MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Similar documents
INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

Spotlight Report. Information Security. Presented by. Group Partner

BYOD & MOBILE SECURITY 2016 SPOTLIGHT REPORT. Information Security. Presented by. Group Partner

2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB)

Best wishes for 2018! Bryan Ware, CEO. Haystax Technology INSIDER THREAT PREDICTIONS FOR

Tripwire State of Container Security Report

INSIDER THREAT 2018 REPORT PRESENTED BY:

Mastering The Endpoint

Uncovering the Risk of SAP Cyber Breaches

Best Practices in Securing a Multicloud World

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

CYBERSECURITY TRENDS 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

2016 BITGLASS, INC. mobile. solution brief

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

Spotlight Report. Information Security. Presented by. Group Partner

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

GDPR COMPLIANCE REPORT

Securing the SMB Cloud Generation

Mobility, Security Concerns, and Avoidance

U.S. State of Cybercrime

Cyber Security. June 2015

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)

Securing Health Data in a BYOD World

The State of Cloud Monitoring

THE POWER OF TECH-SAVVY BOARDS:

Mobile Security Trends in the Workplace

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

Rethink Enterprise Endpoint Security In The Cloud Computing Era

BYOD. Transformation. Joe Leonard Director, Secure Networks. April 3, 2013

Mobile Security: Move Beyond The Basics And Overcome Mobile Paralysis

Operationalize Security To Secure Your Data Perimeter

WHY MOBILE SECURITY SHOULD BE IN YOUR TOP PRIORITIES

The Need For A New IT Security Architecture: Global Study On The Risk Of Outdated Technologies

THE RISE OF BYOD. BYOD increases employee mobility and, consequently, organizational flexibility, efficiency, and collaboration.

A Guide to Closing All Potential VDI Security Gaps

Securing Wireless Mobile Devices. Lamaris Davis. East Carolina University 11/15/2013

mhealth SECURITY: STATS AND SOLUTIONS

2017 State of Cybersecurity in Small & Medium-Sized Businesses (SMB)

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat

MaaS360 Secure Productivity Suite

The Cost of Denial-of-Services Attacks

BELTUG Market Trends Survey Results V-ICT-OR members - August 2015

Transforming Security Part 2: From the Device to the Data Center

- Samsung Tablet Photo - Tablets Mean Business. Survey of IT pros reflects growing trend toward tablets for workforce mobility and more

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE

Gaps in Resources, Risk and Visibility Weaken Cybersecurity Posture

2016 Survey: A Pulse on Mobility in Healthcare

Reducing Cybersecurity Costs & Risk through Automation Technologies

KEY FINDINGS INTERACTIVE GUIDE. Uncovering Hidden Threats within Encrypted Traffic

A Data-Centric Approach to Endpoint Security

Mobile Experience and Security - A Delicate Balance. Jeff Keller, CISA, CIA, CFSA SVP/Senior Audit Director, Technology, Projects, Due Diligence

Cybersecurity Survey Results

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers

THE CYBERSECURITY LITERACY CONFIDENCE GAP

Zimperium Global Threat Data

KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals

Bring your own device: a major security concern

CLOUD SECURITY 2017 SPOTLIGHT REPORT PRESENTED BY

Cyber Security Trends A quick guide

Future State of IT Security A Survey of IT Security Executives

Securing Corporate Data on Mobile Devices

Make security part of your client systems refresh

Altitude Software. Data Protection Heading 2018

A Global Look at IT Audit Best Practices

State of Cloud Survey GERMANY FINDINGS

2017 RIMS CYBER SURVEY

Go mobile. Stay in control.

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

Toward an Automated Future

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

As Enterprise Mobility Usage Escalates, So Does Security Risk

Dom Nessi Burns Engineering March 29, 2017 CYBERSECURITY TRENDS 2017 REPORT

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Purchase Intentions Spring 2013 EMEA

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Mobile Device Management: A Real Need for the Mobile World

Say Yes to BYOD How Fortinet Enables You to Protect Your Network from the Risk of Mobile Devices WHITE PAPER

Secure Access for Microsoft Office 365 & SaaS Applications

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

BETTER Mobile Threat Defense (BMTD)

Vulnerability Management Trends In APAC

Next-Gen CASB. Patrick Koh Bitglass

Sales Presentation Case 2018 Dell EMC

State of the Cyber Training Market January 2018

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals

CISO View: Top 4 Major Imperatives for Enterprise Defense

Cybersecurity is a Journey and Not a Destination: Developing a risk management culture in your business. Thursday, May 21, 2015

Sage Data Security Services Directory

Gujarat Forensic Sciences University

GDPR drives compliance to top of security project list for 2018

Modern Database Architectures Demand Modern Data Security Measures

Tripwire State of Cyber Hygiene Report

Have breaches declined since the massive Heartland Payments leak in 2008? What proportion of breaches are the result of hacking?

Transcription:

MOBILE SECURITY 2017 SPOTLIGHT REPORT Group Partner Information Security PRESENTED BY

OVERVIEW Security and privacy risks are on the rise with the proliferation of mobile devices and their increasing use in the enterprise. As mobility grows in the workplace, so do challenges from managing bandwidth and device access to handling the most pressing concerns of security. The 2017 Mobile Security Report focuses on these security challenges and offers fresh insights on the state of mobile threats and solutions. These days, the computers most vulnerable to cyber threats in the enterprise are mobile phones and tablets. We see that security teams are often blind to the growing risks these devices pose for the enterprise and worse, are unable to deal with threats as they appear. Many enterprises manage device access to corporate resources, networks and identity, but they can t remediate a threat they can t identify. As more of our computing goes directly from mobile devices to cloud services, network threat detection solutions are ineffective since data often resides outside the corporate data center. You need to adopt a nonsignature based mobile threat detection software to protect your organization and its data. It s a serious and growing concern for all CEOs and CIOs. Shridhar Mittal CEO, Zimperium MOBILE SECURITY REPORT 2

TABLE OF CONTENTS MOBILE SECURITY TRENDS REPORT INTRODUCTION BENEFITS OF BYOD ADOPTION BARRIERS OF BYOD ADOPTION EMPLOYEE PRIVACY CONCERNS MOBILE SECURITY THREATS MOBILE THREATS IMPACT BYOD SECURITY CONCERNS KEY MOBILE SECURITY REQUIREMENTS MOBILE SECURITY BREACHES MALWARE THREAT MALICIOUS WIFI MOBILE SECURITY TECHNOLOGIES MOBILE APP SECURITY KEY REQUIREMENTS FOR MTM MOBILE SECURITY BUDGET METHODOLOGY & DEMOGRAPHICS SPONSOR OVERVIEW 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 21

INTRODUCTION Mobile computing is changing the world. The number of connected devices has grown by 30% year-overyear and is not expected to slow down in 2017. Further driving change is user preference for their smartphones, personal computers, tablets, and other computing technologies. Allowing employees to use their own devices can certainly improve satisfaction, but it also puts the organization at risk for additional security threats. Whether these devices are sanctioned or not through a corporate BYOD program, IT departments need to grapple with setting unified policies especially when it comes to securing mobile devices and the information they access.

BENEFITS OF BYOD ADOPTION With over 4 billion mobile subscribers, we live in a world where mobility is ubiquitous and enterprises have begun to benefit from it. The top three drivers of BYOD among employees are improved mobility (65%), reduced cost (55%), and greater employee satistaction (52%). Q: What are the main benefits of BYOD for your company? 65% Improved employee mobility & productivity 55% Reduced cost 52% Greater employee satisfaction 11% Reduced security risk MOBILE SECURITY REPORT 5

BARRIERS OF BYOD ADOPTION Security is by far the number one barrier to stronger BYOD adoption. For the IT and security teams inside organizations, this points to potential security gaps or weaknesses that may need to be addressed. Q: What do you believe is the number one inhibitor to BYOD adoption in your organization? 31% We 15% 14% Security Concerns don't experience any resistance to BYOD adoption Employee privacy concerns (e.g., over EMM software) We offer managed / company owned devices as alternatives 12% Employees don t want to take on the additional expense 6% User experience concerns (battery life, don t like app choices, etc.) 5% Employees don t want or need access through personal devices 4% Support cost concerns 4% Management opposition 4% MOBILE SECURITY REPORT 6

EMPLOYEE PRIVACY CONCERNS Employee privacy is not a significant barrier to adoption of BYOD. A majority of 62% say that less than 25% of users in their organizations refuse BYOD due to privacy related concerns. Q: What percent of employees refuse to adopt BYOD due to privacy concerns? More than half 17% Between 25-50% 21% 62% Less than 25% of employees refuse to adopt BYOD due to privacy concerns MOBILE SECURITY REPORT 7

MOBILE SECURITY THREATS The dramatic growth of mobile devices is driving an increase in cybercrime, from stolen identities to major data breaches. Forty-seven percent of respondents observe either a moderate rise (30%) or significant rise (17%) in mobile device threats. Very few respondents (14%) see modest or significant decreases in mobile threats. Q: How has the volume of mobile device threats targeting your users smartphones and tablets changed in the past 12 months? 17% 30% 39% 7% 7% 47% see increase in mobile threats MOBILE SECURITY REPORT 8

MOBILE THREATS IMPACT The impact of mobile threats is being felt in terms of added helpdesk workload and associated cost (26%), need for additional IT resources to manage mobile security (21%), and reduced employee productivity (12%). Q: What actual negative impact did mobile threats have on your company in the past 12 months? HELP! HELP! HELP! 26% Increased helpdesk workload 21% Additional IT resources needed to manage mobile security HELP! 12% Reduced employee productivity Unauthorized access to corporate data and systems 12% Malware infections and related cost 11% Data loss or leakage occurred 11% Disrupted business activities 7% The company had to pay regulatory fines 1% Not sure/other 27% MOBILE SECURITY REPORT 9

BYOD SECURITY CONCERNS As mobility and BYOD initiatives grow in the workplace, so do security concerns. Of biggest concern related to BYOD is data leakage or loss (69%), download of unsafe applications or content (64%), and the introduction of malware into the organization s IT environment (63%). Q: What are your main security concerns related to BYOD? 69% Data leakage / loss DOWNLOAD 64% Users download unsafe apps or content 63% Malware Lost or stolen devices 61% Unauthorized access to company data and systems 58% Vulnerability exploits 49% Inability to control endpoint security 45% Device management 41% Network attacks via WiFi 38% Ensuring security software is up-to-date 38% Compliance with regulations 32% MOBILE SECURITY REPORT 10

KEY MOBILE SECURITY REQUIREMENTS As our previous findings have indicated, BYOD in the workplace comes with several challenges and risks. Protection capabilities (44%, up from 42%), visibility into mobile threats (20%, up from 15%), and integration with existing platforms (22%, down from 33%) are the most critical requirements for mobile security. Q: What is your biggest pain point when it comes to mobile security? 44% PROTECTION We need a solution that not only detects threats but also remediates them based on the corporate policy 22% INTEGRATION We need a mobile security solution that integrates with our existing network (e.g., SIEM), endpoint (e.g., MDM or EMM), or ITSM (e.g., System Center) platforms 14% NONE 20% VISIBILITY We need to see all affected devices and the types of threats MOBILE SECURITY REPORT 11

MOBILE SECURITY BREACHES About a quarter of respondents confirmed they experienced mobile device hacks or data leaks. The shadow number is likely much higher considering 43% decided to not disclose their attacks statistics. Q: How many of your mobile devices were hacked or had data leaks? 43% 11001010110010101 010PASSWORD10 11001010110010101 11001010110010101 33% 16% 4% 3% 1% None Up to 26-50% 51-75% 76-100% Can't 25% disclose MOBILE SECURITY REPORT 12

MALWARE THREAT Twenty-eight percent of the surveyed organizations reported that BYOD or corporate-owned devices have downloaded malware at some point in the past - that is down from 39% in the previous survey. More than half of respondents said they are not sure if malware has been downloaded to mobile devices. These findings indicate a lack of effective monitoring of BYOD and corporate-owned devices in the workplace. It is imperative organizations implement BYOD programs in conjunction with the necessary programs to properly monitor device use, implement security technologies to detect and prevent malware penetration, and train employees across all departments and levels to protect all data stored on or accessed through mobile devices. Q: Have any of your BYO or corporate-owned devices downloaded malware in the past? 21% 28% NO YES 51% Not Sure Can't disclose MOBILE SECURITY REPORT 13

MALICIOUS WIFI Wi-Fi offers low-cost, ubiquitous networking, but it can open organizations to new vulnerabilities that arise when mobile devices connect to untrusted, potentially malicious Wi-Fi networks. As our study reveals, 19% of the surveyed organizations confirmed that the BYOD or corporate-owned devices have, in fact, connected to malicious Wi-Fi in the past. Worse yet, over half (59%) are unsure, leaving them vulnerable to the possible loss or theft of corporate data. Q: Have any of your BYO or corporate-owned devices connected to a malicious Wi-Fi in the past? 22% 19% NO YES 59% Not Sure Can't disclose MOBILE SECURITY REPORT 14

MOBILE SECURITY TECHNOLOGIES The significant growth and integration of mobile technologies in both the personal and business spheres is driving IT departments to rethink the security technologies they are using to protect sensitive data and devices. The most commonly used mobile security controls include password protection (77%), remote wipe (72%), device encryption (69%), data removal at device disposal (63%), and mobile device management / MDM (58%). It should be noted that 19% of respondents say they have no mobile security technologies in place. Q: Which of the following mobile security technologies are in place? Password protection username Remote wipe Device encryption Data removal at employee separation or device disposal None 77% 72% 69% 63% 19% Mobile device management (MDM) 58% Mobile device file/data encryption 48% VPN to onpremises security gateway 47% Endpoint security tools 43% Device management 41% Mobile device antivirus/antimalware 39% Network access control (NAC) 38% DLP / Access Control 37% Mobile application management (MAM) 33% Auditing of mobile devices 30% Virtual desktop infrastructure (VDI) 30% VPN to cloudbased security gateway 29% Containerization/microvirtualization 23% Automated remediation using other security systems 22% Mobile Threat Detection & Management (MTM) 22% Attack and penetration testing of mobile applications 22% None 19% Not sure 32% MOBILE SECURITY REPORT 15

MOBILE APP SECURITY A majority of organizations (59%) are concerned about introducing security risks to their customers via their consumer or business apps. Q: Are you concerned about introducing security or privacy risks in the mobile apps you develop for your customers? 24% 59% NO YES 18% Not Sure Can't disclose MOBILE SECURITY REPORT 16

KEY REQUIREMENTS FOR MTM The most requested capability for mobile threat management solutions is malware protection (68%), followed by logging, monitoring and reporting (64%), indicating the need for better visibility into security threats and their impact on mobile devices across the organizations. Q: In your opinion, what key capabilities are required for Mobile Threat Management? LOG 68% Malware protection 64% Logging, monitoring and reporting 59% Ease of deployment 56% Vulnerability exploit defense 56% 52% 47% 46% 44% 44% Network / Wi-Fi attack defense Device configuration Cross-platform support Role-based access control Integration with other endpoint management systems App risk detection MOBILE SECURITY REPORT 17

MOBILE SECURITY BUDGET While the future of mobile computing is certainly bright, there are many security challenges to address. These concerns are reflected in the budget priorities for 26% of organizations who plan to increase mobile security spend over the next 12 months. Only four percent of respondents are planning on reducing security investments. Q: How is your mobile security budget going to change over the next 12 months? 4% Budget will decline 26% Budget will increase 70% Budget will stay flat MOBILE SECURITY REPORT 18

METHODOLOGY AND DEMOGRAPHICS

METHODOLOGY & DEMOGRAPHICS The 2017 Mobile Security Report is based on the results of a comprehensive online survey of over 1,900 cybersecurity professionals to gain more insight into the latest security threats faced by organizations and the solutions to prevent and remediate them. The respondents range from technical executives to managers and IT security practitioners. They represent organizations of varying sizes across many industries. Their answers provide a comprehensive perspective on the state of cybersecurity today. CAREER LEVEL 23% 23% 16% 8% 8% 4% 4% 14% Specialist Manager / Supervisor Consultant Director CTO, CIO, CISCO, CMO, CFO, COO Vice President Owner / CEO / President Other DEPARTMENT IT Security IT Operations Engineering Operations Compliance Sales Other COMPANY SIZE INDUSTRY 40% 24% 9% 6% 3% 2% 16% 7% 16% 19% 7% 18% 7% 26% Fewer than 10 10-99 100-499 500-999 1,000 4,999 5,000 10,000 Over 10,000 22% 19% 10% 10% 8% 7% 4% 4% 3% 13% Technology, Software & Internet Government Financial Services Healthcare, Pharmaceuticals, & Biotech Professional Services Education & Research Manufacturing Telecommunications Computers & Electronics Other MOBILE SECURITY REPORT 20

SPONSOR OVERVIEW

SPONSOR Zimperium www.zimperium.com Zimperium, the global leader in Mobile Threat Defense, offers real-time, on-device protection against both known and unknown mobile device, network and application cyberattacks. Its advanced machine learning-based platform provides visibility, security and management of attacks on all three mobile threat vectors - Device, Network and Applications for ios, Android and Windows devices. MOBILE SECURITY REPORT 22