{"id":1828,"date":"2005-07-05T00:00:00","date_gmt":"2005-07-05T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/07\/05\/radicati-group-survey-finds-that-fighting-spam-is-still-the-top-concern-of-corporate-organizations\/"},"modified":"2021-12-30T11:40:04","modified_gmt":"2021-12-30T11:40:04","slug":"radicati-group-survey-finds-that-fighting-spam-is-still-the-top-concern-of-corporate-organizations","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2005\/07\/05\/radicati-group-survey-finds-that-fighting-spam-is-still-the-top-concern-of-corporate-organizations\/","title":{"rendered":"Radicati Group Survey Finds That Fighting Spam Is Still the Top Concern of Corporate Organizations"},"content":{"rendered":"<p>The Radicati Group, Inc.&#8217;s latest study, &#8220;Messaging and Collaboration Corporate Survey, 2005-2006&#8221; finds that many organizations are still struggling with spam.  Despite several years of aggressive anti-spam product development, many companies are still not satisfied with their anti-spam solutions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Of the top four messaging priorities reported by companies (spam, spyware, email archiving and viruses), three relate to security issues.<\/p>\n<p>Most respondents (67%) want an anti-spam solution that does more than just anti-spam, such as anti-virus, compliance, email encryption, and more.<br \/>\nOverall, 13% of companies indicated they are not happy with their current messaging platform.<br \/>\nAlmost half (48%) of companies surveyed indicated they have an email archiving solution in place, which is up significantly from 25% last year.<br \/>\nOnly 10% of companies surveyed indicated they have deployed an Identity Management Suite; however, we expect strong growth in this emerging market, as 42% of those without an Identity Management solution indicated interest in buying one.<\/p>\n<p>http:\/\/www.marketwire.com\/mw\/release_html_b1?release_id=90060<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1828","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1828","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1828"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1828\/revisions"}],"predecessor-version":[{"id":4315,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1828\/revisions\/4315"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1828"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1828"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1828"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}