Contents. The BYOD Trojan Horse 2

Size: px
Start display at page:

Download "Contents. The BYOD Trojan Horse 2"

Transcription

1 Sponsored by

2 Contents Introduction... 3 Rapid Adoption of Enterprise Mobility Continues... 4 Data Security Biggest Challenge When Implementing BYOD Policies... 5 Risk Reduction Policies Are a High Priority for Organizations Seeking to Mitigate Mobile App Security Risks... 6 Most Organizations Are Not Taking Action to Block Risky App Behaviors... 7 Conclusion... 9 Infographic Survey Background Methodology and Sampling Survey Demographics Location of Respondents Respondents Vertical Market Software Licensing and Provisioning Research at IDC About Flexera Software The BYOD Trojan Horse 2

3 The BYOD Trojan Horse: Dangerous Mobile App Behaviors & Back-Door Security Risks A Report by Flexera Software with input from IDC Introduction In the aftermath of the Sony hacker incident, IT Security once again is in the spotlight. Connected organizations are being especially vigilant against malicious players seeking to gain entrance into their networks and do harm. With the rapid infusion of mobile devices within the enterprise and the growing adoption of Bring Your Own Device (BYOD) mobility is also fast becoming another focal point for containing security risk. Shoring up networks to defend against mobile hacker threats is certainly a high IT priority. But what about less obvious risks posed by mobile devices and the apps running on them? Consider a seemingly innocuous mobile phone flashlight app. Recently a Federal Trade Commission lawsuit revealed that a flashlight app maker was illegally transmitting users precise locations and unique device identifiers to third parties, including advertising networks. Or consider the Environmental Protection Agency s (EPA) embarrassment occurring recently when an employee playing on a Kim Kardashian Hollywood app tweeted out to the EPA s 52,000 Twitter followers, I m now a C-List celebrity in Kim Kardashian: Hollywood. Come join me and become famous too by playing on iphone! What happened? The employee was using the app on her BYOD device. Unbeknownst to the employee, the app had the ability to automatically access the phone s twitter account and tweet out messages when certain game thresholds were reached. Unfortunately for the EPA the BYOD device was connected to the EPA s official twitter account not the employee s. What s the lesson here? Mobile app security risk is not limited to malevolent hackers and unfriendly governments. Threats to corporate data and reputation can be hidden like a trapdoor in a Trojan horse in the most seemingly innocuous apps, and can be unleashed on the organization by the most well-intentioned employee. Because of these hidden risks, we wanted to understand whether enterprises are aware of the risky behaviors associated with mobile apps that could compromise data security, and if so, what they re doing about it. The BYOD Trojan Horse 3

4 Bring-Your-Own - Device (BYOD) policy Mobile device management solution (MDM) Mobile application management solution (MAM) Rapid Adoption of Enterprise Mobility Continues According to our survey, enterprises are rapidly implementing the policies and infrastructure necessary to support broad employee access to mobile devices and applications. For instance, 29 percent of respondents have already implemented a mobile device management solution, 20 percent are doing so now, and another 27 percent plan on doing so within two years. 17 percent of respondents have already implemented a mobile application management solution, 15 percent are doing so now, and another 32 percent plan on doing so within two years. From a security perspective, BYOD policy implementation is an essential counterpart to mobility adoption. According to the survey, 28 percent of respondents have already implemented a BYOD policy, 20 percent are doing so now, and another 23 person plan on doing so within two years. Indicate your organization s plans to implement any of the following IT Services: 120% 100% 80% 60% 40% 20% 0% 30% 25% 23% 27% 20% 20% 28% 29% 36% 32% 15% 17% No plans to implement Will implement within months Implementing now Already implemented The BYOD Trojan Horse 4

5 Software license tracking, management and optimization for mobile devices Data security Lack of knowledge of mobile application behavior in the enterprise Keeping applications for devices updated and ensuring compatibility with current IT environment Creating and enforcing a BYOD policy We are not implementing BYOD but plan on doing so within months We are not implementing BYOD and have no plans to Data Security Biggest Challenge When Implementing BYOD Policies The BYOD policy memorializes an organization s approach to mobility, and among other things, the rules employees must follow in order to access corporate data and systems from their mobile devices. According to the survey, organizations face a variety of challenges around BYOD policy implementation. Not surprisingly the largest percentage of respondents 71 percent say ensuring data security is one of the biggest challenges they face around implementing BYOD policies. 43 percent say creating and enforcing the BYOD policy counts among their biggest challenges, and another 43 percent say software license tracking, management and optimization of mobile devices are significant challenges. What are the biggest challenges your organization faces implementing BYOD policies? 80% 70% 60% 50% 40% 30% 20% 0% 43% 71% 26% 40% 43% 11% 14% The BYOD Trojan Horse 5

6 User education Policies that block risky app behaviors App containerization and wrapping Restricting access to public store apps We don t have policies blocking risky app behaviors We don t have policies blocking risky app behaviors but we plan on implementing them within the next months Risk Reduction Policies Are a High Priority for Organizations Seeking to Mitigate Mobile App Security Risks Given respondents accelerating enterprise adoption of mobility, their broad concerns around security, and broad adoption of BYOD policies as mechanisms for controlling risk we wanted to examine how far those policies go. Do they reflect a comprehensive awareness of the less obvious risks associated with mobile app behaviors that could serve as a Trojan horse, allowing hidden risk to enter the enterprise? According to the survey, a sizeable minority of enterprises are at least aware mobile apps can exhibit risky behaviors and they re taking some action. 47 percent are implementing BYOD policies to block risky mobile app behaviors. Another 22 percent plan on implementing those policies within two years. User education is also an important tool that 50 percent of enterprises are using to mitigate mobile app security risks. How is your organization mitigating the risks associated with mobile apps? 60% 50% 40% 50% 47% 30% 20% 27% 27% 18% 22% 0% The BYOD Trojan Horse 6

7 Most Organizations Are Not Taking Action to Block Risky App Behaviors While a majority of respondents are or plan on instituting policies that prohibit risky app behaviors, in practice most are not taking action to enforce those policies. For instance, key to enforcing policies against risky app behaviors is knowing what risky behaviors should be prohibited in the first place. Do features that allow the app to access a mobile device s GPS chip constitute risky behavior? What about features allowing an app to access and post to social media apps, or those allowing an app to report user and device data back to the app producer? Once risky behaviors are identified, have organizations identified the specific apps exhibiting those behaviors for the purpose of enforcing their BYOD policy? From blocking the app altogether to putting it in a container to protect the corporate network from a prohibited behavior an organization cannot enforce a policy until it has identified the type of behavior constituting a threat, and the apps causing those threats. According to the survey, most organizations 61 percent -- have not even identified which app behaviors they deem risky. Likewise, a majority of organizations 55 percent have not identified specific mobile apps that exhibit risky behaviors. Has your organization identified which mobile app behaviors it deems risky? 61% 39% Yes No Has your organization identified specific mobile applications? 55% 45% Yes No The BYOD Trojan Horse 7

8 Improved employee efficiency/productivity Improved employee satisfaction Lower IT infrastructure, device and support costs Lower enterprise application risk Employee access to more cutting-edge, upto-date devices We ve implemented BYOD but have not achieved the benefits we anticipated Organizations Are Not Realizing Significant Risk Reduction from their BYOD Policies As noted earlier, BYOD policies are only as effective as the steps organizations take to monitor and enforce those policies. For instance, once organizations understand which risky app behaviors are prohibited, it must then test those apps allowed onto BYOD devices in order to understand which ones exhibit prohibited behaviors. In light of the survey results, which indicated that only a minority of respondents have identified risky app behavior and risky mobile apps, it is not surprising that most organizations likewise report that they are not realizing significant risk reduction from their BYOD policies. Only 16 percent cite lower enterprise application risk as a benefit experienced as a result of their BYOD policy. If you ve already implemented BYOD at your organization, what benefits have you experienced? (check all that apply) 60% 50% 40% 30% 20% 0% 43% 55% 41% 16% 26% 17% The BYOD Trojan Horse 8

9 Conclusion Enterprises are accelerating their adoption of mobile devices as a critical component of the IT mix. And as they do so, security naturally is a high priority. Organizations are broadly implementing BYOD policies to shore up their security especially in light of concerns about the risky behaviors mobile apps are capable of that can threaten sensitive corporate data, vulnerable networks and reputation. However enterprises still have a long way to go to take the actions necessary to enforce their policies. Organizations are still largely unaware of the specific behaviors mobile apps are capable of. Moreover, most enterprises have still not taken action to block apps that exhibit those risky behaviors violating their BYOD security policies. It is not surprising, therefore, that while organizations do report many benefits resulting from BYOD lower application risk is not one of them. The BYOD Trojan Horse 9

10 Infographic The BYOD Trojan Horse 10

11 Survey Background This report is based on the 2015 Application Usage and Value survey, conducted by Flexera Software with input from IDC s Software Pricing and Licensing Research division under the direction of Amy Konary, Research Vice President - Software Licensing and Provisioning at IDC. This annual research project looks at software licensing, compliance and installation trends and best practices. The survey reaches out to executives at software vendors, intelligent device manufacturers as well as the enterprises that purchase and use software and devices. Methodology and Sampling The data contained in this report is based on three Application Usage and Value surveys, one targeted at independent software vendors (ISVs), one targeted at intelligent device manufacturers, and one at end-user organizations that consume enterprise software. More than 583 respondents participated, including executives and IT professionals from 264 software vendors, 172 hardware device manufacturers and 147 enterprise organizations. Survey Demographics Location of Respondents Of the 583 respondents to the survey, 53 percent reported their division headquarters as being located in the United States. 6 percent were from India, 4 percent from the United Kingdom, 4 percent from Australia & New Zealand, 3 percent from Germany and 1 percent from France. The BYOD Trojan Horse 11

12 Respondents Division Headquarters 1% 1% 1% 1% 1% 1% 1% 1% 0% 1% 1% 2% 3% 3% 4% 6% 53% United States India United Kingdom Germany Australia Italy Canada New Zealand France Netherlands Brazil China Finland Mexico Pakistan Sweden Croatia Respondents Vertical Market Respondents fell across a wide array of vertical markets. With respect to Enterprise Respondents, 20 percent were from the Business/IT Consulting Services industry, 12 percent from the Government/Public Sector and 10 percent were from the education, Financial Services, healthcare, Oil/Gas/Utility industries respectively. The BYOD Trojan Horse 12

13 Which of the following best describes your organization s vertical market? 20% 2% 3% 6% 12% Automotive Aerospace/Defense Consumer Goods Government/Public Sector Education 7% Financial Services Healthcare Oil/Gas/Utility Technology Manufacturing Business/IT Consulting Services With respect to software vendor respondents, 17 percent were from the financial industry, 16 percent from consumer, and 13 percent from Healthcare/Medical industry. Which of the following best describes the type of enterprise software your company develops? Electronic Design Automation (EDA) 6% 6% 16% 2% 13% Human Resources Management (Including Performance, Payroll and Talent Management) Healthcare/Medical Financial (Including Accounting, Billing, Forecasting) Enterprise Resource Planning (ERP) Customer Relationship Management (CRM) Product Lifecycle Management (PLM) 2% 11% 5% 8% 7% 17% Business Intelligence Database Management (Including Master Database Management) Project Management Retail Consumer With respect to hardware device maker respondents, 23 percent are from the telecommunications/network equipment providers industry, 20 percent from the computer The BYOD Trojan Horse 13

14 equipment and peripherals space, and 20 percent from the industrial/manufacturing automation space. Which of the following best describes your organization s vertical market? Telecommunications/Network Equipment Providers 12% 5% 4% 6% 23% Computer Equipment and Peripherals Industrial/Manufacturing Automation Building Automation Healthcare/Medical Devices 20% 20% Electronic Test and Measurement Equipment Automotive (Including Infotainment) Consumer Electronics (Including Home Automation) The BYOD Trojan Horse 14

15 Software Licensing and Provisioning Research at IDC IDC's global Software Licensing and Provisioning research practice is directed by Amy Konary. In this role, Ms. Konary is responsible for providing coverage of software go-to-market trends including volume license programs, evolving license models, global price management, and licensing technologies through market analysis, research and consulting. In her coverage of software maintenance, subscription, electronic software distribution and licensing technologies, Ms. Konary has been instrumental in forecasting future market size and growth. Ms. Konary was also the lead analyst for IDC's coverage of software as a service (SaaS) for eight years prior to focusing exclusively on pricing, licensing, and delivery. International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. For more information about IDC, please see About Flexera Software Flexera Software helps application producers and enterprises increase application usage and the value they derive from their software. Our next-generation software licensing, compliance and installation solutions are essential to ensure continuous licensing compliance, optimized software investments and to future-proof businesses against the risks and costs of constantly changing technology. Over 80,000 customers turn to Flexera Software as a trusted and neutral source for the knowledge and expertise we have gained as the marketplace leader for over 25 years and for the automation and intelligence designed into our products. For more information, please go to Flexera Software, LLC United Kingdom (Europe, Australia (Asia, For more locations visit: (Global Headquarters) Middle East Headquarters): Pacific Headquarters): The BYOD Trojan Horse 15

Rethink Enterprise Endpoint Security In The Cloud Computing Era

Rethink Enterprise Endpoint Security In The Cloud Computing Era A Forrester Consulting Thought Leadership Spotlight Commissioned By Google September 2017 Rethink Enterprise Endpoint Security In The Cloud Computing Era Project Director: Karin Fenty, Senior Market Impact

More information

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner MOBILE SECURITY 2017 SPOTLIGHT REPORT Group Partner Information Security PRESENTED BY OVERVIEW Security and privacy risks are on the rise with the proliferation of mobile devices and their increasing use

More information

Mastering The Endpoint

Mastering The Endpoint Organizations Find Value In Integrated Suites GET STARTED Overview In the face of constantly evolving threat vectors, IT security decision makers struggle to manage endpoint security effectively. More

More information

GLOBAL PKI TRENDS STUDY

GLOBAL PKI TRENDS STUDY 2018 GLOBAL PKI TRENDS STUDY Sponsored by Thales esecurity Independently conducted by Ponemon Institute LLC SEPTEMBER 2018 EXECUTIVE SUMMARY #2018GlobalPKI Mi Ponemon Institute is pleased to present the

More information

Data Loss Prevention - Global Market Outlook ( )

Data Loss Prevention - Global Market Outlook ( ) Report Information More information from: https://www.wiseguyreports.com/reports/826969-data-loss-prevention-global-market-outlook-2016-2022 Data Loss Prevention - Global Market Outlook (2016-2022) Report

More information

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: October Sponsored by Introduction Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information is easily transported outside of managed environments,

More information

DaaS Market Report Workspace Services and Desktops-as-a-Service Global Market Trends: The Service Provider Perspective

DaaS Market Report Workspace Services and Desktops-as-a-Service Global Market Trends: The Service Provider Perspective DaaS Market Report 2017 2017 Workspace Services and Desktops-as-a-Service Global Market Trends: The Service Provider Perspective Survey shows jump in traditional Value Added Resellers (VARs) embracing

More information

Vulnerability Management Trends In APAC

Vulnerability Management Trends In APAC GET STARTED Introduction In the age of the customer, the threat landscape is constantly evolving. Attackers are out to steal your company s data, and the ever-expanding number of devices and technologies

More information

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY: June 2013 Sponsored by Introduction Mobile devices cause ongoing concern for IT teams responsible for information security. Sensitive corporate information can be easily transported and lost, while the

More information

Digital Forensics - Global Market Outlook ( )

Digital Forensics - Global Market Outlook ( ) Report Information More information from: https://www.wiseguyreports.com/reports/456593-digital-forensics-global-market-outlook-2015-2022 Digital Forensics - Global Market Outlook (2015-2022) Report /

More information

Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary

Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary Vertical Market Trends: Western Europe, (Executive Summary) Executive Summary Publication Date: 21 March 2003 Authors Cathy Tornbohm Peter Redshaw This document has been published to the following Marketplace

More information

IFC ENERGY STORAGE MARKET REPORT

IFC ENERGY STORAGE MARKET REPORT IFC ENERGY STORAGE MARKET REPORT DEVELOPMENTS AND OPPORTUNITIES FOR ENERGY STORAGE IN EMERGING MARKETS JANUARY 9, 2016 ANISSA DEHAMNA PRINCIPAL RESEARCH ANALYST NAVIGANT RESEARCH 1 / 2016 NAVIGANT CONSULTING,

More information

Security in India: Enabling a New Connected Era

Security in India: Enabling a New Connected Era White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile

More information

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers Mid-Market Data Center Purchasing Drivers, Priorities and Barriers Featuring Sophia Vargas, Forrester Research Inc. 30 May 2014 Introducing today s presenters: Matt Miszewski Senior Vice President of Sales

More information

TechValidate Survey Report: SaaS Application Trends and Challenges

TechValidate Survey Report: SaaS Application Trends and Challenges TechValidate Survey Report: SaaS Application Trends and Challenges TechValidate Survey Report: SaaS Application Trends and Challenges 2 The current growth rates and investments in SaaS are astounding.

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

Application Delivery Strategies for Today s Increasingly Mobile Workforce

Application Delivery Strategies for Today s Increasingly Mobile Workforce White Paper Application Delivery Strategies for Today s Increasingly Mobile Workforce Sponsored by: Parallels Avinash Kalyana Sundaram November 2016 IDC OPINION Organizations in Asia/Pacific are increasingly

More information

Content Delivery Network (CDN) - Global Market Outlook ( )

Content Delivery Network (CDN) - Global Market Outlook ( ) Published on Market Research Reports Inc. (https://www.marketresearchreports.com) Home > Content Delivery Network (CDN) - Global Market Outlook (2015-2022) Content Delivery Network (CDN) - Global Market

More information

2018 Mobile Security Report

2018 Mobile Security Report 2018 Mobile Security Report CONTENTS Introduction 3 Businesses suspect their mobile workers are being hacked 4 Cafés, airports and hotels: a hotspot for Wi-Fi related security incidents 5 BYOD: Bring Your

More information

As Enterprise Mobility Usage Escalates, So Does Security Risk

As Enterprise Mobility Usage Escalates, So Does Security Risk YOUR SECURITY. CONNECTED WHITE PAPER As Enterprise Mobility Usage Escalates, So Does Security Risk Even as more organizations embrace the use of mobile devices by employees and customers to access services

More information

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT 2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT THYCOTIC 2018 GLOBAL CHANNEL PARTNER SURVEY Channel Partner survey highlights client cybersecurity concerns and opportunities for

More information

Operationalize Security To Secure Your Data Perimeter

Operationalize Security To Secure Your Data Perimeter Operationalize Security To Secure Your Data Perimeter GET STARTED Protecting Your Data Without Sacrificing Business Agility Every day, companies generate mountains of data that are critical to their business.

More information

Tripwire State of Container Security Report

Tripwire State of Container Security Report RESEARCH Tripwire State of Container Security Report January 2019 FOUNDATIONAL CONTROLS FOR SECURITY, COMPLIANCE & IT OPERATIONS As DevOps continues to drive increased use of containers, security teams

More information

Third Annual Green IT & Sustainability Survey: U.S. Results and Services Implications

Third Annual Green IT & Sustainability Survey: U.S. Results and Services Implications Third Annual Green IT & Sustainability Survey: U.S. Results and Services Implications Gard Little Research Manager Worldwide Services, Global Services Markets & Trends 2009 IDC 1 Agenda Overview of the

More information

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it

More information

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more - Samsung Tablet Photo - Tablets Mean Business Survey of IT pros reflects growing trend toward tablets for workforce mobility and more Table of contents Introduction 2 Giving employees what they want pays

More information

Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach

Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach White Paper Optimizing Infrastructure Management with Predictive Analytics: The Red Hat Insights Approach Sponsored by: Red Hat Tim Grieser January 2018 IN THIS WHITE PAPER This IDC White Paper discusses

More information

Oracle Buys Automated Applications Controls Leader LogicalApps

Oracle Buys Automated Applications Controls Leader LogicalApps Oracle Buys Automated Applications Controls Leader LogicalApps To strengthen Oracle s Governance, Risk and Compliance Suite with Real-time Policy Enforcement October 26, 2007 Disclaimer The following is

More information

The Problem with Privileged Users

The Problem with Privileged Users Flash Point Paper Enforce Access Control The Problem with Privileged Users Four Steps to Reducing Breach Risk: What You Don t Know CAN Hurt You Today s users need easy anytime, anywhere access to information

More information

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments White Paper The Emerging Role of a CDN in Facilitating Secure Cloud Deployments Sponsored by: Fastly Robert Ayoub August 2017 IDC OPINION The ongoing adoption of cloud services and the desire for anytime,

More information

Modern Compute Is The Foundation For Your IT Transformation

Modern Compute Is The Foundation For Your IT Transformation A Forrester Consulting Thought Leadership Paper Commissioned By Dell EMC And Intel February 2018 Modern Compute Is The Foundation For Your IT Transformation Failure To Update Can Stunt Your Growth Table

More information

Security Survey Executive Summary October 2008

Security Survey Executive Summary October 2008 A government technology Executive Survey Summary: HP Security Survey Executive Summary October 2008 Produced by: In Partnership With: Introduction Information is paramount to the survival of government

More information

The State of Cloud Monitoring

The State of Cloud Monitoring REPORT The State of Cloud Monitoring Survey Reveals Visibility is Key to Cloud Security and Performance INTRODUCTION Ixia, a Keysight business, commissioned Dimensional Research to conduct a survey measuring

More information

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services

Predictive Insight, Automation and Expertise Drive Added Value for Managed Services Sponsored by: Cisco Services Author: Leslie Rosenberg December 2017 Predictive Insight, Automation and Expertise Drive Added Value for Managed Services IDC OPINION Competitive business leaders are challenging

More information

Are You Protected. Get Ahead of the Curve

Are You Protected. Get Ahead of the Curve Are You Protected Get Ahead of the Curve DEMOGRAPHICS INTERVIEWED 2,200 IT DECISION- MAKERS IN 3 REGIONS: 500 Americas 1,100 Europe, Middle East, and Africa 600 Asia Pacific Japan INDEPENDENT RESEARCH

More information

IT Monitoring Tool Gaps are Impacting the Business A survey of IT Professionals and Executives

IT Monitoring Tool Gaps are Impacting the Business A survey of IT Professionals and Executives IT Monitoring Tool Gaps are Impacting the Business A survey of IT Professionals and Executives June 2018 1 Executive Summary This research finds that large enterprise customers and employees endure a substantial

More information

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES

THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES THE STATE OF MEDIA SECURITY HOW MEDIA COMPANIES ARE SECURING THEIR ONLINE PROPERTIES TABLE OF CONTENTS 3 Introduction 4 Survey Findings 4 Recent Breaches Span a Broad Spectrum 4 Site Downtime and Enterprise

More information

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services Solution Overview Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services OPTIMIZE YOUR CLOUD SERVICES TO DRIVE BETTER BUSINESS OUTCOMES Reduce Cloud Business Risks and Costs

More information

The Black Box Institute

The Black Box Institute The Black Box Institute Enterprise Mobility Management Nov 15, 2016 The Black Box Institute 2016 Our speakers today Maneesh Mehta Malcolm Campbell Co-founder, The Black Box Institute Clients include: Nortel,

More information

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN Perimeter Defenses Enterprises need to take their security strategy beyond stacking up layers of perimeter defenses to building up predictive

More information

VMware vcloud Air Network Service Providers Ensure Smooth Cloud Deployment

VMware vcloud Air Network Service Providers Ensure Smooth Cloud Deployment VMware vcloud Air Network Service Providers Ensure Smooth Cloud Deployment RELIABLE, FAMILIAR INFRASTRUCTURE BACKED BY VMWARE AND DELIVERED THROUGH PARTNERS HELPS OPTIMIZE CLOUD INVESTMENTS AS ENTERPRISES

More information

GLOBAL ENCRYPTION TRENDS STUDY

GLOBAL ENCRYPTION TRENDS STUDY GLOBAL ENCRYPTION TRENDS STUDY April 2017 EXECUTIVE SUMMARY EXECUTIVE SUMMARY Ponemon Institute is pleased to present the findings of the 2017 Global Encryption Trends Study, sponsored by Thales e-security.

More information

Second International Barometer of Security in SMBs

Second International Barometer of Security in SMBs 1 2 Contents 1. Introduction. 3 2. Methodology.... 5 3. Details of the companies surveyed 6 4. Companies with security systems 10 5. Companies without security systems. 15 6. Infections and Internet threats.

More information

ForeScout Extended Module for Splunk

ForeScout Extended Module for Splunk Enterprise Strategy Group Getting to the bigger truth. ESG Lab Review ForeScout Extended Module for Splunk Date: May 2017 Author: Tony Palmer, Senior Lab Analyst Abstract This report provides a first look

More information

Mobile App Development Market Research Report- Global Forecast to 2022

Mobile App Development Market Research Report- Global Forecast to 2022 Report Information More information from: https://www.marketresearchfuture.com/reports/1752 Mobile App Development Market Research Report- Global Forecast to 2022 Report / Search Code: MRFR/ICT/1220-HCRR

More information

How Your Organization Can Drive Success in the Age of Digital Disruption

How Your Organization Can Drive Success in the Age of Digital Disruption How Your Organization Can Drive Success in the Age of Digital Disruption Produced by How Your Organization Can Drive Success in the Age of Digital Disruption Digital success isn t just about technology,

More information

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT:

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: 2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: A SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN THE ASIA-PACIFIC REGION April 2014 Sponsored by: 2014 NETWORK SECURITY & CYBER RISK MANAGEMENT:

More information

Ponemon Institute s 2018 Cost of a Data Breach Study

Ponemon Institute s 2018 Cost of a Data Breach Study Ponemon Institute s 2018 Cost of a Data Breach Study September 18, 2018 1 IBM Security Speakers Deborah Snyder CISO State of New York Dr. Larry Ponemon Chairman and Founder Ponemon Institute Megan Powell

More information

Personal Emergency Response Systems (PERS) - Global Market Outlook ( )

Personal Emergency Response Systems (PERS) - Global Market Outlook ( ) Published on Market Research Reports Inc. (https://www.marketresearchreports.com) Home > Personal Emergency Response Systems (PERS) - Global Market Outlook (2015-2022) Personal Emergency Response Systems

More information

Are you protected? Get ahead of the curve Global data protection index

Are you protected? Get ahead of the curve Global data protection index Are you protected? Get ahead of the curve Global data protection index 1 Demographics Interviewed 2,200 IT decision-makers In 3 regions: 500 Americas 1,100 Europe, Middle East, and Africa 600 Asia Pacific

More information

Securing Today s Mobile Workforce

Securing Today s Mobile Workforce WHITE PAPER Securing Today s Mobile Workforce Secure and Manage Mobile Devices and Users with Total Defense Mobile Security Table of Contents Executive Summary..................................................................................

More information

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and the Case For Automated Sandboxing

ENDPOINT SECURITY WHITE PAPER. Endpoint Security and the Case For Automated Sandboxing WHITE PAPER Endpoint Security and the Case For Automated Sandboxing A World of Constant Threat We live in a world of constant threat. Every hour of every day in every country around the globe hackers are

More information

WHY MOBILE SECURITY SHOULD BE IN YOUR TOP PRIORITIES

WHY MOBILE SECURITY SHOULD BE IN YOUR TOP PRIORITIES WHY MOBILE SECURITY SHOULD BE IN YOUR TOP PRIORITIES Icons used in this book Throughout this book, you ll find special call-outs to direct your attention to important information. Here s a key that explains

More information

ACHIEVING FIFTH GENERATION CYBER SECURITY

ACHIEVING FIFTH GENERATION CYBER SECURITY ACHIEVING FIFTH GENERATION CYBER SECURITY A Survey Research Report of IT and Security Professionals MARCH 2018 INTRODUCTION The pursuit of the highest level of cyber security is a top priority for IT and

More information

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions

More information

Best wishes for 2018! Bryan Ware, CEO. Haystax Technology INSIDER THREAT PREDICTIONS FOR

Best wishes for 2018! Bryan Ware, CEO.  Haystax Technology INSIDER THREAT PREDICTIONS FOR See our insider threat predictions for 2018 based on data from nearly 1,500 companies that participated in a multi-year research study on insider attacks. This is the season for predictions, the time when

More information

Evolve Your Security Operations Strategy To Account For Cloud

Evolve Your Security Operations Strategy To Account For Cloud Evolve Your Security Operations Strategy To Account For Cloud GET STARTED The growth of cloud computing and proliferation of complex service delivery models continue to accelerate as companies recognize

More information

Conducted by Vanson Bourne Research

Conducted by Vanson Bourne Research Conducted by Vanson Bourne Research N o v e m b e r 2 0 1 3 1 3200 INTERVIEWS ALTOGETHER, 1600 IT & 1600 BUSINESS DECISION- MAKERS 100 & 100 IT BUSINESS DECISION- DECISION- MAKERS MAKERS COUNTRIES USA

More information

SD-WAN. Enabling the Enterprise to Overcome Barriers to Digital Transformation. An IDC InfoBrief Sponsored by Comcast

SD-WAN. Enabling the Enterprise to Overcome Barriers to Digital Transformation. An IDC InfoBrief Sponsored by Comcast SD-WAN Enabling the Enterprise to Overcome Barriers to Digital Transformation An IDC InfoBrief Sponsored by Comcast SD-WAN Is Emerging as an Important Driver of Business Results The increasing need for

More information

FACTS AND OPPORTUNITIES IN BRAZIL. Gartner IT Security Summit Washington DC, June 2008

FACTS AND OPPORTUNITIES IN BRAZIL. Gartner IT Security Summit Washington DC, June 2008 FACTS AND OPPORTUNITIES IN BRAZIL Gartner IT Security Summit Washington DC, June 2008 OUR OBJECTIVE TODAY Raise your awareness that there are several Brazilian IT Services and Solutions Providers that

More information

A Global Look at IT Audit Best Practices

A Global Look at IT Audit Best Practices A Global Look at IT Audit Best Practices 2015 IT Audit Benchmarking Survey March 2015 Speakers Kevin McCreary is a Senior Manager in Protiviti s IT Risk practice. He has extensive IT audit and regulatory

More information

IT Security: Managing a New Reality

IT Security: Managing a New Reality IT Security: Managing a New Reality Kevin Lonergan #IDCDirections IDC You re Only as Strong as Your Weakest Link Locks Only Work if you Know How to Use Them IDC 2 Millions Canadian Security Market Forecast:

More information

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES

DIGITAL TRANSFORMATION IN FINANCIAL SERVICES DIGITAL TRANSFORMATION IN FINANCIAL SERVICES Global Priorities, Progress, and Obstacles Insights from business and IT executives at financial services institutions worldwide reveal that while digital transformation

More information

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security INDIA EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Rising risks for sensitive data in India In India, as in the rest of the

More information

IDC MarketScape: Worldwide Datacenter Transformation Consulting and Implementation Services 2016 Vendor Assessment

IDC MarketScape: Worldwide Datacenter Transformation Consulting and Implementation Services 2016 Vendor Assessment IDC MarketScape IDC MarketScape: Worldwide Datacenter Transformation Consulting and Implementation Services 2016 Vendor Assessment Chad Huston Ali Zaidi THIS IDC MARKETSCAPE EXCERPT FEATURES: WIPRO IDC

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

TABLE OF CONTENTS ONLY IT Resiliency Benchmarking Report

TABLE OF CONTENTS ONLY IT Resiliency Benchmarking Report TABLE OF CONTENTS ONLY IT Resiliency Benchmarking Report Prepared by BC Management, Inc. October 2016 Benchmarking. Plan Ahead. Be Ahead. Data collected between July September 2016 Table of Contents Reporting

More information

Cloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION

Cloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION Cloud Computing January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION Purpose and Methodology Survey Sample Field Work December 20, 2011 January 9, 2012 Total Respondents 554 Margin of Error +/- 4.2%

More information

THALES DATA THREAT REPORT

THALES DATA THREAT REPORT 2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Federal agency data is under siege. Over half of all agency IT security

More information

Fact Or Fiction: The State Of GDPR Compliance

Fact Or Fiction: The State Of GDPR Compliance A Forrester Consulting Thought Leadership Paper Commissioned By RSA December 2017 Fact Or Fiction: The State Of GDPR Compliance GDPR Compliance Requires More Than IT Table Of Contents 1 2 6 9 12 13 Executive

More information

Service Provider VPN Market Disruption in the Central and Eastern European Market

Service Provider VPN Market Disruption in the Central and Eastern European Market Service Provider VPN Market Disruption in the Central and Eastern European Market Delivering Winning Customer Experiences With SDN/NFV Easier Is Better Delivering a compelling user experience has become

More information

Empowering Systems of Engagement: Business Value of Couchbase NoSQL Engagement Database. An IDC White Paper, Sponsored by Couchbase and Intel

Empowering Systems of Engagement: Business Value of Couchbase NoSQL Engagement Database. An IDC White Paper, Sponsored by Couchbase and Intel Empowering Systems of Engagement: Business Value of Couchbase NoSQL Engagement Database An IDC White Paper, Sponsored by Couchbase and Intel Authors: Carl W. Olofson, Matthew Marden Sponsored by: Couchbase

More information

TREND REPORT. Hosted VoIP: What IT Decision-Makers Really Think

TREND REPORT. Hosted VoIP: What IT Decision-Makers Really Think TREND REPORT Hosted VoIP: What IT Decision-Makers Really Think TABLE OF CONTENTS Introduction 3 What IT Pros Think of Hosted VoIP Today CH. 1 4 And What They Expect Tomorrow Exploring the Biggest Drivers,

More information

TESTING TRENDS FOR 2018

TESTING TRENDS FOR 2018 February Sponsored by Dimensional Research February Introduction In the early days of software when an application ran on one platform and one type of machine with few variables, testing was a relatively

More information

SDI, Containers and DevOps - Cloud Adoption Trends Driving IT Transformation

SDI, Containers and DevOps - Cloud Adoption Trends Driving IT Transformation SDI, Containers and DevOps - Cloud Adoption Trends Driving IT Transformation Research Report August 2017 suse.com Executive Summary As we approach 2020, businesses face a maelstrom of increasing customer

More information

MULTI-CLOUD REQUIRES NEW MANAGEMENT STRATEGIES AND A FORWARD-LOOKING APPROACH

MULTI-CLOUD REQUIRES NEW MANAGEMENT STRATEGIES AND A FORWARD-LOOKING APPROACH MULTI-CLOUD REQUIRES NEW MANAGEMENT STRATEGIES AND A FORWARD-LOOKING APPROACH A new global survey by BMC reveals the confusion created by multi-cloud, increased challenges facing organizations, and that

More information

WHITEPAPER. Lookout Mobile Endpoint Security for App Risks

WHITEPAPER. Lookout Mobile Endpoint Security for App Risks WHITEPAPER Lookout Mobile Endpoint Security for App Risks The emerging risk around leaky and noncompliant mobile apps As organizations are increasingly embracing mobile devices in the workplace, mobile

More information

Astrium Accelerates Research and Design with IHS Goldfire

Astrium Accelerates Research and Design with IHS Goldfire CASE STUDY Astrium Accelerates Research and Design with IHS Goldfire Sponsored by: IDC David Schubmehl Dan Vesset May 2014 IDC OPINION The challenges facing workers in most organizations today are immense.

More information

SDN HAS ARRIVED, BUT NEEDS COMPLEMENTARY MANAGEMENT TOOLS

SDN HAS ARRIVED, BUT NEEDS COMPLEMENTARY MANAGEMENT TOOLS January 2018 Sponsored by Introduction 302 network professionals and IT strategists completed a global survey on Software Defined Networks (SDNs) to gather hard data on SDN adoption and operational challenges.

More information

Sales Presentation Case 2018 Dell EMC

Sales Presentation Case 2018 Dell EMC Sales Presentation Case 2018 Dell EMC Introduction: As a member of the Dell Technologies unique family of businesses, Dell EMC serves a key role in providing the essential infrastructure for organizations

More information

Spotlight Report. Information Security. Presented by. Group Partner

Spotlight Report. Information Security. Presented by. Group Partner Cloud SecuriTY Spotlight Report Group Partner Information Security Presented by OVERVIEW Key FINDINGS Public cloud apps like Office 365 and Salesforce have become a dominant, driving force for change in

More information

CYBER RESILIENCE & INCIDENT RESPONSE

CYBER RESILIENCE & INCIDENT RESPONSE CYBER RESILIENCE & INCIDENT RESPONSE www.nccgroup.trust Introduction The threat landscape has changed dramatically over the last decade. Once the biggest threats came from opportunist attacks and preventable

More information

Taking Back Control of Your Network With SD-LAN

Taking Back Control of Your Network With SD-LAN IHS TECHNOLOGY SEPTEMBER 2016 Taking Back Control of Your Network With SD-LAN Matthias Machowinski, Senior Research Director, Enterprise Networks and Video TABLE OF CONTENTS Access Networks Are Under Pressure...

More information

Table of Contents. Introduction. Compelling Findings. Global Security Findings. Top Social Media Security Concerns. Key takeaways.

Table of Contents. Introduction. Compelling Findings. Global Security Findings. Top Social Media Security Concerns. Key takeaways. tyntec Research: Brazilian and Russian Social Media Users Are Concerned About Identity Theft UK and US Counterparts Worry Most About Lack of Information Control This July 2013 representative survey was

More information

NORTON WI-FI RISK REPORT: U.S. Results

NORTON WI-FI RISK REPORT: U.S. Results NORTON WI-FI RISK REPORT: U.S. Results Research Objective Norton by Symantec commissioned its second annual online survey, this year expanded to 15 global markets, in order to better understand consumers

More information

Abstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight

Abstract. The Challenges. ESG Lab Review InterSystems IRIS Data Platform: A Unified, Efficient Data Platform for Fast Business Insight ESG Lab Review InterSystems Data Platform: A Unified, Efficient Data Platform for Fast Business Insight Date: April 218 Author: Kerry Dolan, Senior IT Validation Analyst Abstract Enterprise Strategy Group

More information

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE 2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE February 2014 Sponsored by: 2014 Network Security & Cyber Risk Management:

More information

The 3 T s driving the global commercial security market technology, terrorism and theft

The 3 T s driving the global commercial security market technology, terrorism and theft The Leading Trade Fair for Safety, Security & Fire Protection 22 24 January, 2017 Dubai, UAE The 3 T s driving the global commercial security market technology, terrorism and theft ABSTRACT Summarising

More information

Caching Use Cases in the Enterprise

Caching Use Cases in the Enterprise terracotta whitepaper: Caching Use Cases in the Enterprise What You Can Learn from Hundreds of Ehcache Users Around the Globe Eric J. Bruno Allure Technology, Inc www.alluretechnology.com I was recently

More information

Build Your Zero Trust Security Strategy With Microsegmentation

Build Your Zero Trust Security Strategy With Microsegmentation Why Digital Businesses Need A Granular Network Segmentation Approach GET STARTED Overview The idea of a secure network perimeter is dead. As companies rapidly scale their digital capabilities to deliver

More information

Converged Security - Protect your Digital Enterprise May 24, Copyright 2016 Vivit Worldwide

Converged Security - Protect your Digital Enterprise May 24, Copyright 2016 Vivit Worldwide Converged Security - Protect your Digital Enterprise May 24, 2016 Copyright 2016 Vivit Worldwide Brought to you by Copyright 2016 Vivit Worldwide Hosted By Richard Bishop Vivit Board United Kingdom Chapter

More information

Safeguard Application Uptime and Consistent Performance

Safeguard Application Uptime and Consistent Performance Safeguard Application Uptime and Consistent Performance A software-first approach to delivering applications across hybrid and multi-cloud architectures. 1 Safeguard Application Uptime and Consistent Performance

More information

Global Security Consulting Services, compliancy and risk asessment services

Global Security Consulting Services, compliancy and risk asessment services Global Security Consulting Services, compliancy and risk asessment services Introduced by Nadine Dereza Presented by Suheil Shahryar Director of Global Security Consulting Today s Business Environment

More information

SMB Cloud InsightsTM

SMB Cloud InsightsTM 2015 SMB Cloud InsightsTM CHINA DEFINITIONS Cloud Services Defined This research focuses on the cloud services that matter most to SMBs: IaaS, web presence and web applications, unified communications,

More information

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report. 2019 SIEM REPORT INTRODUCTION Security Information and Event Management (SIEM) is a powerful technology that allows security operations teams to collect, correlate and analyze log data from a variety of

More information

2014 IT Risk/Reward Barometer United States Results. November Number of respondents (n) = 452

2014 IT Risk/Reward Barometer United States Results. November Number of respondents (n) = 452 2014 IT Risk/Reward Barometer United States Results November 2014 www.isaca.org/risk-reward-barometer Number of respondents (n) = 452 Respondents are business and IT professionals who are members of ISACA.

More information

Service Provider VPN Market Disruption in the LATAM Market

Service Provider VPN Market Disruption in the LATAM Market Service Provider VPN Market Disruption in the LATAM Market Delivering Winning Customer Experiences With SDN/NFV Easier Is Better Delivering a compelling user experience has become increasingly critical

More information

MaaS360 Secure Productivity Suite

MaaS360 Secure Productivity Suite MaaS360 Secure Productivity Suite Frequently Asked Questions (FAQs) What is MaaS360 Secure Productivity Suite? MaaS360 Secure Productivity Suite integrates a set of comprehensive mobile security and productivity

More information

CICS insights from IT professionals revealed

CICS insights from IT professionals revealed CICS insights from IT professionals revealed A CICS survey analysis report from: IBM, CICS, and z/os are registered trademarks of International Business Machines Corporation in the United States, other

More information

Vulnerability Management Survey

Vulnerability Management Survey Vulnerability Management Survey Executive Summary November 1 st, 2006 Conducted by Trusted Strategies for Shavlik Technologies LLC Author: Bill Bosen About Trusted Strategies is a research and advisory

More information