SlideShare a Scribd company logo
1 of 13
Quick Pulse:
Reignite #2
July 2014
Presented on behalf of:
Dell
MARKETING
RESEARCH
EMPLOYEE
ENGAGEMENT
A WORLD OF INSIGHTS
A WORLD OF INSIGHTS
Sample Method
Survey Goals
Field Work
This survey was fielded
from July 28, 2014 to
July 30, 2014
Total Respondents 82 qualified completes
Collection Online Questionnaire
Number of
Questions
5 (excluding screeners and
demographics)
Audience To complete this survey,
respondents were required to be
involved in the purchase process
for mobile device security at an
organization that allows personal
devices to be used for work-
related purposes
The purpose of this survey was to better understand organizations’ mobile security
concerns, particularly regarding personal devices in the workplace.
METHODOLOGY & RESEARCH OBJECTIVES
2
A WORLD OF INSIGHTS
Total Respondents Organization Size
82
RESPONDENT PROFILE
3
10,000+ employees 13%
1,000 - 9,999 26%
Less than 1,000 employees 14%
Less than 500 employees 47%
Top Represented Job Titles Top Represented Industries
* Full breakdowns can be found on slides 14 & 15
28%
9%
9%
7%
7%
6%
6%
4%
Technology/Computer related
Education
Healthcare
Financial Services & Insurance
Manufacturing: Discrete or
Process
Nonprofit
Professional Services
Government (Federal, State, or
Local)
(NET) IT Management 51%
CIO, CTO 17%
CSO 4%
Executive VP, Senior VP, GM 2%
VP 2%
Director 12%
Manager 10%
Supervisor 2%
(NET) Business Management 26%
CEO, Chairman, President 7%
Executive VP, Senior VP, GM 2%
VP 4%
Director 4%
Manager, Supervisor 6%
(NET) Other 23%
Consultant 10%
Other (Non-Manger) 13%
Involvement in Purchase/Management Process of Security for Mobile Devices
77%
67%
72%
63%
46%
45%
43%
Determine needs
Determine requirements
Evaluate products
Recommend and select vendors
Make the business case internally (e.g., outside of the IT
team)
Approve/authorize purchases
Involved in day-to-day security management
A WORLD OF INSIGHTS 4
S1: In which of the following ways are you involved in the purchase process for, or management of, the security for mobile devices at your organization?
Base: 82 qualified respondents
RESPONDENT PROFILE
A WORLD OF INSIGHTS
• Three of five organizations allow the use of personal devices and allow IT to support
them in some cases.
• Personal devices are allowed but never supported by IT at 27% of organizations
while 12% allow personal devices and support them in all cases.
• One third of respondents report lost or stolen devices account for much of the data
compromises at their organizations over the past 12 months.
• Similarly, end user incidents such as lost or stolen devices are most likely to
contribute to security incidents.
• Organizations are typically only somewhat confident their current mobile security
measures can cover a broad range of protection/prevention needs.
• In the next year, a majority of organizations plan to address mobile security concerns by
tightening/revising their BYOD policies in some way.
• Password enforcement, remove kills/device wipes, and data encryption are all security
solutions a majority of organizations plan to leverage over the next year.
KEY FINDINGS
5
A WORLD OF INSIGHTS
SURVEY RESULTS
6
A WORLD OF INSIGHTS
S2: What is your organization’s stance regarding the use of personal devices for work-related purposes (i.e., “Bring your own device” or “BYOD”)?
Base: 82 qualified respondents
Use of Personal Devices for Work-Related Purposes
12%
61%
27%
Personal devices are allowed and
supported by IT in all cases
Personal devices are
allowed but never
supported by IT
Personal devices are
allowed and supported by
IT in some cases
Three of five organizations allow the use of personal devices and allow IT to
support them in some cases.
7
Ways Data Compromised in Past 12 Months
38%
23%
22%
21%
13%
7%
1%
32%
4%
Lost or stolen devices
Data loss due to user error
Malware attacks
Data loss due to device damage
Viruses
Hacking
Other
None
Don't know
A WORLD OF INSIGHTS 8
Lost or stolen devices are the primary way data was compromised over the
past 12 months for over one third of organizations.
Fake tech support gained
access to a system
Q1: In the past 12 months, has your organization’s data been compromised in any of the following ways?
Base: 82 qualified respondents
9
Similarly, end user incidents such as lost or stolen devices are most likely to
contribute to security incidents.
A WORLD OF INSIGHTS
15%
9%
3%
4%
3%
25%
20%
19%
14%
16%
12%
32%
22%
27%
36%
25%
21%
25%
43%
44%
37%
53%
56%
4%
5%
7%
10%
5%
8%
End user (lost/theft)
Outdated hardware/devices
Systems management
BYOD
Outdated mobile OSs
Encryption issues
% To a great /
some extent
40%
22%
16%
15%
30%
18%
Have Contributed to Security Incidents over Past 12 Months
To a great extent To some extent To little extent Not at all Don’t know
Q2: In your opinion, to what extent have the following contributed to security incidents at your organization over the past 12 months?
Base: 82 total qualified respondents, removed those that rated “Not applicable” for attribute
10
Organizations are typically only somewhat confident their current mobile
security measures can cover a broad range of protection/prevention needs.
A WORLD OF INSIGHTS
29%
24%
34%
21%
46%
50%
38%
51%
18%
21%
20%
20%
6%
5%
9%
9%
Protection of data (and limiting access to
data) when mobile devices are lost or stolen
Prevention of malware attacks
Prevention of access to the Internet via
unencrypted public wireless access points
Prevention of data leaks to unauthorized
third parties or applications
Confidence Level that current Mobile Security Measures can provide…
Very confident Somewhat confident Not very confident Not at all confident
Q3: How confident are you that the current mobile security measures in place at your organization can provide the following?
Base: 82 qualified respondents
Mobile Security Concerns to be Addressed in the Next 12 Months
52%
39%
29%
7%
6%
20%
6%
Tightening/revising BYOD policies
OS upgrades
Upgrading to more secure hardware
Decreasing the use of mobile devices
Other
None
Don't know
A WORLD OF INSIGHTS 11
In the next 12 months, a majority of organizations plan to address mobile
security concerns by tightening/revising their BYOD policies in some way.
Restrict choice of allowed devices
end user education
Q4: Regarding mobile security concerns, which of the following is your organization likely to address within the next 12 months?
Base: 82 qualified respondents
Security Solutions Planning to Leverage over the Next 12 Months
56%
54%
51%
43%
40%
6%
9%
7%
Password enforcement
Remote kills/device wipes
Data encryption
Implement mobile device management (MDM)
Application management
Other
None
Don't know
A WORLD OF INSIGHTS 12
Password enforcement, remote kills/device wipes, and data encryption are all
security solutions a majority of organizations plan to leverage over the next
year.
Q5: Which of the following security solutions is your organization planning to leverage over the next 12 months?
Base: 82 qualified respondents
IDG Research Services specializes in marketing and media-related research
for technology marketers. As a division of International Data Group (IDG), the
world's leading technology media, research, and event company, IDG Research
Services brings the resources and experience of a large, global company to its
clients in the form of a small, customer-focused business. For more information
please visit our website.
Janet King
GM/Vice President
Office: 508-766-5601
Fax: 508-766-5600
Email: janet_king@idgresearch.com
A WORLD OF INSIGHTS 1313

More Related Content

What's hot

State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study
Tam Nguyen
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - final
SelectedPresentations
 
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019  survey report The top challenges to expect in network security in 2019  survey report
The top challenges to expect in network security in 2019 survey report
Bricata, Inc.
 
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
SolarWinds
 
New IT Survey: Public Sector
New IT Survey: Public SectorNew IT Survey: Public Sector
New IT Survey: Public Sector
SolarWinds
 

What's hot (18)

State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - final
 
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019  survey report The top challenges to expect in network security in 2019  survey report
The top challenges to expect in network security in 2019 survey report
 
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
AFCEA Cybersecurity through Continuous Monitoring: SolarWinds Survey Results ...
 
The State of IT Security for 2019
The State of IT Security for 2019The State of IT Security for 2019
The State of IT Security for 2019
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
SVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation ReportSVB Cybersecurity Impact on Innovation Report
SVB Cybersecurity Impact on Innovation Report
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinar
 
System i User Survey Infographic
System i User Survey InfographicSystem i User Survey Infographic
System i User Survey Infographic
 
New IT Survey: Public Sector
New IT Survey: Public SectorNew IT Survey: Public Sector
New IT Survey: Public Sector
 
Prevent & Protect
Prevent & ProtectPrevent & Protect
Prevent & Protect
 
2010 GISS EY
2010 GISS EY2010 GISS EY
2010 GISS EY
 
North America IT Pros Survey: Network Complexity
North America IT Pros Survey: Network ComplexityNorth America IT Pros Survey: Network Complexity
North America IT Pros Survey: Network Complexity
 
Organizational Security: When People are Involved
Organizational Security: When People are InvolvedOrganizational Security: When People are Involved
Organizational Security: When People are Involved
 
Survey: Maximizing the ROI of Network Management Solutions
Survey: Maximizing the ROI of Network Management SolutionsSurvey: Maximizing the ROI of Network Management Solutions
Survey: Maximizing the ROI of Network Management Solutions
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryInternational Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian Summary
 

Similar to Idge dell reignite2014 qp #2

Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
IDG
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
Lumension
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
Tommy Riggins
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data Risk
Fiona Lew
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
nooralmousa
 
White paper balance between embedded operating system security features and a...
White paper balance between embedded operating system security features and a...White paper balance between embedded operating system security features and a...
White paper balance between embedded operating system security features and a...
Javier Gonzalez
 

Similar to Idge dell reignite2014 qp #2 (20)

NEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdfNEW_Security Priorities 2021_Sample Slides.pdf
NEW_Security Priorities 2021_Sample Slides.pdf
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
Security Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdfSecurity Priorities Sample Slides 2023.pdf
Security Priorities Sample Slides 2023.pdf
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
 
2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis2014 Data Protection Maturity Survey: Results and Analysis
2014 Data Protection Maturity Survey: Results and Analysis
 
CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel CompTIA - IT Security Sales Practices in the Channel
CompTIA - IT Security Sales Practices in the Channel
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
Enterprise Data Privacy Quiz
Enterprise Data Privacy QuizEnterprise Data Privacy Quiz
Enterprise Data Privacy Quiz
 
Platforms for Growth: Technology Innovations in the Insurance Industry
Platforms for Growth:Technology Innovations in the Insurance IndustryPlatforms for Growth:Technology Innovations in the Insurance Industry
Platforms for Growth: Technology Innovations in the Insurance Industry
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
 
Brace Yourselves Because The Internet of Things Is Coming
Brace Yourselves Because The Internet of Things Is ComingBrace Yourselves Because The Internet of Things Is Coming
Brace Yourselves Because The Internet of Things Is Coming
 
Ponemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data RiskPonemon Institute Data Breaches and Sensitive Data Risk
Ponemon Institute Data Breaches and Sensitive Data Risk
 
Survey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT InfrastructuresSurvey: Application Use & Challenges in Government IT Infrastructures
Survey: Application Use & Challenges in Government IT Infrastructures
 
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
Government and Education Webinar: Public Sector Cybersecurity Survey - What I...
 
2021 IDG Security Priorities Study
2021 IDG Security Priorities Study2021 IDG Security Priorities Study
2021 IDG Security Priorities Study
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
White paper balance between embedded operating system security features and a...
White paper balance between embedded operating system security features and a...White paper balance between embedded operating system security features and a...
White paper balance between embedded operating system security features and a...
 

More from jmariani14 (8)

IDG MarketPulse: Virtual Graphics Processing Unit (vGPU)
IDG MarketPulse: Virtual Graphics Processing Unit (vGPU)IDG MarketPulse: Virtual Graphics Processing Unit (vGPU)
IDG MarketPulse: Virtual Graphics Processing Unit (vGPU)
 
Idge dell server convergence2014 qp #2
Idge dell server convergence2014 qp #2Idge dell server convergence2014 qp #2
Idge dell server convergence2014 qp #2
 
Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1Idge dell server convergence2014 qp #1
Idge dell server convergence2014 qp #1
 
Idge dell reignite2014 qp #1
Idge dell reignite2014 qp #1Idge dell reignite2014 qp #1
Idge dell reignite2014 qp #1
 
Idge dell private cloud2014 qp #2[1]
Idge dell private cloud2014 qp #2[1]Idge dell private cloud2014 qp #2[1]
Idge dell private cloud2014 qp #2[1]
 
Idge dell private cloud2014 qp #2
Idge dell private cloud2014 qp #2Idge dell private cloud2014 qp #2
Idge dell private cloud2014 qp #2
 
Idge dell private cloud2014 qp #1
Idge dell private cloud2014 qp #1Idge dell private cloud2014 qp #1
Idge dell private cloud2014 qp #1
 
Idge dell qp_robo2014_04222014[1]
Idge dell qp_robo2014_04222014[1]Idge dell qp_robo2014_04222014[1]
Idge dell qp_robo2014_04222014[1]
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Idge dell reignite2014 qp #2

  • 1. Quick Pulse: Reignite #2 July 2014 Presented on behalf of: Dell MARKETING RESEARCH EMPLOYEE ENGAGEMENT A WORLD OF INSIGHTS
  • 2. A WORLD OF INSIGHTS Sample Method Survey Goals Field Work This survey was fielded from July 28, 2014 to July 30, 2014 Total Respondents 82 qualified completes Collection Online Questionnaire Number of Questions 5 (excluding screeners and demographics) Audience To complete this survey, respondents were required to be involved in the purchase process for mobile device security at an organization that allows personal devices to be used for work- related purposes The purpose of this survey was to better understand organizations’ mobile security concerns, particularly regarding personal devices in the workplace. METHODOLOGY & RESEARCH OBJECTIVES 2
  • 3. A WORLD OF INSIGHTS Total Respondents Organization Size 82 RESPONDENT PROFILE 3 10,000+ employees 13% 1,000 - 9,999 26% Less than 1,000 employees 14% Less than 500 employees 47% Top Represented Job Titles Top Represented Industries * Full breakdowns can be found on slides 14 & 15 28% 9% 9% 7% 7% 6% 6% 4% Technology/Computer related Education Healthcare Financial Services & Insurance Manufacturing: Discrete or Process Nonprofit Professional Services Government (Federal, State, or Local) (NET) IT Management 51% CIO, CTO 17% CSO 4% Executive VP, Senior VP, GM 2% VP 2% Director 12% Manager 10% Supervisor 2% (NET) Business Management 26% CEO, Chairman, President 7% Executive VP, Senior VP, GM 2% VP 4% Director 4% Manager, Supervisor 6% (NET) Other 23% Consultant 10% Other (Non-Manger) 13%
  • 4. Involvement in Purchase/Management Process of Security for Mobile Devices 77% 67% 72% 63% 46% 45% 43% Determine needs Determine requirements Evaluate products Recommend and select vendors Make the business case internally (e.g., outside of the IT team) Approve/authorize purchases Involved in day-to-day security management A WORLD OF INSIGHTS 4 S1: In which of the following ways are you involved in the purchase process for, or management of, the security for mobile devices at your organization? Base: 82 qualified respondents RESPONDENT PROFILE
  • 5. A WORLD OF INSIGHTS • Three of five organizations allow the use of personal devices and allow IT to support them in some cases. • Personal devices are allowed but never supported by IT at 27% of organizations while 12% allow personal devices and support them in all cases. • One third of respondents report lost or stolen devices account for much of the data compromises at their organizations over the past 12 months. • Similarly, end user incidents such as lost or stolen devices are most likely to contribute to security incidents. • Organizations are typically only somewhat confident their current mobile security measures can cover a broad range of protection/prevention needs. • In the next year, a majority of organizations plan to address mobile security concerns by tightening/revising their BYOD policies in some way. • Password enforcement, remove kills/device wipes, and data encryption are all security solutions a majority of organizations plan to leverage over the next year. KEY FINDINGS 5
  • 6. A WORLD OF INSIGHTS SURVEY RESULTS 6
  • 7. A WORLD OF INSIGHTS S2: What is your organization’s stance regarding the use of personal devices for work-related purposes (i.e., “Bring your own device” or “BYOD”)? Base: 82 qualified respondents Use of Personal Devices for Work-Related Purposes 12% 61% 27% Personal devices are allowed and supported by IT in all cases Personal devices are allowed but never supported by IT Personal devices are allowed and supported by IT in some cases Three of five organizations allow the use of personal devices and allow IT to support them in some cases. 7
  • 8. Ways Data Compromised in Past 12 Months 38% 23% 22% 21% 13% 7% 1% 32% 4% Lost or stolen devices Data loss due to user error Malware attacks Data loss due to device damage Viruses Hacking Other None Don't know A WORLD OF INSIGHTS 8 Lost or stolen devices are the primary way data was compromised over the past 12 months for over one third of organizations. Fake tech support gained access to a system Q1: In the past 12 months, has your organization’s data been compromised in any of the following ways? Base: 82 qualified respondents
  • 9. 9 Similarly, end user incidents such as lost or stolen devices are most likely to contribute to security incidents. A WORLD OF INSIGHTS 15% 9% 3% 4% 3% 25% 20% 19% 14% 16% 12% 32% 22% 27% 36% 25% 21% 25% 43% 44% 37% 53% 56% 4% 5% 7% 10% 5% 8% End user (lost/theft) Outdated hardware/devices Systems management BYOD Outdated mobile OSs Encryption issues % To a great / some extent 40% 22% 16% 15% 30% 18% Have Contributed to Security Incidents over Past 12 Months To a great extent To some extent To little extent Not at all Don’t know Q2: In your opinion, to what extent have the following contributed to security incidents at your organization over the past 12 months? Base: 82 total qualified respondents, removed those that rated “Not applicable” for attribute
  • 10. 10 Organizations are typically only somewhat confident their current mobile security measures can cover a broad range of protection/prevention needs. A WORLD OF INSIGHTS 29% 24% 34% 21% 46% 50% 38% 51% 18% 21% 20% 20% 6% 5% 9% 9% Protection of data (and limiting access to data) when mobile devices are lost or stolen Prevention of malware attacks Prevention of access to the Internet via unencrypted public wireless access points Prevention of data leaks to unauthorized third parties or applications Confidence Level that current Mobile Security Measures can provide… Very confident Somewhat confident Not very confident Not at all confident Q3: How confident are you that the current mobile security measures in place at your organization can provide the following? Base: 82 qualified respondents
  • 11. Mobile Security Concerns to be Addressed in the Next 12 Months 52% 39% 29% 7% 6% 20% 6% Tightening/revising BYOD policies OS upgrades Upgrading to more secure hardware Decreasing the use of mobile devices Other None Don't know A WORLD OF INSIGHTS 11 In the next 12 months, a majority of organizations plan to address mobile security concerns by tightening/revising their BYOD policies in some way. Restrict choice of allowed devices end user education Q4: Regarding mobile security concerns, which of the following is your organization likely to address within the next 12 months? Base: 82 qualified respondents
  • 12. Security Solutions Planning to Leverage over the Next 12 Months 56% 54% 51% 43% 40% 6% 9% 7% Password enforcement Remote kills/device wipes Data encryption Implement mobile device management (MDM) Application management Other None Don't know A WORLD OF INSIGHTS 12 Password enforcement, remote kills/device wipes, and data encryption are all security solutions a majority of organizations plan to leverage over the next year. Q5: Which of the following security solutions is your organization planning to leverage over the next 12 months? Base: 82 qualified respondents
  • 13. IDG Research Services specializes in marketing and media-related research for technology marketers. As a division of International Data Group (IDG), the world's leading technology media, research, and event company, IDG Research Services brings the resources and experience of a large, global company to its clients in the form of a small, customer-focused business. For more information please visit our website. Janet King GM/Vice President Office: 508-766-5601 Fax: 508-766-5600 Email: janet_king@idgresearch.com A WORLD OF INSIGHTS 1313

Editor's Notes

  1. Quicker time to market more important for enterprise orgs (1,000+) than SMB and midmarket (<1,000), while improved uptime is rated higher by smaller businesses
  2. Quicker time to market more important for enterprise orgs (1,000+) than SMB and midmarket (<1,000), while improved uptime is rated higher by smaller businesses