Skip to content
  • Home
  • What We Do
    • Market research services for technology vendors
    • Consulting services for end-user organizations
  • Resources
  • Clients
  • Press
  • Mailing List
  • Contact
Osterman Research

Osterman Research

Delivering insight on cybersecurity, data protection and information governance

  • Home
  • What We Do
    • Market research services for technology vendors
    • Consulting services for end-user organizations
  • Resources
  • Clients
  • Press
  • Mailing List
  • Contact
Posted on December 31, 2017January 15, 2021

Webinars – 2017 and Earlier

A list of our older webinars, from 2014 to 2017.

Posted on August 30, 2016January 15, 2021

Results of an End User Survey About Communications Practices – Survey Report

The results of a primary market research survey on end user behavior in the context of the corporate and personally owned information systems that users employ to do their work. Survey conducted in July 2016.

Posted on June 9, 2016January 15, 2021

Information Workers’ Messaging, BYOD and Social Media Practices – Infographic

Key data points on the usage and practices of information workers with email, shadow IT, BYOD and social media. Results from a survey conducted by Osterman Research. An infographic.

Posted on June 8, 2016January 15, 2021

File Sync and Share – Infographic

Key data points on the use of file sync and share tools in the enterprise. Results from a survey conducted by Osterman Research. An infographic.

Posted on December 31, 2015January 15, 2021

White Papers – 2015

Our white papers from 2015, focusing on Office 365, information governance, and email security, among others.

Posted on December 31, 2015January 15, 2021

Survey Reports – 2015 and Earlier

A list of our older survey reports, from 2007 to 2015. Contact us if you’d like a copy of one or more of these.

Posted on December 31, 2014January 15, 2021

White Papers – 2014 and Earlier

A very long list of white papers from 2002 to 2014, written and published by Osterman Research.

Resources by Type

White Papers

Survey Reports

Webinars

Podcast Episodes

Infographics

Interviews

Blog Posts

Resources by Topic

  • Application Security
  • Archiving
  • Authentication
  • Cloud Migration
  • Cloud Security
  • Cloud Storage
  • COVID-19
  • Cybersecurity
  • Cybersecurity in Financial Services
  • Cybersecurity in Government
  • Cybersecurity in Healthcare
  • Data Breaches
  • Data Center Transformation
  • Data Exfiltration
  • Data Protection
  • eDiscovery
  • Email Migration
  • Email Security
  • Endpoint Backup
  • Endpoint Detection and Response
  • Endpoint Security
  • File Sync and Share
  • Identity
  • Information Governance
  • Information Overload
  • Internet of Things
  • Machine Learning
  • Messaging
  • Microsoft 365
  • Mobile Computing
  • Network Management
  • Operational Resilience
  • Phishing
  • Ransomware
  • Regulatory Compliance
  • Security Automation
  • Security Awareness Training
  • Security Management
  • Security Threats
  • Skills Shortage
  • Threat Intelligence
  • Tool Usage
  • Web Security
  • Working from Home
  • Zero Trust
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Copyright © 2023 Osterman Research

 

Loading Comments...