threats
  • Skills Shortage
  • Threat Intelligence
  • Tool Usage
  • Web Security
  • Working from Home
  • Zero Trust
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Copyright © 2023 Osterman Research

 

Loading Comments...