Idge dell reignite2014 qp #2
-
Upload
jmariani14 -
Category
Technology
-
view
55 -
download
2
description
Transcript of Idge dell reignite2014 qp #2
Quick Pulse:Reignite #2
July 2014
Presented on behalf of:
Dell
MARKETING RESEARCH
EMPLOYEE ENGAGEMENT
A WORLD OF INSIGHTS
A WORLD OF INSIGHTS
Sample Method
Survey Goals
Field WorkThis survey was fielded from July 28, 2014 to July 30, 2014
Total Respondents
82 qualified completes
Collection Online Questionnaire
Number of Questions
5 (excluding screeners and demographics)
Audience To complete this survey, respondents were required to be involved in the purchase process for mobile device security at an organization that allows personal devices to be used for work-related purposes
The purpose of this survey was to better understand organizations’ mobile security concerns, particularly regarding personal devices in the workplace.
METHODOLOGY & RESEARCH OBJECTIVES
2
A WORLD OF INSIGHTS
Total Respondents Organization Size
82
RESPONDENT PROFILE
3
10,000+ employees 13%
1,000 - 9,999 26%
Less than 1,000 employees
14%
Less than 500 employees 47%
Top Represented Job Titles
Top Represented Industries
* Full breakdowns can be found on slides 14 & 15
Technology/Computer related
Education
Healthcare
Financial Services & Insurance
Manufacturing: Discrete or Process
Nonprofit
Professional Services
Government (Federal, State, or Local)
28%
9%
9%
7%
7%
6%
6%
4%
(NET) IT Management 51%CIO, CTO 17%CSO 4%Executive VP, Senior VP, GM 2%VP 2%Director 12%Manager 10%Supervisor 2%
(NET) Business Management 26%CEO, Chairman, President 7%Executive VP, Senior VP, GM 2%VP 4%Director 4%Manager, Supervisor 6%
(NET) Other 23%Consultant 10%Other (Non-Manger) 13%
Involvement in Purchase/Management Process of Security for Mobile Devices
Determine needs
Determine requirements
Evaluate products
Recommend and select vendors
Make the business case internally (e.g., outside of the IT team)
Approve/authorize purchases
Involved in day-to-day security management
77%
67%
72%
63%
46%
45%
43%
A WORLD OF INSIGHTS 4
S1: In which of the following ways are you involved in the purchase process for, or management of, the security for mobile devices at your organization? Base: 82 qualified respondents
RESPONDENT PROFILE
A WORLD OF INSIGHTS
• Three of five organizations allow the use of personal devices and allow IT to support them in some cases.• Personal devices are allowed but never supported by IT at 27% of
organizations while 12% allow personal devices and support them in all cases.
• One third of respondents report lost or stolen devices account for much of the data compromises at their organizations over the past 12 months.• Similarly, end user incidents such as lost or stolen devices are most likely
to contribute to security incidents.
• Organizations are typically only somewhat confident their current mobile security measures can cover a broad range of protection/prevention needs.
• In the next year, a majority of organizations plan to address mobile security concerns by tightening/revising their BYOD policies in some way.
• Password enforcement, remove kills/device wipes, and data encryption are all security solutions a majority of organizations plan to leverage over the next year.
KEY FINDINGS
5
A WORLD OF INSIGHTS
SURVEY RESULTS
6
A WORLD OF INSIGHTS
S2: What is your organization’s stance regarding the use of personal devices for work-related purposes (i.e., “Bring your own device” or “BYOD”)?Base: 82 qualified respondents
Use of Personal Devices for Work-Related Purposes
12%
61%
27%
Personal devices are allowed and supported by IT in all
casesPersonal devices are allowed but
never supported by IT
Personal devices are allowed and supported
by IT in some cases
Three of five organizations allow the use of personal devices and allow IT to support them in some cases.
7
Ways Data Compromised in Past 12 Months
Lost or stolen devices
Data loss due to user error
Malware attacks
Data loss due to device damage
Viruses
Hacking
Other
None
Don't know
38%
23%
22%
21%
13%
7%
1%
32%
4%
A WORLD OF INSIGHTS 8
Lost or stolen devices are the primary way data was compromised over the past 12 months for over one third of organizations.
Fake tech support gained access to a system
Q1: In the past 12 months, has your organization’s data been compromised in any of the following ways?Base: 82 qualified respondents
9
Similarly, end user incidents such as lost or stolen devices are most likely to contribute to security incidents.
A WORLD OF INSIGHTS
End user (lost/theft)
Outdated hardware/devices
Systems management
BYOD
Outdated mobile OSs
Encryption issues
15%
9%
3%
4%
3%
25%
20%
19%
14%
16%
12%
32%
22%
27%
36%
25%
21%
25%
43%
44%
37%
53%
56%
4%
5%
7%
10%
5%
8%
% To a great / some extent
40%
22%
16%
15%
30%
18%
Have Contributed to Security Incidents over Past 12 Months
To a great extent To some extent To little extent Not at all Don’t know
Q2: In your opinion, to what extent have the following contributed to security incidents at your organization over the past 12 months?Base: 82 total qualified respondents, removed those that rated “Not applicable” for attribute
10
Organizations are typically only somewhat confident their current mobile security measures can cover a broad range of
protection/prevention needs.
A WORLD OF INSIGHTS
Protection of data (and limiting access to data) when mobile devices are lost or
stolen
Prevention of malware attacks
Prevention of access to the Internet via unencrypted public wireless access
points
Prevention of data leaks to unauthorized third parties or applications
29%
24%
34%
21%
46%
50%
38%
51%
18%
21%
20%
20%
6%
5%
9%
9%
Confidence Level that current Mobile Security Measures can provide…
Very confident Somewhat confident Not very confident Not at all confident
Q3: How confident are you that the current mobile security measures in place at your organization can provide the following?Base: 82 qualified respondents
Mobile Security Concerns to be Addressed in the Next 12 Months
Tightening/revising BYOD policies
OS upgrades
Upgrading to more secure hardware
Decreasing the use of mobile devices
Other
None
Don't know
52%
39%
29%
7%
6%
20%
6%
A WORLD OF INSIGHTS 11
In the next 12 months, a majority of organizations plan to address mobile security concerns by tightening/revising their BYOD
policies in some way.
Restrict choice of allowed devices
end user education
Q4: Regarding mobile security concerns, which of the following is your organization likely to address within the next 12 months?Base: 82 qualified respondents
Security Solutions Planning to Leverage over the Next 12 Months
Password enforcement
Remote kills/device wipes
Data encryption
Implement mobile device management (MDM)
Application management
Other
None
Don't know
56%
54%
51%
43%
40%
6%
9%
7%
A WORLD OF INSIGHTS 12
Password enforcement, remote kills/device wipes, and data encryption are all security solutions a majority of organizations
plan to leverage over the next year.
Q5: Which of the following security solutions is your organization planning to leverage over the next 12 months? Base: 82 qualified respondents
IDG Research Services specializes in marketing and media-related research for technology marketers. As a division of International Data
Group (IDG), the world's leading technology media, research, and event company, IDG Research Services brings the resources and
experience of a large, global company to its clients in the form of a small, customer-focused business. For more information please visit
our website.
Janet KingGM/Vice PresidentOffice: 508-766-5601Fax: 508-766-5600
Email: [email protected]
A WORLD OF INSIGHTS 1313