PUBLICATIONDATEARTICLE
BaselineDecember 28, 2015Managers on the Fence About Unified Communications
Digital4December 23, 2015Shelfware: ecco come evitare di acquistare software inutile oinutillizzato 
DDailyDecember 22, 2015[기고] 기업 CIO, 사내 개인용 솔루션 사용 전략 재점검 해야 
Government TechnologyDecember 17, 20155 Cyber-Risk Trends CIOs Should Keep in Mind for 2016 
Business WireDecember 16, 2015ISACA Identifies Five Cyber Risk Trends for 2016 
eWeekDecember 13, 2015Retailers Lack Proper Security Control and Visibility, ReportFinds 
Information ManagementDecember 9, 2015Retail Report Shows False Sense of Confidence Over DataSecurity 
CIO InsightDecember 9, 2015How Retailers Jeopardize Security With Temps 
Business SolutionsDecember 9, 2015Retailers Face Security Holes This Holiday Shopping Season
CSO OnlineDecember 8, 2015Osterman study highlights false sense of security in the retailsector
TechTarget (SearchSecurity)December 8, 2015Temporary workers cause access management troubles over theholidays
DARK ReadingDecember 8, 2015Retailers Inadequately Secured Against Risks From TemporaryWorkers
eSecurity PlanetDecember 8, 2015Over a Third of U.S. Retailers Don’t Know Which Systems TheirTemporary Workers Have Accessed
Market WiredDecember 8, 2015New Cyber Risk Report Discloses Gaping Holes in Retailers’Information Security
eWeekNovember 29, 201510 Things to Look for in a Business Email Provider
ComputerworldNovember 12, 2015Apple wants a little iOS in every enterprise
PRNewswireNovember 12, 2015DataMotion Hosts Webinar Featuring Osterman Research onContent Encryption, Key Issues to Consider and Best Practices
Market WiredNovember 11, 2015Metalogix Named in Osterman Research Report as an EssentialCloud Management Software Provider to Enhance Office 365
IT Business EdgeNovember 5, 2015Why the Unified Communications Ecosystem is So Odd
eWeekNovember 5, 2015Businesses Hesitant About Migration to Unified Communications
ITProPortalOctober 31, 2015Taking back control of your corporate data 
IT Business Edge 4 Issues Companies Should Address Before Adopting a UCPlatform 
ComputerworldOctober 30, 2015Como assumir o controle do compartilhamento de informaçõesna sua empresa 
TNIOctober 27, 2015Hacia un nuevo CIO 
MIS AsiaOctober 27, 2015Poor disposal of mobile devices creates massive security risk 
BusinessWireOctober 20, 2015ownCloud Unveils First and Only Flexible Hybrid CloudEnterprise File Sync & Share Solution with on-Premise ControlPlane 
NotíciasOctober 18, 20154 dicas para reduzir riscos com ferramentas de sincronização ecompartilhamento 
Banking ExchangeOctober 14, 2015October: A month to measure cyber defenses 
Security Info WatchOctober 14, 2015FTC Throws Down the Cyber Security Gauntlet 
CSOOctober 7, 2015Quarter of films can’t tell how hackers get in 
IT WorldOctober 7, 2015Quarter of films can’t tell how hackers get in 
Sys-Con MediaOctober 6, 2015 Osterman Research and DataMotion Whitepaper and SurveyAddress Content Encryption Best Practice
IT News AfricaOctober 6, 2015It’s time for CIOs to change strategy in the fight against consumertech 
Biztech AfricaOctober 6, 2015Time for CIOs to change strategy in the fight against consumertechnology 
ComputerworldOctober 5, 2015Gestão de soluções FSS em ambiente empresarial
MakeUseOfOctober 5, 20155 Devices You Do NOT Want to Connect to the Internet of Things
CSOOctober 2, 2015Execs blame security breaches on user behavior, executiveleadership: CyberArk
InfoSecurityOctober 1, 2015The Long Goodbye
IBNSeptember 30, 2015KnowBe4 Phishing Research Shows Men 225% More Prone toGive up the Goods
DarkReadingSeptember 29, 2015Why Many Organizations Still Don’t Use Threat IntelligencePortals
Cloud HubSeptember 22, 2015IBM launches Cloud Security Enforcer to lockdown shadow IT
Partner MarketingSeptember 17, 2015You’ve Got Email (Malware)
IT World CanadaSeptember 8, 2015Companies battle for control with consumer-grade file sharingsystems
Business Cloud NewsSeptember 8, 2015Microsoft unveils cloud security plans for Adallom amid risingcloud unrest
CloudTechSeptember 7, 2015More than three quarters of firms concerned over consumergrade cloud storage
Windows IT ProAugust 18, 2015New report slams Office 365 compliance features unfairly
Idaho Business ReviewAugust 5, 2015The 3 top security issues your firm needs to address
BusinessWireAugust 4, 2015Smarsh Offers Enhanced Archiving Support for Microsoft Office365 Environments
ChannelnomicsJuly 31, 2015Compliance, Offie 365 needs call for partner assistance
Credit Union TimesJuly 21, 2015KnowBe4 Automates Security Training
ITProPortalJuly 13, 2015High-profile breaches spark explosive demand for securityawareness training
ITProPortalJuly 12, 2015Cloudy with a chance of data loss: Has corporate IT lost control?
DarkReadingJune 30, 2015Spikes Security Introduces Isla, Web Malware Isolation System
The Legal IntelligencerJune 23, 2015Cybersecurity Threat-Sharing in the Legal Community
Above the LawMay 20, 2015Phishing and Malware Cyberattacks are Directed at Law Firms(and Clients) – So it’s Time to Train Employees
FierceMobileITMay 20, 2015Good Technology gives employees mobile email tool to work withOffice documents
LexologyMay 12, 2015Phishing and malware cyberattacks are directed at law firms (andclients) – so it’s time to train employees
Sys-Con MediaMay 7, 2015Breach Response Plans Often Overlooked in Higher Education
Fierce Content ManagementApril 29, 2015Are you archiving your Web content? You should be
Fox NewsApril 18, 2015Hacking into your home: TVs, refrigerators could be portal to mostsensitive info
BCWApril 16, 2015Zscaler Introduces World’s First Cloud-Based Next GenerationFirewall with Zscaler Winter 2015
CSOMarch 26, 2015Survey: 75% of firms would take hours or longer to spot breach
Business SolutionsMarch 26, 2015Study Shows Phishing Is Directly Related To 83% Of SecurityConcerns
Mother Nature NetworkMarch 18, 2015Is your smart home safe or has it become an evil botnet?
PlumChoiceMarch 17, 2015PlumChoice: Cloud Application Success Requires IncreasedSupport for Product Adoption and Ongoing Use
CIOMarch 12, 2015Addressing Your Shelfware Problems Can Help You Get GoodCyber Security
Security AsiaMarch 2, 2015Is your security software sitting unused on the shelf?
CIOFebruary 26, 2015Is Your Security Software Sitting Unused on the Shelf?
PR.comFebruary 26, 2015Osterman Research Finds a Lack of Good Information GovernanceIncreases Corporate Costs and Risk
Virtual-Strategy MagazineFebruary 25, 2015South River Technologies and Osterman Research: Enterprise IT IsLosing Control Over Business Data
MarketWiredFebruary 25, 2015South River Technologies and Osterman Research: Enterprise IT IsLosing Control Over Business Data
Virtual-Strategy MagazineFebruary 24, 2015Osterman Research Finds Most Organizations at Significant Riskfrom Use of Consumer File Sync and Share Tools
ElectroPagesFebruary 19, 2015The BYOD ethos is a corporate cyber attack waiting to happen
ChinaByte.comFebruary 6, 2015你的企业有多少安全软件只是“摆设”?
Reseaux TelecomsJanuary 29, 201528% des logiciels de sécurité achetés par les entreprises ne sontpas utilisés
Open Systems PublicationsJanuary 29, 2015Osterman: до 60% купленных для защиты компьютеровпрограмм остаются неиспользованными
CSOJanuary 27, 2015Twenty-eight percent of security spending wasted on shelfware
NewsfactorJanuary 23, 2015New Zero-Day Flaws Found in Adobe Flash
TechTarget Search SecurityJanuary 21, 2015Wasted spending on security shelfware affects small businessesmore
Politico Morning CybersecurityJanuary 21, 2015Report Watch
Boan NewsJanuary 21, 2015각종 보안예산, 밑 빠진 독에 물 붓기 상태 
Security WeekJanuary 20, 2015Security Spending Wasted When Software Goes Unimplemented 
Dark ReadingJanuary 16, 2015A Lot of Security Purchases Remain Shelfware 
Corporate CounselJanuary 16, 2015If It Stays on the Shelf, Security Software Won’t Help 
PaymentsSourceJanuary 16, 2015Many Security Software Investments Are Wasted: Trustwave 
MSPmentorJanuary 16, 2015Trustwave: Smaller Organizations Spend More on IT SecurityThan Others 
Business News DailyJanuary 16, 2015Is Your Small Business Wasting Money on Security? 
Talkin’ CloudJanuary 15, 2015Are Some Organizations Leaving IT Security Software “On theShelf”?
eWeekJanuary 14, 2015Security Shelfware Continues to Be a Big Challenge
EntrepreneurJanuary 7, 2015The Top 5 Cloud IT Challenges Facing Businesses in 2015