SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
SECURITYCONFIDENCE
G A P
IT DECISION MAKERS &
MOBILE WORKFORCES
fo
rworkers on thero
ad
47%
Imation’s IronKey solutions meet the challenge of
protecting today’s mobile workforce,
featuring USB solutions for data transport and mobile workspaces
www.ironkey.com
The survey was conducted online in the United States, Canada, Germany and the
UK by Harris Interactive on behalf of Imation from January 14 – 28, 2013 among
200 US, 100 Canadian, 100 German and 100 UK IT decision makers, defined as
adults aged 18 years or older who are employed full or part time in an Information
Technology (IT) department of a company with revenues of $500 million or more
(US Dollars) and are either the sole decision maker or have a major influence in
decisions regarding the IT for their company. This online survey is not based on a
probability sample and therefore no estimate or theoretical sampling error can be
calculated. For complete survey methodology, including weighting variables,
please contact imation@schwartzmsl.com.
Imation, the Imation logo, IronKey, and the IronKey logo are trademarks of Imation Corp. and its subsidiaries.
All other trademarks are property of their respective owners.
This drops to 55%
And further
still to
47%
73% of IT decision makers across the
United States, Canada, Germany and the UK
are either “extremely confident” or “very
confident” that data accessed by employees
is protected from loss of theft.
for
w
orkers who are intheo
ffi
ce
73%
for
em
ployees workingat
home
55%
Most Companies Allow
USB Flash Drives
More than 80% of companies across
all geographies surveyed
and 83% in
the U.S.
More than 70% of companies across
all geographies surveyed
and 70% in
the U.S.
...and Rising Worker Mobility
Across all countries surveyed, at least 20% of employees, on average, worked remotely in 2012
and IT decision makers expect this figure to increase to at least 25% in 2013
Consequences of Data Breaches in the U.S.
were worried about the
headache to fix the mess
were worried about the
bad media coverage
for the company
were worried about the
financial fines or fees
More than 90% of companies
across all geographies surveyed had
a mobile device usage policy
In the U.S. 83% of
IT decision makers say the policy exists
and was enforced
Despite Widespread Policy Enforcement...
Most Companies Allow
External Hard Drives
72% 69% 63%
were worried about the
loss of customers
were worried about the
loss of employment
47% 45%
59%
of companies in the U.S. enforce the mobile device policy by
only allowing employees to use approved devices
38% say their employees are only allowed to used devices supplied by their company
Confidence in
The Security of an
IT Environment Drops
as Workers Become
More Mobile
Policy Enforcement
Company-Approved Preferred Over Company-Supplied

Contenu connexe

Similaire à Imation infographic us

Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey ReportDImension Data
 
Ibm's global ai adoption index 2021 executive summary
Ibm's global ai adoption index 2021 executive summaryIbm's global ai adoption index 2021 executive summary
Ibm's global ai adoption index 2021 executive summaryEmisor Digital
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissEnterprise Mobile
 
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...Thierry Labro
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudSymantec
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSilicon Valley Bank
 
Melbourne ICT Scorecard
Melbourne ICT ScorecardMelbourne ICT Scorecard
Melbourne ICT ScorecardVishal Sharma
 
White paper balance between embedded operating system security features and a...
White paper balance between embedded operating system security features and a...White paper balance between embedded operating system security features and a...
White paper balance between embedded operating system security features and a...Javier Gonzalez
 
White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...Samsung Biz Mobile
 
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014Edelman
 
Mobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceMobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceBlueboxer2014
 
The impact of mobile devices on information security
The impact of mobile devices on information securityThe impact of mobile devices on information security
The impact of mobile devices on information securityBee_Ware
 
The changing face of ICT decision making
The changing face of ICT decision makingThe changing face of ICT decision making
The changing face of ICT decision makingTalkTalk Business
 
The Chief Data Officer: Bridging the gap between data and decision-making
The Chief Data Officer: Bridging the gap between data and decision-makingThe Chief Data Officer: Bridging the gap between data and decision-making
The Chief Data Officer: Bridging the gap between data and decision-makingExperian Data Quality
 
Ivanti Threat Thursday for October 24
Ivanti Threat Thursday for October 24Ivanti Threat Thursday for October 24
Ivanti Threat Thursday for October 24Ivanti
 
Survey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsOsterman Research, Inc.
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 

Similaire à Imation infographic us (20)

Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report2014 Secure Mobility Survey Report
2014 Secure Mobility Survey Report
 
Ibm's global ai adoption index 2021 executive summary
Ibm's global ai adoption index 2021 executive summaryIbm's global ai adoption index 2021 executive summary
Ibm's global ai adoption index 2021 executive summary
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
 
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
 
SVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - OverviewSVB Cybersecurity Impact on Innovation Report - Overview
SVB Cybersecurity Impact on Innovation Report - Overview
 
Melbourne ICT Scorecard
Melbourne ICT ScorecardMelbourne ICT Scorecard
Melbourne ICT Scorecard
 
White paper balance between embedded operating system security features and a...
White paper balance between embedded operating system security features and a...White paper balance between embedded operating system security features and a...
White paper balance between embedded operating system security features and a...
 
White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...White Paper: Balance Between Embedded Operating System Security Features and ...
White Paper: Balance Between Embedded Operating System Security Features and ...
 
The consumerization of it
The consumerization of itThe consumerization of it
The consumerization of it
 
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
 
Mobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceMobile Security Trends in the Workplace
Mobile Security Trends in the Workplace
 
The impact of mobile devices on information security
The impact of mobile devices on information securityThe impact of mobile devices on information security
The impact of mobile devices on information security
 
The changing face of ICT decision making
The changing face of ICT decision makingThe changing face of ICT decision making
The changing face of ICT decision making
 
The Chief Data Officer: Bridging the gap between data and decision-making
The Chief Data Officer: Bridging the gap between data and decision-makingThe Chief Data Officer: Bridging the gap between data and decision-making
The Chief Data Officer: Bridging the gap between data and decision-making
 
Ivanti Threat Thursday for October 24
Ivanti Threat Thursday for October 24Ivanti Threat Thursday for October 24
Ivanti Threat Thursday for October 24
 
Survey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate Environments
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019The 10 most disruptive enterprise mobility solution providers of 2019
The 10 most disruptive enterprise mobility solution providers of 2019
 

Imation infographic us

  • 1. SECURITYCONFIDENCE G A P IT DECISION MAKERS & MOBILE WORKFORCES fo rworkers on thero ad 47% Imation’s IronKey solutions meet the challenge of protecting today’s mobile workforce, featuring USB solutions for data transport and mobile workspaces www.ironkey.com The survey was conducted online in the United States, Canada, Germany and the UK by Harris Interactive on behalf of Imation from January 14 – 28, 2013 among 200 US, 100 Canadian, 100 German and 100 UK IT decision makers, defined as adults aged 18 years or older who are employed full or part time in an Information Technology (IT) department of a company with revenues of $500 million or more (US Dollars) and are either the sole decision maker or have a major influence in decisions regarding the IT for their company. This online survey is not based on a probability sample and therefore no estimate or theoretical sampling error can be calculated. For complete survey methodology, including weighting variables, please contact imation@schwartzmsl.com. Imation, the Imation logo, IronKey, and the IronKey logo are trademarks of Imation Corp. and its subsidiaries. All other trademarks are property of their respective owners. This drops to 55% And further still to 47% 73% of IT decision makers across the United States, Canada, Germany and the UK are either “extremely confident” or “very confident” that data accessed by employees is protected from loss of theft. for w orkers who are intheo ffi ce 73% for em ployees workingat home 55% Most Companies Allow USB Flash Drives More than 80% of companies across all geographies surveyed and 83% in the U.S. More than 70% of companies across all geographies surveyed and 70% in the U.S. ...and Rising Worker Mobility Across all countries surveyed, at least 20% of employees, on average, worked remotely in 2012 and IT decision makers expect this figure to increase to at least 25% in 2013 Consequences of Data Breaches in the U.S. were worried about the headache to fix the mess were worried about the bad media coverage for the company were worried about the financial fines or fees More than 90% of companies across all geographies surveyed had a mobile device usage policy In the U.S. 83% of IT decision makers say the policy exists and was enforced Despite Widespread Policy Enforcement... Most Companies Allow External Hard Drives 72% 69% 63% were worried about the loss of customers were worried about the loss of employment 47% 45% 59% of companies in the U.S. enforce the mobile device policy by only allowing employees to use approved devices 38% say their employees are only allowed to used devices supplied by their company Confidence in The Security of an IT Environment Drops as Workers Become More Mobile Policy Enforcement Company-Approved Preferred Over Company-Supplied