Idge dell reignite2014 qp #2

13
Quick Pulse: Reignite #2 July 2014 Presented on behalf of: Dell MARKETING RESEARCH EMPLOYEE ENGAGEMENT A WORLD OF INSIGHTS

description

Client Reignite QP #2

Transcript of Idge dell reignite2014 qp #2

Page 1: Idge dell reignite2014 qp #2

Quick Pulse:Reignite #2

July 2014

Presented on behalf of:

Dell

MARKETING RESEARCH

EMPLOYEE ENGAGEMENT

A WORLD OF INSIGHTS

Page 2: Idge dell reignite2014 qp #2

A WORLD OF INSIGHTS

Sample Method

Survey Goals

Field WorkThis survey was fielded from July 28, 2014 to July 30, 2014

Total Respondents

82 qualified completes

Collection Online Questionnaire

Number of Questions

5 (excluding screeners and demographics)

Audience To complete this survey, respondents were required to be involved in the purchase process for mobile device security at an organization that allows personal devices to be used for work-related purposes

The purpose of this survey was to better understand organizations’ mobile security concerns, particularly regarding personal devices in the workplace.

METHODOLOGY & RESEARCH OBJECTIVES

2

Page 3: Idge dell reignite2014 qp #2

A WORLD OF INSIGHTS

Total Respondents Organization Size

82

RESPONDENT PROFILE

3

10,000+ employees 13%

1,000 - 9,999 26%

Less than 1,000 employees

14%

Less than 500 employees 47%

Top Represented Job Titles

Top Represented Industries

* Full breakdowns can be found on slides 14 & 15

Technology/Computer related

Education

Healthcare

Financial Services & Insurance

Manufacturing: Discrete or Process

Nonprofit

Professional Services

Government (Federal, State, or Local)

28%

9%

9%

7%

7%

6%

6%

4%

(NET) IT Management 51%CIO, CTO 17%CSO 4%Executive VP, Senior VP, GM 2%VP 2%Director 12%Manager 10%Supervisor 2%

(NET) Business Management 26%CEO, Chairman, President 7%Executive VP, Senior VP, GM 2%VP 4%Director 4%Manager, Supervisor 6%

(NET) Other 23%Consultant 10%Other (Non-Manger) 13%

Page 4: Idge dell reignite2014 qp #2

Involvement in Purchase/Management Process of Security for Mobile Devices

Determine needs

Determine requirements

Evaluate products

Recommend and select vendors

Make the business case internally (e.g., outside of the IT team)

Approve/authorize purchases

Involved in day-to-day security management

77%

67%

72%

63%

46%

45%

43%

A WORLD OF INSIGHTS 4

S1: In which of the following ways are you involved in the purchase process for, or management of, the security for mobile devices at your organization? Base: 82 qualified respondents

RESPONDENT PROFILE

Page 5: Idge dell reignite2014 qp #2

A WORLD OF INSIGHTS

• Three of five organizations allow the use of personal devices and allow IT to support them in some cases.• Personal devices are allowed but never supported by IT at 27% of

organizations while 12% allow personal devices and support them in all cases.

• One third of respondents report lost or stolen devices account for much of the data compromises at their organizations over the past 12 months.• Similarly, end user incidents such as lost or stolen devices are most likely

to contribute to security incidents.

• Organizations are typically only somewhat confident their current mobile security measures can cover a broad range of protection/prevention needs.

• In the next year, a majority of organizations plan to address mobile security concerns by tightening/revising their BYOD policies in some way.

• Password enforcement, remove kills/device wipes, and data encryption are all security solutions a majority of organizations plan to leverage over the next year.

KEY FINDINGS

5

Page 6: Idge dell reignite2014 qp #2

A WORLD OF INSIGHTS

SURVEY RESULTS

6

Page 7: Idge dell reignite2014 qp #2

A WORLD OF INSIGHTS

S2: What is your organization’s stance regarding the use of personal devices for work-related purposes (i.e., “Bring your own device” or “BYOD”)?Base: 82 qualified respondents

Use of Personal Devices for Work-Related Purposes

12%

61%

27%

Personal devices are allowed and supported by IT in all

casesPersonal devices are allowed but

never supported by IT

Personal devices are allowed and supported

by IT in some cases

Three of five organizations allow the use of personal devices and allow IT to support them in some cases.

7

Page 8: Idge dell reignite2014 qp #2

Ways Data Compromised in Past 12 Months

Lost or stolen devices

Data loss due to user error

Malware attacks

Data loss due to device damage

Viruses

Hacking

Other

None

Don't know

38%

23%

22%

21%

13%

7%

1%

32%

4%

A WORLD OF INSIGHTS 8

Lost or stolen devices are the primary way data was compromised over the past 12 months for over one third of organizations.

Fake tech support gained access to a system

Q1: In the past 12 months, has your organization’s data been compromised in any of the following ways?Base: 82 qualified respondents

Page 9: Idge dell reignite2014 qp #2

9

Similarly, end user incidents such as lost or stolen devices are most likely to contribute to security incidents.

A WORLD OF INSIGHTS

End user (lost/theft)

Outdated hardware/devices

Systems management

BYOD

Outdated mobile OSs

Encryption issues

15%

9%

3%

4%

3%

25%

20%

19%

14%

16%

12%

32%

22%

27%

36%

25%

21%

25%

43%

44%

37%

53%

56%

4%

5%

7%

10%

5%

8%

% To a great / some extent

40%

22%

16%

15%

30%

18%

Have Contributed to Security Incidents over Past 12 Months

To a great extent To some extent To little extent Not at all Don’t know

Q2: In your opinion, to what extent have the following contributed to security incidents at your organization over the past 12 months?Base: 82 total qualified respondents, removed those that rated “Not applicable” for attribute

Page 10: Idge dell reignite2014 qp #2

10

Organizations are typically only somewhat confident their current mobile security measures can cover a broad range of

protection/prevention needs.

A WORLD OF INSIGHTS

Protection of data (and limiting access to data) when mobile devices are lost or

stolen

Prevention of malware attacks

Prevention of access to the Internet via unencrypted public wireless access

points

Prevention of data leaks to unauthorized third parties or applications

29%

24%

34%

21%

46%

50%

38%

51%

18%

21%

20%

20%

6%

5%

9%

9%

Confidence Level that current Mobile Security Measures can provide…

Very confident Somewhat confident Not very confident Not at all confident

Q3: How confident are you that the current mobile security measures in place at your organization can provide the following?Base: 82 qualified respondents

Page 11: Idge dell reignite2014 qp #2

Mobile Security Concerns to be Addressed in the Next 12 Months

Tightening/revising BYOD policies

OS upgrades

Upgrading to more secure hardware

Decreasing the use of mobile devices

Other

None

Don't know

52%

39%

29%

7%

6%

20%

6%

A WORLD OF INSIGHTS 11

In the next 12 months, a majority of organizations plan to address mobile security concerns by tightening/revising their BYOD

policies in some way.

Restrict choice of allowed devices

end user education

Q4: Regarding mobile security concerns, which of the following is your organization likely to address within the next 12 months?Base: 82 qualified respondents

Page 12: Idge dell reignite2014 qp #2

Security Solutions Planning to Leverage over the Next 12 Months

Password enforcement

Remote kills/device wipes

Data encryption

Implement mobile device management (MDM)

Application management

Other

None

Don't know

56%

54%

51%

43%

40%

6%

9%

7%

A WORLD OF INSIGHTS 12

Password enforcement, remote kills/device wipes, and data encryption are all security solutions a majority of organizations

plan to leverage over the next year.

Q5: Which of the following security solutions is your organization planning to leverage over the next 12 months? Base: 82 qualified respondents

Page 13: Idge dell reignite2014 qp #2

IDG Research Services specializes in marketing and media-related research for technology marketers. As a division of International Data

Group (IDG), the world's leading technology media, research, and event company, IDG Research Services brings the resources and

experience of a large, global company to its clients in the form of a small, customer-focused business. For more information please visit

our website.

Janet KingGM/Vice PresidentOffice: 508-766-5601Fax: 508-766-5600

Email: [email protected]

A WORLD OF INSIGHTS 1313