Skip to content
  • Home
  • What We Do
    • Market research services for technology vendors
    • Consulting services for end-user organizations
  • Resources
  • Clients
  • Press
  • Mailing List
  • Contact
Osterman Research

Osterman Research

Delivering insight on cybersecurity, data protection and information governance

  • Home
  • What We Do
    • Market research services for technology vendors
    • Consulting services for end-user organizations
  • Resources
  • Clients
  • Press
  • Mailing List
  • Contact
Posted on February 15, 2023February 16, 2023

CISO and CIO Investment Priorities for Cybersecurity in 2023 – White Paper

Examines the investment priorities for cybersecurity by CISOs and CIOs in 2023, covering priorities to improve overall posture and a specific focus on four investment areas (apps, cloud, data, and on-premises infrastructure). Sponsored by BlackFog, Cerby, OpenText Cybersecurity, Quest, and SonicWall.

Posted on June 30, 2022July 19, 2022

COVID Hangover: Employee Perceptions on Application Choice post-COVID-19 – White Paper

Results of a market survey into how employees approach application choice at work and the lack of capabilities at organizations to assure security. Commissioned by Cerby.

Posted on August 1, 2019January 14, 2021

Why Security Must Be Part of the Software Life Cycle – Webinar

Why current approaches to security management are no longer adequate, and why security should be part of the software development process. Sponsored by ZeroNorth.

Posted on December 10, 2018January 21, 2021

White Papers – 2018

Our white papers from 2018, focusing on archiving, data protection, email security and more.

Resources by Type

White Papers

Survey Reports

Webinars

Podcast Episodes

Infographics

Interviews

Blog Posts

Resources by Topic

  • Application Security
  • Archiving
  • Authentication
  • Cloud Migration
  • Cloud Security
  • Cloud Storage
  • COVID-19
  • Cybersecurity
  • Cybersecurity in Financial Services
  • Cybersecurity in Government
  • Cybersecurity in Healthcare
  • Data Breaches
  • Data Center Transformation
  • Data Exfiltration
  • Data Protection
  • eDiscovery
  • Email Migration
  • Email Security
  • Endpoint Backup
  • Endpoint Detection and Response
  • Endpoint Security
  • File Sync and Share
  • Identity
  • Information Governance
  • Information Overload
  • Internet of Things
  • Machine Learning
  • Messaging
  • Microsoft 365
  • Mobile Computing
  • Network Management
  • Operational Resilience
  • Phishing
  • Ransomware
  • Regulatory Compliance
  • Security Automation
  • Security Awareness Training
  • Security Management
  • Security Threats
  • Skills Shortage
  • Threat Intelligence
  • Tool Usage
  • Web Security
  • Working from Home
  • Zero Trust
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Copyright © 2023 Osterman Research

 

Loading Comments...