SMB File Sharing Flash Poll. Global Key Findings
|
|
|
- Harry Mitchell
- 10 years ago
- Views:
Transcription
1 SMB File Sharing Flash Poll Global Key Findings
2 Methodology Survey performed by Applied Research 1,325 global organiza?ons 30 countries NAM 2 LAM 14 EMEA 7 APJ 7 Person in charge of IT Cross- industry 2
3 Key Findings Behaviors surrounding file sharing are making SMBs vulnerable to risk SMB employees influence adop?on of file sharing solu?ons within their organiza?ons Security threats and data loss are poten?al risks associated with file sharing SMB organiza?ons are becoming more distributed while file size is growing 3
4 Employees Influence AdopAon Employees somewhat- to- extremely influen?al in adop?ng various technologies Security and produc?vity were the top considera?ons for providing technologies to employees Q7: How important are the following factors in providing employees with applications and devices they use for business purposes? (Somewhat/Extremely important) Networking with peers Control Cost savings Ease of use Employee satisfaction Ability to complete work Security Productivity 64% 69% 69% 70% 71% 72% 72% 74% 0% 10% 20% 30% 40% 50% 60% 70% 80% Q6: How influential are your employees when it comes to adopting technologies for official internal use in your organization? (Somewhat/Extremely influential) Social media/social network File sharing Mobile device usage PC/Laptop/Tablet usage 53% 61% 63% 64% 0% 10% 20% 30% 40% 50% 60% 70% 4
5 File Sharing PrioriAes 74% report the access to files across devices as somewhat/ extremely important feature The ability to share files (71 %); the ability to upload and update files in shared workspaces (71%), and file collabora?on (68 %) were also viewed as somewhat/ extremely important Q8: How important are the following features to your employees when it comes to accessing and sharing files? (Somewhat/Extremely important) File collaboration Ability to upload and update files in shared workspaces Ability to share large files Ability to access files across desktops, laptops and mobile devices, including personal devices 68% 71% 71% 74% 0% 10% 20% 30% 40% 50% 60% 70% 80% 5
6 File Sharing Risks Security and data loss were viewed as the most significant poten?al risks with regards to file sharing solu?ons 44% of respondents viewed employees sharing confiden?al informa?on using unapproved solu?ons to be somewhat- to- extremely high risk 44% of respondents viewed malware to be somewhat- to- extremely high risk 43% reported loss of confiden?al or proprietary informa?on to be somewhat- to- extremely high risk 6
7 File Sharing Awareness 10% of respondents were somewhat/completely unfamiliar with how employees are sharing files internally/externally 25% have not implemented internal policies restric?ng how employees access/share files; 18% in the process of implemen?ng Q13: Have you implemented internal policies restricting how your employees can access and share files internally and externally? No 25% In the process of implementing 18% Yes 57% 7
8 File Sharing Behaviors When asked what employees might do when they need to share a large file, respondents indicated they would: Search online and download a free solu?on (27%) Download applica?on without input from IT (29%) U?lize IT system in place (33%) Use solu?on suggested by customer, contractor or partner (42%) Ask IT for help (51%) 41% indicated damaged brand reputa?on/loss of customer consequence of not sharing a large file quickly 8
9 SMBs Becoming More Distributed SMB employees are increasingly working remotely and from home Q1: What percentage of your organization (including contractors) works remotely? Three years ago One year ago Today 22% 26% 32% Q2: What percentage of your organization (including contractors) regularly works from home at least once per week? Three years ago One year ago Today 20% 24% 28% One year from now 37% One year from now 32% 0% 5% 10% 15% 20% 25% 30% 35% 40% 0% 5% 10% 15% 20% 25% 30% 35% 9
10 Primary File Sharing Tool Two- thirds of respondents indicated was a top most commonly used file sharing/collabora?on solu?on. One year from now, some expect to adopt other op?ons with dropping as a most used solu?on (from 64% to 52%). Q3: What are/were your top two most commonly used solutions for sharing and collaborating around files, both internally and externally? (Today) Other (Please specify) Cloud content management solutions External storage media Third-party cloud-based file-software Enterprise Content Management solutions Shared file server 1% 15% 19% 27% 32% 39% 64% 0% 10% 20% 30% 40% 50% 60% 70% 10
11 Files GePng Larger One in seven (14%) report the average size of file shared by their organiza?on to be more than 1 GB today Only 6% es?mated the average size of file to be more than 1 GB three years ago and five years ago. Less than 1 MB 1 to 3 MB 3 to 10 MB 10 to 20 MB 20 to 50 MB 50 to 100 MB 100 to 350 MB 350 MB to 1 GB More than 1 GB Q5: Estimate the average size of a file shared by your organization: (Today) 5% 8% 11% 12% 10% 11% 14% 14% 14% 0% 2% 4% 6% 8% 10% 12% 14% 16% 11
12 Symantec RecommendaAons Centralize file storage and management with a secure web- based system accessible regardless of device or loca?on Implement a scalable system that can grow with your business Implement access controls and permissions to keep private files private Maintain oversight into how and when business files are shared 12
13 Appendix All ques?ons included 13
14 Demographics 14
15 DEMO2: How many total employees does your organization have worldwide? 5 to 49 25% 50 to 99 25% 100 to % 250 to % 0% 5% 10% 15% 20% 25% 30% 15
16 DEMO3: What is your organization's primary industry? Agriculture and Food Processing Aviation Chemical Products Construction Eating and Drinking Services, Accommodations Education, Learning and Support Energy Finance and Insurance Government Information Technology Legal Living-related and Personal Services and Amusement Services Manufacturing Media Marketing Services Mass Transit and Rail Pharmaceuticals Medical, Health Care and Welfare Public Services Public Works Shipping, Freight, and Postal Services Real Estate and Goods Rental and Leasing Scientific Research, Professional and Technical Services Telecommunications Wholesale and Retail Other 1% 1% 1% 1% 1% 2% 1% 0% 1% 2% 2% 2% 2% 2% 3% 3% 4% 4% 5% 6% 7% 10% 10% 10% 10% 10% 0% 2% 4% 6% 8% 10% 12% 16
17 DEMO4: What is your primary role? 100% 90% 100% 80% 70% 60% 50% 40% 30% 20% 10% 0% Manage our computing resources 17
18 DEMO5: What is your title? Company owner Senior Management 19% 21% Day to day office management 5% Human resources 2% IT Management 37% IT Staff 11% Administrative assistant External consultant/outsourcer/var reseller Other external vendor Other 2% 1% 0% 3% 0% 5% 10% 15% 20% 25% 30% 35% 40% 18
19 DEMO6: What is your age? 50 or older (Boomer) 15% 30 or less (Millennial) 19% 31 to 49 (Gen-X) 66% 19
20 DEMO7: What is your gender? Female 32% Male 68% 20
21 DEMO8: For how many years have you been working in computer systems and technology? Mean Median 21
22 DEMO9: What are your company's annual revenues? Less than $500,000 32% $500,000 to $2 million 11% $2 million to $7.5 million 20% $7.5 million to $30 million 22% $30 million to $100 million 6% $100 million to $500 million 4% $500 million to $1.5 billion $1.5 billion to $5 billion $5 billion to $25 billion $25 billion to $100 billion More than $100 billion 2% 2% 3% 0% 0% 0% 5% 10% 15% 20% 25% 30% 35% 22
23 DEMO10: Characterize your company's year-over-year growth rate in terms of annual revenue: Declining 25% per year or greater Declining between 10 and 24% per year Declining between 1 and 9% per year 3% 4% 4% Flat: Neither growing nor declining 18% Growing between 1 and 9% per year 39% Growing between 10 and 24% per year 20% Growing between 25 and 49% per year Growing between 50 and 99% per year Growing 100% per year or more Decline to state 4% 4% 0% 3% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 23
24 File Sharing Drivers 24
25 Q1: What percentage of your organization (including contractors) works remotely? (Means shown) Three years ago 22% One year ago 26% Today 32% One year from now 37% 0% 5% 10% 15% 20% 25% 30% 35% 40% 25
26 Q1: What percentage of your organization (including contractors) works remotely? (Medians shown) Three years ago 15% One year ago 20% Today 25% One year from now 30% 0% 5% 10% 15% 20% 25% 30% 35% 26
27 Q2: What percentage of your organization (including contractors) regularly works from home at least once per week? (Means shown) Three years ago 20% One year ago 24% Today 28% One year from now 32% 0% 5% 10% 15% 20% 25% 30% 35% 27
28 Q2: What percentage of your organization (including contractors) regularly works from home at least once per week? (Medians shown) Three years ago 10% One year ago 16% Today 22% One year from now 25% 0% 5% 10% 15% 20% 25% 30% 28
29 Q3: What are/were your top two most commonly used solutions for sharing and collaborating around files, both internally and externally? (Three years ago) Other (Please specify) 1% Cloud content management solutions 8% External storage media 23% Third-party cloud-based file-software applications 19% Enterprise Content Management solutions 48% Shared file server 33% 65% 0% 10% 20% 30% 40% 50% 60% 70% 29
30 Q3: What are/were your top two most commonly used solutions for sharing and collaborating around files, both internally and externally? (Today) Other (Please specify) 1% Cloud content management solutions 15% External storage media 19% Third-party cloud-based file-software applications 27% Enterprise Content Management solutions 32% Shared file server 39% 64% 0% 10% 20% 30% 40% 50% 60% 70% 30
31 Q3: What are/were your top two most commonly used solutions for sharing and collaborating around files, both internally and externally? (One year from now) Other (Please specify) 2% Cloud content management solutions 25% External storage media 16% Third-party cloud-based file-software applications 30% Enterprise Content Management solutions 34% Shared file server 37% 52% 0% 10% 20% 30% 40% 50% 60% 31
32 Q4: Rate the importance of providing file sharing and collaboration technology for your organization for the following scenarios: 1 - Extremely unimportant 2 - Somewhat unimportant 3 - Neutral 4 - Somewhat important 5 - Extremely important 100% 90% 80% 37% 27% 28% 24% 25% 19% 70% 60% 50% 31% 35% 32% 35% 34% 34% 40% 30% 20% 27% 30% 30% 31% 29% 33% 10% 0% 4% 6% 7% 8% 8% 10% 2% 3% 4% 2% 3% 4% Between internal teams Project management - internal and external With clients and customers Remote collaboration Large file sharing With third party vendors 32
33 Q4: Rate the importance of providing file sharing and collaboration technology for your organization for the following scenarios: (Somewhat/Extremely important) With third party vendors 53% Large file sharing 59% Remote collaboration 59% With clients and customers 60% Project management - internal and external 61% Between internal teams 67% 0% 10% 20% 30% 40% 50% 60% 70% 80% 33
34 Q5: Estimate the average size of a file shared by your organization: (Today) Less than 1 MB 5% 1 to 3 MB 8% 3 to 10 MB 12% 10 to 20 MB 14% 20 to 50 MB 11% 50 to 100 MB 14% 100 to 350 MB 10% 350 MB to 1 GB 11% More than 1 GB 14% 0% 2% 4% 6% 8% 10% 12% 14% 16% 34
35 Q5: Estimate the average size of a file shared by your organization: (Three years ago) Less than 1 MB 8% 1 to 3 MB 13% 3 to 10 MB 13% 10 to 20 MB 14% 20 to 50 MB 15% 50 to 100 MB 12% 100 to 350 MB 12% 350 MB to 1 GB 8% More than 1 GB 6% 0% 2% 4% 6% 8% 10% 12% 14% 16% 35
36 Q5: Estimate the average size of a file shared by your organization: (Five years ago) Less than 1 MB 19% 1 to 3 MB 15% 3 to 10 MB 12% 10 to 20 MB 10% 20 to 50 MB 12% 50 to 100 MB 10% 100 to 350 MB 9% 350 MB to 1 GB 8% More than 1 GB 6% 0% 2% 4% 6% 8% 10% 12% 14% 16% 18% 20% 36
37 AdopAon Cycles 37
38 Q6: How influential are your employees when it comes to adopting technologies for official internal use in your organization? 1 - Not influential at all 2 - Not that influential 3 - Neutral 4 - Somewhat influential 5 - Extremely influential 100% 90% 27% 24% 24% 21% 80% 70% 60% 50% 37% 40% 36% 33% 40% 30% 32% 20% 28% 29% 31% 10% 0% 10% 7% 6% 7% 2% 1% 2% 5% PC/Laptop/Tablet usage Mobile device usage File sharing Social media/social network usage 38
39 Q6: How influential are your employees when it comes to adopting technologies for official internal use in your organization? (Somewhat/Extremely influential) Social media/social network usage 53% File sharing 61% Mobile device usage 63% PC/Laptop/Tablet usage 64% 0% 10% 20% 30% 40% 50% 60% 70% 39
40 Q7: How important are the following factors in providing employees with applications and devices they use for business purposes? 1 - Extremely unimportant 2 - Somewhat unimportant 3 - Neutral 4 - Somewhat important 5 - Extremely important 100% 90% 80% 40% 43% 36% 32% 34% 34% 33% 25% 70% 60% 50% 40% 34% 29% 36% 38% 36% 35% 36% 39% 30% 20% 10% 0% 20% 21% 22% 24% 23% 23% 25% 5% 5% 5% 4% 5% 5% 4% 6% 2% 2% 1% 2% 1% 3% 2% 2% Productivity Security Ability to complete work responsibilities Employee satisfaction 28% Ease of use Cost savings Control Networking with peers 40
41 Q7: How important are the following factors in providing employees with applications and devices they use for business purposes? (Somewhat/Extremely important) Networking with peers 64% Control 69% Cost savings 69% Ease of use 70% Employee satisfaction 71% Ability to complete work responsibilities 72% Security 72% Productivity 74% 0% 10% 20% 30% 40% 50% 60% 70% 80% 41
42 Q8: How important are the following features to your employees when it comes to accessing and sharing files? 1 - Extremely unimportant 2 - Somewhat unimportant 3 - Neutral 4 - Somewhat important 5 - Extremely important 100% 90% 80% 70% 60% 37% 34% 34% 30% 50% 40% 37% 37% 37% 38% 30% 20% 10% 0% 21% 23% 23% 1% 4% 5% 1% 4% 1% 5% 1% Ability to share large files Ability to access files across desktops, laptops and mobile devices, including personal devices Ability to upload and update files in shared workspaces 26% File collaboration 42
43 Q8: How important are the following features to your employees when it comes to accessing and sharing files? (Somewhat/Extremely important) File collaboration 68% Ability to upload and update files in shared workspaces 71% Ability to share large files 71% Ability to access files across desktops, laptops and mobile devices, including personal devices 74% 0% 10% 20% 30% 40% 50% 60% 70% 80% 43
44 Q9: What percentage of your employees do you estimate use personal devices for work or work devices for personal purposes? 40% 39% 38% 37% 39% 39% 36% 35% 34% 33% 32% 33% 34% Personal Work 31% 30% 29% Mean Median 44
45 Perceived Problems/Challenges/Risks 45
46 Q10: How familiar are you with how your employees share files internally and externally? Extremely familiar 25% Somewhat familiar 40% Neutral 25% Somewhat unfamiliar 7% Completely unfamiliar 3% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 46
47 Q11: How much of a challenge are the following factors when considering file access and sharing for your organization? 1 - Extremely small challenge 2 - Somewhat small challenge 3 - Neutral 4 - Somewhat large challenge 5 - Extremely large challenge 100% 90% 12% 14% 12% 10% 9% 10% 8% 80% 70% 34% 31% 31% 29% 29% 26% 27% 60% 50% 40% 30% 37% 38% 37% 41% 35% 45% 42% 20% 10% 0% 13% 13% 15% 14% 17% 5% 5% 5% 6% 10% Need to secure multiple endpoints Increasingly complicated security threats Increased mobility of employees, partners, and contractors More communication externally File sizes increasing 13% 16% 6% 7% Use of personal devices for work and vice versa Organization becoming more distributed 47
48 Q11: How much of a challenge are the following factors when considering file access and sharing for your organization? (Somewhat/Extremely large challenge) Organization becoming more distributed 35% Use of personal devices for work and vice versa 36% File sizes increasing 38% More communication externally 39% Increased mobility of employees, partners, and contractors 43% Increasingly complicated security threats 45% Need to secure multiple endpoints 46% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 48
49 Q12: How would you rate the following IT security risks with regards to file sharing solutions? 1 - Extremely low risk 2 - Somewhat low risk 3 - Neutral 4 - Somewhat high risk 5 - Extremely high risk 100% 90% 14% 10% 12% 14% 14% 10% 80% 70% 29% 34% 31% 27% 24% 24% 60% 50% 40% 34% 35% 36% 40% 40% 42% 30% 20% 10% 0% 15% 15% 16% 14% 16% 16% 7% 7% 6% 6% 7% 9% Employees sharing confidential information using unapproved solutions Malware Loss of confidential or Breach of confidential proprietary information information Embarrassment or damage to brand/ reputation Violating regulatory rules 49
50 Q12: How would you rate the following IT security risks with regards to file sharing solutions? Violating regulatory rules 34% Embarrassment or damage to brand/reputation 37% Breach of confidential information 41% Loss of confidential or proprietary information 43% Malware 44% Employees sharing confidential information using unapproved solutions 44% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 50
51 Outcomes 51
52 Q13: Have you implemented internal policies restricting how your employees can access and share files internally and externally? In the process of implementing 18% No 25% Yes 57% 52
53 Q14: Consider the following scenario: One of your employees needs to send a large file to a customer, contractor, or partner (too large for ). Which of the following might your employees do? Don't know 5% Employee searches for and downloads a free file sharing solution 27% Employee downloads application without input from IT 29% Employee utilizes IT system in place 33% Employee uses solution suggested by customer, contractor or partner 42% Employee asks IT for help 51% 0% 10% 20% 30% 40% 50% 60% 53
54 Q15: Consider the following scenario: A customer or partner needs a large file quickly. An employee is not able to meet the deadline due to limitations on the organization's file solutions. What are the potential consequences to your organization? Litigation costs 14% Involvement in data collection process for legal action Reduced stock price Regulatory fines 17% 17% 18% Costs to comply with regulations after a data loss or exposure incident Loss of organization, customer or employee data 22% 24% Direct financial cost 31% Lost revenue 37% Damaged brand reputation/loss of customer trust 41% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 54
State of Security Survey GLOBAL FINDINGS
2011 State of Security Survey GLOBAL FINDINGS CONTENTS Introduction... 4 Methodology... 6 Finding 1: Cybersecurity is important to business... 8 Finding 2: The drivers of security are changing... 10 Finding
The Future of Network Security Sophos 2012 Network Security Survey
The Future of Network Security Sophos 2012 Network Security Survey Sophos and Vanson Bourne surveyed 571 IT decision makers globally to gain a deeper understanding of how IT teams are responding to technology
The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T
The Cost of Insecure Mobile Devices in the Workplace! Sponsored by AT&T Independently conducted by Ponemon Institute LLC Publication Date: March 2014 Part 1. Introduction The Cost of Insecure Mobile Devices
Data loss prevention and endpoint security. Survey findings
Data loss prevention and endpoint security Survey findings Table of Contents Overview 3 Executive summary 4 Half of companies have lost confidential information through removable media 5 Intellectual property
Data Security in Development & Testing
Data Security in Development & Testing Sponsored by Micro Focus Independently conducted by Ponemon Institute LLC Publication Date: July 31, 2009 Ponemon Institute Research Report Data Security in Development
Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution
Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: April 2013 Ponemon Institute Research Report
BYOD & MOBILE SECURITY
2013 surve y results BYOD & MOBILE SECURITY Group Partner Information Security Sponsored by Symantec KPMG Zimbani MailGuard INTRODUCTION Welcome to the 2013 BYOD & Mobile Security Report! Bring Your Own
State of SMB Cyber Security Readiness: UK Study
State of SMB Cyber Security Readiness: UK Study Sponsored by Faronics Independently conducted by Ponemon Institute LLC Publication Date: November 2012 Ponemon Institute Research Report Part 1. Introduction
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
Aftermath of a Data Breach Study
Aftermath of a Data Breach Study Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: January 2012 Ponemon Institute Research Report Aftermath
Webinar and Marketing Technology Purchase Decision Analysis Prepared for ON24
Webinar and Marketing Technology Purchase Decision Analysis Prepared for ON24 December 2015 www.hanoverresearch.com Table of Contents Introduction and Methodology.. P 3 Executive Summary and Key Findings..
Building a Business Case:
Building a Business Case: Cloud-Based Security for Small and Medium-Size Businesses table of contents + Key Business Drivers... 3... 4... 6 A TechTarget White Paper brought to you by Investing in IT security
Understanding Security Complexity in 21 st Century IT Environments:
Understanding Security Complexity in 21 st Century IT Environments: A study of IT practitioners in the US, UK, France, Japan & Germany Sponsored by Check Point Software Technologies Independently conducted
Pu?ng B2B Research to the Legal Test
With the global leader in sampling and data services Pu?ng B2B Research to the Legal Test Ashlin Quirk, SSI General Counsel 2014 Survey Sampling Interna6onal 1 2014 Survey Sampling Interna6onal Se?ng the
How To Get A Cloud Service For A Small Business
Transforming SMB Security Stephen Banbury VP, Global SMB Channel & Alliances Compelling Trends for Change Symantec as a Leader in Security Winning Together 2 NOT SO LONG AGO SMB Attitudes Towards Business
BIG SHIFT TO CLOUD-BASED SECURITY
GUIDE THE BIG SHIFT TO CLOUD-BASED SECURITY How mid-sized and smaller organizations can manage their IT risks and meet regulatory compliance with minimal staff and budget. CONTINUOUS SECURITY TABLE OF
Don't Be The Next Data Loss Story
Don't Be The Next Data Loss Story Data Breaches Don t Discriminate DuPont scientist downloaded 22,000 sensitive documents as he got ready to take a job with a competitor Royal London Mutual Insurance Society
Leveraging the Cloud for Your Business
Leveraging the Cloud for Your Business by CornerStone Telephone Company 2 Third Street Troy, NY 12180 As consumers, we enjoy the benefits of cloud services from companies like Amazon, Google, Apple and
Cybersecurity. Are you prepared?
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
On-premises Managed Services Study. Final Report Prepared for Dimension Data. Nov. 7, 2014 TBR T EC H N O LO G Y B U S I N ES S R ES EAR C H, I N C.
On-premises Managed Services Study Final Report Prepared for Dimension Data Nov. 7, 2014 T EC H N O LO G Y B U S I N ES S R ES EAR C H, I N C. Key Survey Findings 2 Premium Level Base-Level Key Survey
How To Back Up A Virtual Machine
2010 Symantec Disaster Recovery Study Global Results Methodology Applied Research performed survey 1,700 enterprises worldwide 5,000 employees or more Cross-industry 2 Key Findings Virtualization and Cloud
How To Protect Your Organization From Insider Threats
Research Conducted by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security FINANCIAL SERVICES EDITION #2015InsiderThreat RESEARCH BRIEF US FINANCIAL SERVICES SPOTLIGHT ABOUT
in Switzerland. 1 The total values reported in the tables and
1 in Switzerland. Recruiting is increasingly social and Adecco wants to know how it evolves. An international survey, that involved over 17.000 candidates and 1.502 Human Resources managers between March
CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS
CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become
How To Get A New Computer For Your Business
Selling Security to SMBs with 4 th gen Intel Core Processors 1 After this Sales Training, You Will Learn: Where new opportunities lie in the small and medium business market segment Why IT security is
MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)
MOBILE SECURITY Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device) JULY 2014 INTRODUCTION BYOD SECURITY 2014 It s no surprise that there are many articles and papers on
Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: +1.877.896.3611 Web: www.infrascale.
Whitepaper How MSPs are Increasing Revenues by Solving BYOD Issues nfrascaletm Solving the BYOD Problem with Endpoint Data Management and Protection The prolific use of Bring Your Own Device (BYOD) in
The Unintentional Insider Risk in United States and German Organizations
The Unintentional Insider Risk in United States and German Organizations Sponsored by Raytheon Websense Independently conducted by Ponemon Institute LLC Publication Date: July 2015 2 Part 1. Introduction
How To Protect Your Endpoints From Attack
2012 Endpoint Security Best Practices Survey GLOBAL RESULTS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Top tier organizations fare better against attacks... 8 Finding 2: Top tier organizations
Achieving Security in Workplace File Sharing. Sponsored by Axway Independently conducted by Ponemon Institute LLC Publication Date: January 2014
Achieving Security in Workplace File Sharing Sponsored by Axway Independently conducted by Ponemon Institute LLC Publication Date: January 2014 Ponemon Institute Research Report Part 1. Introduction Achieving
2011 NATIONAL SMALL BUSINESS STUDY
2011 NATIONAL SMALL BUSINESS STUDY The National Cyber Security Alliance has conducted a new study with Symantec to analyze cyber security practices, behaviors and perceptions of small businesses throughout
2012 Endpoint Security Best Practices Survey
WHITE PAPER: 2012 ENDPOINT SECURITY BEST PRACTICES SURVEY........................................ 2012 Endpoint Security Best Practices Survey Who should read this paper Small and medium business owners
How-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
ICT budget and staffing trends in the UK
ICT budget and staffing trends in the UK Enterprise ICT investment plans to 2013 January 2013 TABLE OF CONTENTS 1 Trends in ICT budgets... 1 1.1 Introduction... 1 1.2 Survey demographics... 1 1.3 IT budget
Protect Your Universe with ArcSight
Protect Your Universe with ArcSight The ArcSight SIEM Platform: Prevent Data Theft Enforce Compliance Defeat Cybercrime Before ArcSight, it was difficult to know in realtime what was happening from an
Small and Midsize Business Protection Guide
P r o t e c t i o n G u i d e : C l o s e t h e P r o t e c t i o n G a p Small and Midsize Business Protection Guide Close the protection gap and safeguard your business future Confidence in a connected
Fig. 2 - Active Company Presence on Social Media by Industry. % Value. Netherlands, 2014. 89,888,1 88,1 76,7 68,2 69,3 57,4 26,1 0,6 0,6 0 0,6 0,6
1 in Netherlands. Recruiting is increasingly social and Adecco wants to know how it evolves. An international survey, that involved over 17.000 candidates and 1.502 Human Resources managers between March
Protecting personally identifiable information: What data is at risk and what you can do about it
Protecting personally identifiable information: What data is at risk and what you can do about it Virtually every organization acquires, uses and stores personally identifiable information (PII). Most
Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age
Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: August 2013
Building your cloud porbolio APS Connect
Building your cloud porbolio APS Connect 5 th November 2014 Duncan Robinson, Parallels Business Consul3ng Introduc/on to BCS Who are we? Created 3 years ago in response to partner demand Define the strategy
1.877.896.3611 www.infrascale.com
White Paper Making the Upgrade: From Backup Vendor to Data Protection Platform nfrascaletm Simplify Your Business and Offer Customers Complete Data Protection Your customers are ready to explore data protection
EXECUTIVE BRIEF SPON. File Synchronization and Sharing Market Forecast, 2012-2017. Published May 2013. An Osterman Research Executive Brief
EXECUTIVE BRIEF N Sharing Market Forecast, sponsored by An Osterman Research Executive Brief Published May 2013 SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058
Exercising Your Enterprise Cyber Response Crisis Management Capabilities
Exercising Your Enterprise Cyber Response Crisis Management Capabilities Ray Abide, PricewaterhouseCoopers, LLP 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.
Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach? The Second Annual Study on Data Breach Preparedness Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication
OCIE Technology Controls Program
OCIE Technology Controls Program Cybersecurity Update Chris Hetner Cybersecurity Lead, OCIE/TCP 212-336-5546 Introduction (Role, Disclaimer, Background and Speech Topics) SEC Cybersecurity Program Overview
Methods and Practices: Cloud in Retail
Methods and Practices: Cloud in Retail IDC Retail Insights: Retail IT Infrastructure Strategies METHODS AND PRACTICES #RI243398 Kimberly Knickle Leslie Hand Global Headquarters: 5 Speen Street Framingham,
Perceptions About Network Security Survey of IT & IT security practitioners in the U.S.
Perceptions About Network Security Survey of IT & IT security practitioners in the U.S. Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: June 2011 Ponemon
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP [email protected] HP ENTERPRISE SECURITY SERVICES
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP [email protected] HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define
Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions
SURVEY REPORT: cyber security Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions Confidence in a connected world. Executive summary An online survey revealed that while U.S.
Payment Card Industry Data Security Standards
Payment Card Industry Data Security Standards Discussion Objectives Agenda Introduction PCI Overview and History The Protiviti Difference Questions and Discussion 2 2014 Protiviti Inc. CONFIDENTIAL: This
Managing SSL Certificates with Ease
WHITE PAPER: MANAGING SSL CERTIFICATES WITH EASE White Paper Managing SSL Certificates with Ease Best Practices for Maintaining the Security of Sensitive Enterprise Transactions Managing SSL Certificates
Two-Factor Authentication
WHITE PAPER: TWO-FACTOR AUTHENTICATION: A TCO VIEWPOINT........................................ Two-Factor Authentication Who should read this paper This whitepaper is directed at IT, Security, and Compliance
Migrating to Hosted Telephony. Your ultimate guide to migrating from on premise to hosted telephony. www.ucandc.com
Migrating to Hosted Telephony Your ultimate guide to migrating from on premise to hosted telephony Intro What is covered in this guide? A professional and reliable business telephone system is a central
Service Provider Licensing Program
Service Provider Licensing Program ABOUT THE SERVICE PROVIDER LICENSING PROGRAM The Service Provider License Agreement (SPLA) under the Service Provider Licensing Program enables an organization to license
How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device
Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,
Legacy Archiving How many lights do you leave on? September 14 th, 2015
Legacy Archiving How many lights do you leave on? September 14 th, 2015 1 Introductions Wendy Laposata, Himforma(cs Tom Chase, Cone Health 2 About Cone Health More than 100 loca=ons 6 hospitals, 3 ambulatory
The Security Impact of Mobile Device Use by Employees
The Security Impact of Mobile Device Use by Employees Sponsored by Accellion Independently conducted by Ponemon Institute LLC Publication Date: December 2014 Ponemon Institute Research Report The Security
NETWORK SECURITY FOR SMALL AND MID-SIZE BUSINESSES
NETWORK SECURITY FOR SMALL AND MID-SIZE BUSINESSES September, 2015 Derek E. Brink, CISSP, Vice President and Research Fellow IT Security and IT GRC Report Highlights p2 p4 p6 p7 SMBs need to adopt a strategy
Security and Privacy Considerations for BYOD
Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening
Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond
Trend Micro Cloud App Security for Office 365 October 27, 2015 Trevor Richmond Too many malware incidents >90% Targeted Attacks Start with Email Attackers: Target specific companies or individuals Research
2015 Global Study on IT Security Spending & Investments
2015 Study on IT Security Spending & Investments Independently conducted by Ponemon Institute LLC Publication Date: May 2015 Sponsored by Part 1. Introduction Security risks are pervasive and becoming
A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS
A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS Every day McCann Security helps business decision-makers and stakeholders solve cybersecurity issues and protect their critical data and
2012 NCSA / Symantec. National Small Business Study
2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R T h e B e n e f i t s o f C l o u d - B a s e d B a c k u p : A d d r e s s i
10 Smart Ideas for. Keeping Data Safe. From Hackers
0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000
For additional information and evaluation copies of Trend Micro products and services, visit our website at www.trendmicro.com.
TM TREND MICRO, Incorporated is a pioneer in secure content and threat management. Founded in 1988, provides individuals and organizations of all sizes with award-winning security software, hardware, and
Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices
A Forrester Consulting Thought Leadership Paper Commissioned By Xively By LogMeIn August 2015 Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices Table
Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses
Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses October 2014 A Pilot Survey to Compile Cybersecurity Information In July 2014, the Ohio Division of Securities participated
