Cover Image


Messaging Policy Market Trends Through 2015

出版商 Osterman Research, Inc. 商品編碼 311209
出版日期 內容資訊 英文 46 Pages
商品交期: 最快1-2個工作天內
Back to Top
通訊政策市場趨勢 Messaging Policy Market Trends Through 2015
出版日期: 2014年08月27日 內容資訊: 英文 46 Pages



第1章 摘要整理

第2章 分析方法、背景

第3章 通訊政策管理的促進要素

第4章 Emace的政策管理的課題

第5章 社群媒體的政策管理的課題

第6章 移動平台政策管理的課題

第7章 內容歸檔政策管理的課題

第8章 安全政策管理的課題

第9章 其他政策管理的課題

第10章 政策管理系統的偏好



Messaging policies are an essential and primary element in helping organizations to manage their communications and collaboration systems, to ensure that employee behavior complies with corporate objectives, and to mitigate the risk associated with inappropriate use of the various solutions to which employees and others have access. However, most organizations do not have detailed and thorough policies focused on the use of their other communications and related technologies, as shown in Figure 1. This puts organizations at significant risk of running afoul of their compliance, legal and best practice obligations.

Table of Contents

  • Chapter 1 Executive Summary
  • Chapter 2 Methodology and Background
  • Chapter 3 Drivers for Communications Policy Management
  • Chapter 4 Policy Management Issues in Email
  • Chapter 5 Policy Management Issues in Social Media
  • Chapter 6 Policy Management Issues for Mobile Platforms
  • Chapter 7 Policy Management Issues for Content Archiving
  • Chapter 8 Policy Management Issues for Security
  • Chapter 9 Other Policy Management Issues
  • Chapter 10 Organizational Preferences for Policy Management

List of Figures

  • Figure 1: Status of Current Communications and Related Policies
  • Figure 2: Concern With Various Messaging Management Problems
  • Figure 3: Drivers for New and/or Better Email Policies
  • Figure 4: Importance of Various Issues
  • Figure 5: Perceived Protection Against Various Types of Mistakes and Problems
  • Figure 6: Status of Corporate Email Policies
  • Figure 7: Monitoring Methods That Organizations Use When Dealing With Encrypted Messages
  • Figure 8: Degree to Which Employees Understand and Comply With Email Policies
  • Figure 9: Effectiveness of Current Training Programs in Ensuring Email Policy Compliance
  • Figure 10: Effectiveness of Current Automated Technologies in Ensuring Email Policy Compliance
  • Figure 11: Level of Satisfaction With Current Email Policies
  • Figure 12: Policies for Various Social Media Platforms
  • Figure 13: Understanding and Compliance With Various Policies
  • Figure 14: "Which of the following best describes your organization's social media policy?"
  • Figure 15: Extent to Which Employees Understand and Comply With the Organization's Social Media Policy
  • Figure 16: Motivation to Migrate to an Enterprise Social Networking System
  • Figure 17: Confidence That Ex-Employees' Company-Supplied Mobile Platforms are Not Still Being Paid for by the Company
  • Figure 18: Impact of Mobile Device Management Solutions on Out-of-Pocket Expenses for Mobile Services
  • Figure 19: "Does your organization have the ability to monitor and manage employees' communications on employer-supplied smartphones or tablets?"
  • Figure 20: "If the technology was available, would your organization scan messages for content and archive them based on content?"
  • Figure 21: Current Email Archiving Policy
  • Figure 22: "Can your organization currently archive communications that your employees send on employer-supplier smartphones or tablets?"
  • Figure 23: "Does your organization have automated systems in place that scan outbound content for policy violations, sensitive information, credit card numbers, information that needs to be encrypted, etc.?"
  • Figure 24: Views on Best Practices for Managing Anti-Spam/Anti-Virus and Data Loss Prevention (DLP) Capabilities
  • Figure 25: Results of Automated Scanning of Outbound Email
  • Figure 26: Balance Between Employee Training and Automated Technologies to Ensure Messaging Policy Compliance
  • Figure 27: Capabilities Used to Limit or Block Unwanted Instant Messaging Use
  • Figure 28: Capabilities Used to Limit or Block Peer-to-Peer File Sharing
  • Figure 29: How Organizations Ensure That Uses Do Not Delete Messaging System Content That is Important for Long-Term Retention
  • Figure 30: Extent to Which Various Groups are Involved in Creation and Management/ Maintenance of Communications-Related Policies
  • Figure 31: Preferences for Managing Various Communications-Related Problems
  • Figure 32: Preferred Methods for Managing Various Communications-Related Problems
  • Figure 33: Level of Agreement With Various Policy Management Issues
  • Figure 34: Preferences for Defining Corporate Messaging Policies
Back to Top