Corporate IT and Business User Survey,

Similar documents
Corporate IT Survey Messaging and Collaboration, Editor: Sara Radicati, Ph.D

Corporate IT Survey Messaging & Collaboration,

Corporate IT Survey Messaging & Collaboration,

Statistics Report,

Statistics Report,

Statistics Report,

Market,

Security Market,

EMEA Hosted Market,

Client Market,

Office 365: Fact Sheet

KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals

EMEA Hosted Market,

Kunal Mahajan Microsoft Corporation

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

European Hosted Market,

Comparing Google Message Security and Leading Messaging Security Solutions

Sensitive Data Loss is NOT Inevitable

Hosted Market,

Advanced Solutions of Microsoft SharePoint Server 2013 Course Contact Hours

Advanced Solutions of Microsoft SharePoint 2013

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Mastering The Endpoint

COURSE OUTLINE: A Advanced Technologies of SharePoint 2016

Converged Infrastructure Matures And Proves Its Value

Second International Barometer of Security in SMBs

A guideline for selling. The essential package for a successful business

State of SMB IT 1H 2012

Comparing Management Systems that Protect Against Spam, Viruses, Malware and Phishing Attacks

Top Priority for Hybrid IT

North American Market for Electronic Content Archiving

Hosted Services: Providing SMBs with Access to Advanced Technology

HOW MIDSIZE ORGANIZATIONS CAN MEET COMPLIANCE REQUIREMENTS AND ENHANCE CYBERSECURITY WITH MICRO-SEGMENTATION WHITE PAPER FEBRUARY 2018

ACHIEVING FIFTH GENERATION CYBER SECURITY

Microsoft SharePoint Server 2013 Plan, Configure & Manage

Licensing Expert Series. Licensing Office 2013 & Office 365

DISASTER RECOVERY- AS-A-SERVICE FOR VMWARE CLOUD PROVIDER PARTNERS WHITE PAPER - OCTOBER 2017

Cloud Hosting, Archiving and Security

Understanding VDI End-to-End

2018 Edition. Security and Compliance for Office 365

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Why is Office 365 the right choice?

Archiving. Services. Optimize the management of information by defining a lifecycle strategy for data. Archiving. ediscovery. Data Loss Prevention

Hybrid IT for SMBs. HPE addressing SMB and channel partner Hybrid IT demands ANALYST ANURAG AGRAWAL REPORT : HPE. October 2018

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management. Follow Along

Advanced Solutions of Microsoft SharePoint Server 2013

Vulnerability Management Trends In APAC

MCSA Office 365 Bootcamp

Disaster Unpreparedness June 3, 2013

The State of Cloud Monitoring

Internet of Things. The Digital Oilfield: Security in SCADA and Process Control. Mahyar Khosravi

Comparing Postini and Leading Messaging Security Solutions

State of Cloud Survey GERMANY FINDINGS

Exchange 2007 End of Service: Modernize with Office 365. Todd Sweetser Technical Solutions Professional

Energy Company Extends Communications and Collaboration Solution with Hosted Service

Reducing Cybersecurity Costs & Risk through Automation Technologies

The Case for Virtualizing Your Oracle Database Deployment

Microsoft Security Management

Mobilizing Your Workforce for Success

Vendor: Cisco. Exam Code: Exam Name: Cisco Sales Expert. Version: Demo

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

Video conferencing FAQ: A buyer s guide

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers

Top. Reasons Legal Teams Select kiteworks by Accellion

Advanced Technologies of SharePoint 2016

Unlock The Value Of Cloud

Advanced Technologies of SharePoint 2016

Evolution of IT in the Finance Industry. Europe

In concert IT: How Australian organisations can reduce cost and complexity with integrated infrastructure

Archiving Market Update

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. John McDonald

Microsoft Skype for Business

Education and Support for SharePoint, Office 365 and Azure

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

3 Ways Businesses Use Network Virtualization. A Faster Path to Improved Security, Automated IT, and App Continuity

34% DOING MORE WITH LESS How Red Hat Enterprise Linux shrinks total cost of ownership (TCO) compared to Windows. I n a study measuring

1

Cloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION

CompTIA Security Research Study Trends and Observations on Organizational Security. Carol Balkcom, Product Manager, Security+

2015 VORMETRIC INSIDER THREAT REPORT

Government IT Modernization and the Adoption of Hybrid Cloud

United Automotive Electronic Systems Co., Ltd Relies on McAfee for Comprehensive Security

Evolving Threats Call For Integrated Endpoint Security Solutions With Holistic Visibility

SOC 3 for Security and Availability

Course Content. This is the second in a sequence of two courses for IT Professionals and is aligned with the SharePoint 2016 IT Pro certification.

Conducted by Vanson Bourne Research

STATE OF THE NETWORK STUDY

Managing Microsoft 365 Identity and Access

Surviving the rise of. cybercrime. A new approach to threat prevention.

TREND REPORT. Hosted VoIP: What IT Decision-Makers Really Think

CLEARING THE PATH: PREVENTING THE BLOCKS TO CYBERSECURITY IN BUSINESS

2015 IT Priorities Survey. France Results

Unified Communication Comparison Guide

The Economics of Office YTD Net Promoter Score. Microsoft Office365 10/20/2017. Paul Hoffman, CPA, CITP, CGMA CEO/President of SouthTech

ENABLING AND MANAGING OFFICE 365

An ESRI White Paper June 2009 ArcGIS Server and Virtualization

ENABLING AND MANAGING OFFICE 365

2018 Report The State of Securing Cloud Workloads

Life Science Leading Indicators 2010 (July - December)

Transcription:

THE RADICATI GROUP, INC. A TECHNOLOGY MARKET RESEARCH FIRM 1900 EMBARCADERO ROAD, SUITE 206. PALO ALTO, CA 94303 TEL. 650 322-8059 FAX 650 322-8061 Corporate IT and Business User Survey, 2012-2013 Editor: Sara Radicati, PhD SCOPE This survey, designed and administered by The Radicati Group, Inc. in mid-2012, examines corporate and business user preferences, deployments, attitudes and behavior with regards to key collaboration technologies such as email, instant messaging, social media, mobility, security, information archiving and others. The survey was conducted with respondents from 67 business organizations of all sizes worldwide, representing a total of 957,786 business users. The questionnaire used in the study aimed at identifying user behavior and corporate preferences in the following areas: Business Email Use Business Instant Messaging Use Business Social Networking Use Business Mobile Device Use Corporate IT Budgets & Priorities Corporate Email Environment User Storage Allocation Email Client Deployment Microsoft SharePoint Deployment Security EUROPE: 29E FITZJOHNS AVE LONDON NW3 5JY TEL. +44 (0)20 7794 4298 FAX. +44 (0)20 7431 9375 e-mail: sara@radicati.com http://www.radicati.com

Archiving and Compliance Unified Communications A section on consumer user behavior (i.e. outside of office hours) in all of the above areas is also included. All currency figures are expressed in $USD. Respondents were asked to answer on behalf of their organizations, as well as about their own personal use of technology. Throughout this report we use the terms business, organization and company interchangeably. Government and Education are considered businesses for the purposes of this report. METHODOLOGY The data and analysis contained in this study is based on primary research in the form of data collected from a specifically designed online questionnaire which was administered to survey respondents worldwide in mid-2012. Experienced analysts from The Radicati Group, Inc. collected and analyzed the data. Respondents included CxOs, Line of Business Managers, IT Managers and other corporate decision makers or influencers. Survey responses were collected from companies of all sizes, in various industries, worldwide. s Copyright August 2012 The Radicati Group, Inc. Reproduction Prohibited 2

EXECUTIVE SUMMARY This survey was used to understand corporate deployment choices and user behavior in the following areas: Business Email use, Instant Messaging use, Social Media use, Tablet and Mobile Device use, Corporate IT budgets & priorities, Corporate Email Environments, User Storage allocation, Email Client deployment, Microsoft SharePoint deployment, Security, Archiving and Compliance, and Unified Communications. This study was administered to 67 organizations worldwide ranging in size from SMBs to Large organizations with a total of 957,786 business users. o In addition to asking about the use of information sharing technologies in their business lives, the study also asks respondents about their use of the same technologies for personal use, as a consumer, and compares and contrasts business and consumer attitudes. On average, survey respondents sent 36 email messages per day, and receive approximately 78 email messages per day. Of the 78 daily emails received, on average, 19% of emails received are considered spam by the recipient and 24% of emails received include an attachment. The size of attachments varies greatly but currently averages around 560KB. Business users on average spend over 2:30 hours of their business day online. An average of 1:05 hours per day is spent on internal company websites, while an average of 1:36 hours per day is spent on external (i.e. non company) websites. In terms of email systems deployed, the majority of organizations, 7 were still deploying an on-premises email solution, 19% of organizations were deploying a hosted (i.e. cloud) email solution and 10% were deploying a hybrid email solution (i.e. combination of onpremises and hosted). This shows that despite the well publicized advantages of cloud-based solutions, organizations are still slow to move to the cloud and disassemble their existing investments in on-premise solutions. Copyright August 2012 The Radicati Group, Inc. Reproduction Prohibited 3

Viruses and other malware are a continuing concern with both business and consumer users. Business users averaged 5.5 malware incidents per month, which required an average clean-up time per incident of 3.0 hours, while consumer users averaged 2.1 malware attacks per month with an average 3.8 hour clean up time. In both cases, while the number of incidents was somewhat higher than in previous years, the average time to recover was somewhat lower, indicating that virus detection and correction technology is improving. A growing number of organizations are deploying an email archiving solution (70% of respondents) driven mainly by storage concerns. ediscovery and Data Loss Prevention (DLP) are also seeing strong uptake across all verticals. Instant Messaging (IM) is widely used for business communications, with 7 of our survey respondents indicating they use it on a daily basis with co-workers and clients or external partners and suppliers. On average business users have 8 IM conversations per day with an average of 5 different contacts, and spend about 41 minutes per day on IM. Despite the popularity of social media in the corporate world as a business tool, when asked if the use of social media is helping to reduce the amount of email they send and receive most business users (60%) said they did not see a change in the amount of email sent and received. Reducing IT Costs was the top IT priority with survey respondents in 2012. Followed by Improving Security in second place and Improving our Email System in third place. While it is not surprising that Reducing IT Costs and Improving Security made the top of the list, it is surprising that Improving Our Email System was in third place. We believe this is a reflection of vendor release cycles and a general perception on the part of organizations that we are the end of a 3-4 year cycle which requires a review of their basic email strategy. Figure 1, below shows how organizations characterized their main IT priorities in 2012. Copyright August 2012 The Radicati Group, Inc. Reproduction Prohibited 4

Main IT Priorites, 2012 Reducing IT Costs 2 Improve Security 18% Improving our Email System 12% Moving to Cloud Services 9% Improving Data Storage Management Deploying Virtualization Improving Information Governance Improving Archiving 6% 9% 8% Deploying Unified Communications Deploying Business Social Networking Improving Data Loss Prevention 2% Deploying Voice over IP Improving ediscovery Improving Disaster Recovery Increasing our IT Staff Deploying or Improving Email Continuity 2% 0 10 20 30 40 50 60 Figure 1: Main IT Priorities, 2012 To view the complete Table of Contents for this report, visit our website at www.radicati.com. Copyright August 2012 The Radicati Group, Inc. Reproduction Prohibited 5