Boost PC performance: How more available memory can improve productivity
Idge dell reignite2014 qp #2
1. Quick Pulse:
Reignite #2
July 2014
Presented on behalf of:
Dell
MARKETING
RESEARCH
EMPLOYEE
ENGAGEMENT
A WORLD OF INSIGHTS
2. A WORLD OF INSIGHTS
Sample Method
Survey Goals
Field Work
This survey was fielded
from July 28, 2014 to
July 30, 2014
Total Respondents 82 qualified completes
Collection Online Questionnaire
Number of
Questions
5 (excluding screeners and
demographics)
Audience To complete this survey,
respondents were required to be
involved in the purchase process
for mobile device security at an
organization that allows personal
devices to be used for work-
related purposes
The purpose of this survey was to better understand organizations’ mobile security
concerns, particularly regarding personal devices in the workplace.
METHODOLOGY & RESEARCH OBJECTIVES
2
3. A WORLD OF INSIGHTS
Total Respondents Organization Size
82
RESPONDENT PROFILE
3
10,000+ employees 13%
1,000 - 9,999 26%
Less than 1,000 employees 14%
Less than 500 employees 47%
Top Represented Job Titles Top Represented Industries
* Full breakdowns can be found on slides 14 & 15
28%
9%
9%
7%
7%
6%
6%
4%
Technology/Computer related
Education
Healthcare
Financial Services & Insurance
Manufacturing: Discrete or
Process
Nonprofit
Professional Services
Government (Federal, State, or
Local)
(NET) IT Management 51%
CIO, CTO 17%
CSO 4%
Executive VP, Senior VP, GM 2%
VP 2%
Director 12%
Manager 10%
Supervisor 2%
(NET) Business Management 26%
CEO, Chairman, President 7%
Executive VP, Senior VP, GM 2%
VP 4%
Director 4%
Manager, Supervisor 6%
(NET) Other 23%
Consultant 10%
Other (Non-Manger) 13%
4. Involvement in Purchase/Management Process of Security for Mobile Devices
77%
67%
72%
63%
46%
45%
43%
Determine needs
Determine requirements
Evaluate products
Recommend and select vendors
Make the business case internally (e.g., outside of the IT
team)
Approve/authorize purchases
Involved in day-to-day security management
A WORLD OF INSIGHTS 4
S1: In which of the following ways are you involved in the purchase process for, or management of, the security for mobile devices at your organization?
Base: 82 qualified respondents
RESPONDENT PROFILE
5. A WORLD OF INSIGHTS
• Three of five organizations allow the use of personal devices and allow IT to support
them in some cases.
• Personal devices are allowed but never supported by IT at 27% of organizations
while 12% allow personal devices and support them in all cases.
• One third of respondents report lost or stolen devices account for much of the data
compromises at their organizations over the past 12 months.
• Similarly, end user incidents such as lost or stolen devices are most likely to
contribute to security incidents.
• Organizations are typically only somewhat confident their current mobile security
measures can cover a broad range of protection/prevention needs.
• In the next year, a majority of organizations plan to address mobile security concerns by
tightening/revising their BYOD policies in some way.
• Password enforcement, remove kills/device wipes, and data encryption are all security
solutions a majority of organizations plan to leverage over the next year.
KEY FINDINGS
5
7. A WORLD OF INSIGHTS
S2: What is your organization’s stance regarding the use of personal devices for work-related purposes (i.e., “Bring your own device” or “BYOD”)?
Base: 82 qualified respondents
Use of Personal Devices for Work-Related Purposes
12%
61%
27%
Personal devices are allowed and
supported by IT in all cases
Personal devices are
allowed but never
supported by IT
Personal devices are
allowed and supported by
IT in some cases
Three of five organizations allow the use of personal devices and allow IT to
support them in some cases.
7
8. Ways Data Compromised in Past 12 Months
38%
23%
22%
21%
13%
7%
1%
32%
4%
Lost or stolen devices
Data loss due to user error
Malware attacks
Data loss due to device damage
Viruses
Hacking
Other
None
Don't know
A WORLD OF INSIGHTS 8
Lost or stolen devices are the primary way data was compromised over the
past 12 months for over one third of organizations.
Fake tech support gained
access to a system
Q1: In the past 12 months, has your organization’s data been compromised in any of the following ways?
Base: 82 qualified respondents
9. 9
Similarly, end user incidents such as lost or stolen devices are most likely to
contribute to security incidents.
A WORLD OF INSIGHTS
15%
9%
3%
4%
3%
25%
20%
19%
14%
16%
12%
32%
22%
27%
36%
25%
21%
25%
43%
44%
37%
53%
56%
4%
5%
7%
10%
5%
8%
End user (lost/theft)
Outdated hardware/devices
Systems management
BYOD
Outdated mobile OSs
Encryption issues
% To a great /
some extent
40%
22%
16%
15%
30%
18%
Have Contributed to Security Incidents over Past 12 Months
To a great extent To some extent To little extent Not at all Don’t know
Q2: In your opinion, to what extent have the following contributed to security incidents at your organization over the past 12 months?
Base: 82 total qualified respondents, removed those that rated “Not applicable” for attribute
10. 10
Organizations are typically only somewhat confident their current mobile
security measures can cover a broad range of protection/prevention needs.
A WORLD OF INSIGHTS
29%
24%
34%
21%
46%
50%
38%
51%
18%
21%
20%
20%
6%
5%
9%
9%
Protection of data (and limiting access to
data) when mobile devices are lost or stolen
Prevention of malware attacks
Prevention of access to the Internet via
unencrypted public wireless access points
Prevention of data leaks to unauthorized
third parties or applications
Confidence Level that current Mobile Security Measures can provide…
Very confident Somewhat confident Not very confident Not at all confident
Q3: How confident are you that the current mobile security measures in place at your organization can provide the following?
Base: 82 qualified respondents
11. Mobile Security Concerns to be Addressed in the Next 12 Months
52%
39%
29%
7%
6%
20%
6%
Tightening/revising BYOD policies
OS upgrades
Upgrading to more secure hardware
Decreasing the use of mobile devices
Other
None
Don't know
A WORLD OF INSIGHTS 11
In the next 12 months, a majority of organizations plan to address mobile
security concerns by tightening/revising their BYOD policies in some way.
Restrict choice of allowed devices
end user education
Q4: Regarding mobile security concerns, which of the following is your organization likely to address within the next 12 months?
Base: 82 qualified respondents
12. Security Solutions Planning to Leverage over the Next 12 Months
56%
54%
51%
43%
40%
6%
9%
7%
Password enforcement
Remote kills/device wipes
Data encryption
Implement mobile device management (MDM)
Application management
Other
None
Don't know
A WORLD OF INSIGHTS 12
Password enforcement, remote kills/device wipes, and data encryption are all
security solutions a majority of organizations plan to leverage over the next
year.
Q5: Which of the following security solutions is your organization planning to leverage over the next 12 months?
Base: 82 qualified respondents
13. IDG Research Services specializes in marketing and media-related research
for technology marketers. As a division of International Data Group (IDG), the
world's leading technology media, research, and event company, IDG Research
Services brings the resources and experience of a large, global company to its
clients in the form of a small, customer-focused business. For more information
please visit our website.
Janet King
GM/Vice President
Office: 508-766-5601
Fax: 508-766-5600
Email: janet_king@idgresearch.com
A WORLD OF INSIGHTS 1313
Editor's Notes
Quicker time to market more important for enterprise orgs (1,000+) than SMB and midmarket (<1,000), while improved uptime is rated higher by smaller businesses
Quicker time to market more important for enterprise orgs (1,000+) than SMB and midmarket (<1,000), while improved uptime is rated higher by smaller businesses