BYOD and Mobile Security Report 2013
 

BYOD and Mobile Security Report 2013

on

  • 23,457 vues

Welcome to the 2013 BYOD & Mobile Security Report! Bring Your Own Device (BYOD) is a popular topic this year as more companies are adopting employee-owned mobile devices (or deciding against it for ...

Welcome to the 2013 BYOD & Mobile Security Report! Bring Your Own Device (BYOD) is a popular topic this year as more companies are adopting employee-owned mobile devices (or deciding against it for security and data control reasons). The 160,000 member Information Security Community on LinkedIn conducted the survey “BYOD & Mobile Security 2013” to shed some light on the drivers for BYOD, how companies will benefit
from BYOD, and how they respond to the security risks associated
with this trend. The results are in - we received more than 1,600 responses and found interesting insights into BYOD adoption patterns and mobile security practices. We hope you will enjoy the report. Thanks to everyone who participated in the survey!

Statistiques

Vues

Total des vues
23,457
Vues sur SlideShare
20,913
Vues externes
2,544

Actions

J'aime
20
Téléchargements
1,296
Commentaires
7

29 Ajouts 2,544

http://www.globalnerdy.com 1671
http://www.scoop.it 247
http://www.steljes.com 141
http://secure1.com.br 138
http://individualsspring2013.wikispaces.com 110
http://www.linkedin.com 55
https://twitter.com 52
http://ctstech.net 44
http://feeds.feedburner.com 20
http://yoursecurityadvisor.co.uk 13
http://www.newsblur.com 7
http://meltwaternews.com 7
http://www.spundge.com 7
http://dev.newsblur.com 6
http://www.securityinfosearch.com 5
http://www.onhuge.com 4
http://securityinfosearch.com 3
http://digg.com 2
http://www.economics1.co.za 2
http://www.google.com&_=1392106172168 HTTP 1
http://www.google.com&_=1392102970451 HTTP 1
https://www.rebelmouse.com 1
http://newsblur.com 1
http://www.yourmusculoskeletalspecialist.com 1
http://translate.googleusercontent.com 1
http://abtasty.com 1
http://ranksit.com 1
http://bazqux.com 1
https://www.linkedin.com 1
Plus...

Accessibilité

Catégories

Détails de l'import

Uploaded via as Adobe PDF

Droits d'utilisation

CC Attribution License

Report content

Signalé comme inapproprié Signaler comme inapproprié
Signaler comme inapproprié

Indiquez la raison pour laquelle vous avez signalé cette présentation comme n'étant pas appropriée.

Annuler

17 of 7 Publier un commentaire

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Votre message apparaîtra ici
    Processing...
  • It is a good presentation and intersting to note that the adoption is still only edged to 40%. However, security still being the concern in enterprises adopting BYOD.
    Are you sure you want to
    Votre message apparaîtra ici
    Processing...
  • an industry perspective would be great
    Are you sure you want to
    Votre message apparaîtra ici
    Processing...
  • Another interesting observation of the survey is that 60 of organizations have not yet adopted BYOD. I would adjust that to 60% have not officially adopted BYOD. My guess is that 100% are using BYOD just not officialy sanctioned by the organization. I remember years ago going to an Army installation and asking one of their IT Admins if they had wireless devices and the answer was absolutely not. I ran a scan of their wireless frequencies and found 19 access points scattered throughout the fort. The point is that the 60% need to get moving.
    Are you sure you want to
    Votre message apparaîtra ici
    Processing...
  • It's interesting that the most popular mobile business applications are email, calendar and contact management. However, I wonder if that's because those are the default basic applications that come with all mobile devices. I bet if a standard default application was a mobile file explorer if that would also be listed as most popular. The fact is that smart phones and tablets don't have traditional file systems like PCs and Laptops. That does not mean users would not love to be able to access any of their authorized enterprise content and files right were it is in their enterprise network and SharePoint farms without having to move it around to Dropbox like environments, I also bet that IT Admins would love to be able to control and monitor the use and access to that content. There is at least one solution out there that already does this securely and should become ubiquitous in short term. mobilEcho
    Are you sure you want to
    Votre message apparaîtra ici
    Processing...
  • The survey should have included at least the size of the organizations and maybe their industry.
    Are you sure you want to
    Votre message apparaîtra ici
    Processing...
Poster un commentaire
Modifier votre commentaire

    BYOD and Mobile Security Report 2013 BYOD and Mobile Security Report 2013 Presentation Transcript

    • Sponsored by| Symantec | KPMG | Zimbani | MailGuard |2013 survey resultsBYOD & MOBILE SECURITYInformationSecurityGroup Partner
    • BYOD & MOBILE SECURITY | Read the 2013 survey results 1Welcome to the 2013 BYOD & Mobile Security Report!Bring Your Own Device (BYOD) is a popular topic this year asmore companies are adopting employee-owned mobile devices(or deciding against it for security and data control reasons).The 160,000 member Information Security Community on LinkedInconducted the survey “BYOD & Mobile Security 2013” to shedsome light on the drivers for BYOD, how companies will benefitfrom BYOD, and how they respond to the security risks associatedwith this trend.The results are in - we received more than 1,600 responses andfound interesting insights into BYOD adoption patterns and mobilesecurity practices. We hope you will enjoy the report.Thanks to everyone who participated in the survey!Group Owner, Information Security Communityhhschulze@gmail.com | +1 302-383-5817Holger SchulzeINTRODUCTIONShare the Report
    • BYOD & MOBILE SECURITY | Read the 2013 survey resultsThe number one benefit of BYOD is greater employee satisfaction and productivity.A majority of companies are concerned about loss of and unauthorized access to data.Encryption is the most used risk control measure for mobile devices.The biggest impact of mobile security threats is the need for additional IT resources tomanage them.The most popular mobile business applications are email, calendar and contactmanagement. The most popular mobile platform for BYOD is iOS/Apple.2Top-5 Trends in BYOD & Mobile Security12345SURVEY HIGHLIGHTS
    • BYOD & MOBILE SECURITY | Read the 2013 survey results 3The top-3 driversfor BYOD are allabout keepingemployees happyand productive:greater employee satisfaction(55 percent), improved employeemobility (54 percent) andincreased employeeproductivity (51 percent).Greater employee satisfactionImproved employee mobilityIncreased employee productivityReduced device/endpointhardware costsReduced operationalsupport costsOtherWhat are the main drivers and expected benefits of BYOD for your company?0% 20% 40% 60%WHAT ARE THE MAIN DRIVERSand benefits of BYOD for your company?Q1
    • BYOD & MOBILE SECURITY | Read the 2013 survey results 4While a slim majority oforganizations supportcompany-owned devices,BYOD is clearly oneveryone’s radar.Company-owned devicesare widely usedPrivately-owned devicesare in very limited usePrivately-owned devices are widely in use,but not supported by the organizationPrivately-owned devices are widely inuse and supported through a BYOD policyBYOD is under evaluationWhich of the following describes your organization’s overall policy towardsprivately-owned and company-owned mobile devices for business use?There are currently no plans to use privatedevices within the next 12 monthsWe plan to allow private deviceswithin the next 12 monthsOther0% 10% 20% 30% 40%Which is yourorganization’s BYOD policy?Q2
    • BYOD & MOBILE SECURITY | Read the 2013 survey results 5BYOD causessignificant securityconcerns:Loss of company or client data(75 percent), unauthorized access tocompany data & systems (65 percent)and fear of malware infections(47 percent) top the list.Loss of company or client dataMalware infectionsLost or stolen devicesDevice managementUnauthorized access to companydata and systemsWhat are your main security concerns related to BYOD?Compliance with industry regulationsSupport & maintenanceOther0% 20% 40% 60% 80%NoneWhat are your main securityconcerns related to BYOD?Q3
    • BYOD & MOBILE SECURITY | Read the 2013 survey results 6The biggest impact ofmobile security threatsis the need foradditional ITresourcesto manage them (33 percent).And 28 percent of respondentsreport no negative impact frommobile threats in the past 12months.Additional IT resources needed tomanage mobile securityCorporate data loss or theftCost of cleaning up malware infectionsIncreased helpdesk timeto repair damageNoneWhat negative impact did mobile threats have on your companyin the past 12 months?Don’t knowDisrupted business activitiesReduced employee productivity0% 5% 10% 15% 20% 25% 30% 35%The company had to pay regulatory finesOtherIncreased cost due to devices subscribedto premium pay-for-servicesWhat negative impact didmobile threats have on your company?Q4
    • BYOD & MOBILE SECURITY | Read the 2013 survey results 7The most popular mobileplatform for BYOD isiOS/Apple(72 percent).Which mobile platforms does your company support?iOS / AppleAndroid / GoogleRIM / BlackberryWindows / MicrosoftNoneAll other responses0% 10% 20% 30% 40% 50% 60% 70% 80%Which mobile platformsdoes your company support?Q5
    • BYOD & MOBILE SECURITY | Read the 2013 survey results 8Central management of mobiledevices and applicationsNoneEmployee trainingDetailed BYOD policiesOtherWhich company policies and procedures do youhave in place for mobile devices?0% 10% 20% 30% 40%Which company policies DOyou have in place for mobile devices?Q6Central managementof mobile devicesand applications(39 percent) tops the list of BYODpolicies and procedures currentlyin place. 32 percent of organizationssay they do not have any policiesor procedures in place.
    • BYOD & MOBILE SECURITY | Read the 2013 survey results 9Mandatory useof encryption(40 percent) is the most used riskcontrol measure for mobile devices.34 percent of organizations saythey have no risk control measuresin place.Mandatory use of encryptionNoneEndpoint Integrity CheckingAuditing of mobile devicesAttack and penetration testingof mobile applicationsWhich risk control measures are in place for mobile devices?0% 10% 20% 30% 40%OtherWhich risk control measuresare in place for mobile devices?Q7
    • BYOD & MOBILE SECURITY | Read the 2013 survey results 1085 percent of organizationshave most of their intellectualproperty and sensitive datastored in thedatacenter/network.Where is most of your intellectual property and sensitive data stored?Datacenter / NetworkDevice / EndpointCloudOther0% 20% 40% 60% 80% 100%Where is most of your intellectualproperty and sensitive data stored?Q8
    • BYOD & MOBILE SECURITY | Read the 2013 survey results 1177 percent of organizations aremost concerned about protectingbusiness andemployee data.Business and employee data(in databases, apps, etc)DocumentsEmailsContactsWhat type of intellectual property and sensitive dataare you most concerned about?ImagesText messagesVoice conversations0% 20% 40% 60% 80%OtherWhat type of intellectual property& sensitive data are you most concerned about?Q9
    • BYOD & MOBILE SECURITY | Read the 2013 survey results 12Mobile devicemanagementtools(MDM)are most frequently used by40 percent of organizations tomonitor and govern mobile devices.22 percent of organizations saythey have no tools to monitorand govern mobile devices.Mobile Devices Management(MDM) ToolsEndpoint Security ToolsNetwork Access Controls (NAC)Endpoint Malware ProtectionsWhich tools are used to monitor and govern the handling of mobile devices?NoneConfiguration Controls/Lifecycle ManagementOther0% 10% 20% 30% 40%Which tools are used to monitorand govern the handling of mobile devices?Q10
    • BYOD & MOBILE SECURITY | Read the 2013 survey results 1345 percent of organizationsembed personal mobiledevices viaguest networkingand separatenetworks.How are current mobile devices embedded in your organization’s IT-infrastructure?0% 10% 20% 30% 40% 50%Guest networking / separatenetworks for personal mobile devicesIncident management proceduresare employed / amendedAn application repository existsfor mobile devicesOtherNoneHow are current mobile devicesembedded in your organization’s IT-infrastructure?Q11
    • BYOD & MOBILE SECURITY | Read the 2013 survey results 1432 percent of organizationsare considering or implementingon-premise BYODsolutions.In order to meet your BYOD objectives and deploy relevant technologies,have you considered or already implemented one of the following?0% 5% 10% 15% 20% 25% 30% 35%On premise solutionsNoneCloud (SaaS) solutionsOtherHybrid of cloud andon-premise solutionsHow are you deployingBYOD solutions?Q12
    • BYOD & MOBILE SECURITY | Read the 2013 survey results 15The most important successcriterion of BYOD deployments ismaintaining securityfor 70 percent of organizations.Employee productivity rankssecond with 54 percent.SecurityEmployee productivityUsabilityDevice managementWhat are your most important success criteria for BYOD deployments?Cost reductionInnovationTechnology consolidation0% 20% 40% 60% 80%OtherWhat are your most importantsuccess criteria for BYOD deployments?Q13
    • BYOD & MOBILE SECURITY | Read the 2013 survey results 16Email accounts (49 percent),access and authentication(47 percent), and acceptableusage & employee education(42 percent) are thetop-3 mobiledevice policy topicsfor organizations.Email accountsWhich topics are covered by your companys Mobile Device Policy?Access and authenticationAcceptable usage/ employee educationDevice wipingStored dataMalware protectionConfigurationApplicationsGuest networkingLocation trackingSMSOtherWe don’t have a mobiledevice policy0% 10% 20% 30% 40% 50%Which topics are covered BYyour company’s Mobile Device Policy?Q14
    • BYOD & MOBILE SECURITY | Read the 2013 survey results 17Logging, monitoringand reportingare the most required features(69 percent) of mobile devicemanagement tools (MDM).Logging, monitoring and reportingIn your opinion, which capabilities are required forMobile Device Management (MDM) tools?Centralized functionalityMalware protectionEase of deploymentConfiguration controlsEndpoint Integrity CheckingRole-based access rulesFlexible configuration to supportdifferent requirements and parametersHarmonization across mobileplatform typesIntegration with other EndpointManagement SystemsOther0% 20% 40% 60% 80%which capabilities ARE REQUIREDfor Mobile Device Management (MDM) tools?Q15
    • BYOD & MOBILE SECURITY | Read the 2013 survey results 1860 percent oforganizationshave not yetadopted BYOD,but are considering it. Only10 percent of non-adopters areruling it out. 24 percent areactively working on policies,procedures and infrastructurefor BYOD.Not yet adopted, but consideringWorking on the policies, procedures andinfrastructure to enable BYODCurrently evaluating the cost/ benefits of BYOD adoptionBYOD already fully implementedWhich stage of BYOD adoption has been reached in your company?Considering BYOD adoption within a yearNot yet adopted, and no plansBYOD will not be permitted0% 10% 20% 30% 40% 50% 60% 70%OtherWhich stage of BYOD adoptionhas been reached in your company?Q16
    • BYOD & MOBILE SECURITY | Read the 2013 survey results 19A majority of organizationssay they areless than 50 percentready to adoptBYODfor their enterprise.How would you rate your readiness for full enterprise BYOD adoption(in percent | 100 is completely ready)?0 10 20 30 40 50 60 70 80 90 1000%2%4%6%8%10%12%14%Readiness in %Responses in %How would you rate your readinessfor full enterprise BYOD adoption?Q17
    • BYOD & MOBILE SECURITY | Read the 2013 survey results 2041 percent of all organizationscreate mobile appsfor employees- 40 percent do not. 18 percentplan to do so in the future.Does your organization create / use mobile apps for businesspurposes by employees?0% 10% 20% 30% 40% 50%YesNoPlanned in the futureOtherDoes your organization create / usemobile apps for business purposes by employees?Q18
    • BYOD & MOBILE SECURITY | Read the 2013 survey results 2143 percent of organizationscreate mobile appsfor customers- 40 percent do not. 17 percentplan to do so in the future.Does your organization create / use mobile apps forbusiness purposes by customers?0% 10% 20% 30% 40% 50%YesNoPlanned in the futureOtherDoes your organization create / usemobile apps for business purposes by customers?Q19
    • BYOD & MOBILE SECURITY | Read the 2013 survey results 22The most popular mobilebusiness applications areemail, calendarand contactmanagement(85 percent).Email/Calendar/ContactsDocument access / editingAccess to Sharepoint / IntranetAccess to company-built applicationsWhat do you think are the most popular business applicationsused on BYOD devices?File sharingAccess to SaaS apps such as SalesforceVirtual Desktop0% 20% 40% 60% 80% 100%Video conferencingCloud BackupOtherWhat are the most POPULARbusiness applications used on BYOD devices?Q20
    • BYOD & MOBILE SECURITY | Read the 2013 survey results 23This survey was conducted in April 2013. We collected 1,650 responses from information securityprofessionals across the world – here is a detailed breakdown of the demographics.Software & InternetWhat industry is your company in?0% 5% 10% 15% 20%Computers & ElectronicsFinancial ServicesBusiness ServicesGovernmentTelecommunicationsEducationManufacturingHealthcare, Pharmaceuticals, & BiotechEnergy & UtilitiesRetailNon-profitMedia & EntertainmentTransportation & StorageConsumer ServicesAgriculture & MiningReal Estate & ConstructionTravel, Recreation & LeisureWholesale & DistributionOtherOwner/CEO/PresidentDirectorC-Level (CTO, CIO,CMO, CFO, COO)VP LevelOtherWhat is your career level?0% 5% 10% 15% 20% 25% 30% 35%ManagerSpecialistWhat is the size of your company (number of employees)?32.6% | 10-9925.3% | Fewer than 1022.0% | 100-99911.4% | 1,000-10,0008.6% | 10,000+OperationsEngineeringProduct ManagementMarketingOtherWhat department do you work in?0% 20% 40% 60%SalesITLegalFinanceHRSURVEY METHODOLOGY
    • BYOD & MOBILE SECURITY | Read the 2013 survey results 24We would like to thank our sponsors for supporting theBYOD & Mobile Security Report.Lumension | www.lumension.comLumension Security, Inc., a global leader in endpoint management and security, develops, integrates and marketssecurity software solutions that help businesses protect their vital information and manage critical risk across networkand endpoint assets. Lumension enables more than 5,100 customers worldwide to achieve optimal security by deliveringa proven and award-winning solution portfolio that includes Vulnerability Management, Endpoint Protection, DataProtection, Antivirus and Reporting and Compliance offerings. Headquartered in Scottsdale, Arizona, Lumension hasoperations worldwide. Lumension: IT Secured. Success Optimized.™Symantec | www.symantec.comSymantec protects the world’s information, and is a global leader in security, backup and availability solutions. Ourinnovative products and services protect people and information in any environment – from the smallest mobile device,to the enterprise data center, to cloud-based systems. Our world-renowned expertise in protecting data, identities andinteractions gives our customers confidence in a connected world.KPMG | www.kpmg.comKPMG delivers a globally consistent set of multidisciplinary services based on deep industry knowledge. Our industryfocus helps KPMG professionals develop a rich understanding of clients’ businesses and the insight, skills, and resourcesrequired to address industry-specific issues and opportunities..MailGuard | www.mailguard.com.auThe MailGuard Group was founded in 2001 to address the growing online security concerns of business. Recognising thatorganisations needed a simple and inexpensive way to manage unwanted email and web content, we pioneered a rangeof cloud security solutions to provide complete protection against online threats. Today, we’ve built upon our reputation asa technological innovator to become a trusted name in enterprise cloud security.Zimbani | www.zimbani.com.auZimbani is an innovative technology consulting firm with a special focus on information security, mobility and cloud.We help businesses acquire a competitive edge by incorporating the latest technology that can improve their currentperformance as well as prepare them for future challenges. Our extensive experience in the industry has helped usdeliver capabilities that can ultimately optimise the service and products offered by our customers. Our aim is to providebusinesses with highly cost effective, trustworthy, productive and innovative solutions that will add value to your business.With our help our clients have been able to deliver secure, efficient and adaptive services with ease.SPONSORS
    • BYOD & MOBILE SECURITY | Read the 2013 survey results 25About the Information Security CommunityOver 160,000+ members make the InformationSecurity Community on Linkedin is the word’s largestcommunity of infosec professionals. We are buildinga network of infosec professionals that connectspeople, opportunities, and ideas. If you are involved inpurchasing, selling, designing, managing, deploying,using ... or learning about information security solutionsan concepts - this group is for you.Join theINFORMATIONSECURITYCommunityon LinkedInInformationSecurityGroup PartnerMany thanks to everybody who participated in this survey.If you are interested in co-sponsoring upcoming surveys, or creating yourown survey report, please contact Holger Schulze at hhschulze@gmail.com.THANK YOU
    • BYOD & MOBILE SECURITY | Read the 2013 survey results 26Holger Schulze is a B2B technology marketingexecutive delivering demand, brand awareness,and revenue growth for high-tech companies.A prolific blogger and online community builder,Holger manages the B2B Technology MarketingCommunity on LinkedIn with over 42,000members and writes about B2B marketing trendsin his blog Everything Technology Marketing.Our goal is to inform and educate B2B marketersabout new trends, share marketing ideas andbest practices, and make it easier for you to findthe information you care about to do your jobssuccessfully.Holger SchulzeB2B MarketerEmailhhschulze@gmail.comFollow Holger on Twitterhttp://twitter.com/holgerschulzeSubscribe to Holger’sTechnology Marketing Bloghttp://everythingtechnologymarketing.blogspot.comABOUT THE AUTHOR