SMB File Sharing Flash Poll. Global Key Findings
|
|
- Harry Mitchell
- 8 years ago
- Views:
Transcription
1 SMB File Sharing Flash Poll Global Key Findings
2 Methodology Survey performed by Applied Research 1,325 global organiza?ons 30 countries NAM 2 LAM 14 EMEA 7 APJ 7 Person in charge of IT Cross- industry 2
3 Key Findings Behaviors surrounding file sharing are making SMBs vulnerable to risk SMB employees influence adop?on of file sharing solu?ons within their organiza?ons Security threats and data loss are poten?al risks associated with file sharing SMB organiza?ons are becoming more distributed while file size is growing 3
4 Employees Influence AdopAon Employees somewhat- to- extremely influen?al in adop?ng various technologies Security and produc?vity were the top considera?ons for providing technologies to employees Q7: How important are the following factors in providing employees with applications and devices they use for business purposes? (Somewhat/Extremely important) Networking with peers Control Cost savings Ease of use Employee satisfaction Ability to complete work Security Productivity 64% 69% 69% 70% 71% 72% 72% 74% 0% 10% 20% 30% 40% 50% 60% 70% 80% Q6: How influential are your employees when it comes to adopting technologies for official internal use in your organization? (Somewhat/Extremely influential) Social media/social network File sharing Mobile device usage PC/Laptop/Tablet usage 53% 61% 63% 64% 0% 10% 20% 30% 40% 50% 60% 70% 4
5 File Sharing PrioriAes 74% report the access to files across devices as somewhat/ extremely important feature The ability to share files (71 %); the ability to upload and update files in shared workspaces (71%), and file collabora?on (68 %) were also viewed as somewhat/ extremely important Q8: How important are the following features to your employees when it comes to accessing and sharing files? (Somewhat/Extremely important) File collaboration Ability to upload and update files in shared workspaces Ability to share large files Ability to access files across desktops, laptops and mobile devices, including personal devices 68% 71% 71% 74% 0% 10% 20% 30% 40% 50% 60% 70% 80% 5
6 File Sharing Risks Security and data loss were viewed as the most significant poten?al risks with regards to file sharing solu?ons 44% of respondents viewed employees sharing confiden?al informa?on using unapproved solu?ons to be somewhat- to- extremely high risk 44% of respondents viewed malware to be somewhat- to- extremely high risk 43% reported loss of confiden?al or proprietary informa?on to be somewhat- to- extremely high risk 6
7 File Sharing Awareness 10% of respondents were somewhat/completely unfamiliar with how employees are sharing files internally/externally 25% have not implemented internal policies restric?ng how employees access/share files; 18% in the process of implemen?ng Q13: Have you implemented internal policies restricting how your employees can access and share files internally and externally? No 25% In the process of implementing 18% Yes 57% 7
8 File Sharing Behaviors When asked what employees might do when they need to share a large file, respondents indicated they would: Search online and download a free solu?on (27%) Download applica?on without input from IT (29%) U?lize IT system in place (33%) Use solu?on suggested by customer, contractor or partner (42%) Ask IT for help (51%) 41% indicated damaged brand reputa?on/loss of customer consequence of not sharing a large file quickly 8
9 SMBs Becoming More Distributed SMB employees are increasingly working remotely and from home Q1: What percentage of your organization (including contractors) works remotely? Three years ago One year ago Today 22% 26% 32% Q2: What percentage of your organization (including contractors) regularly works from home at least once per week? Three years ago One year ago Today 20% 24% 28% One year from now 37% One year from now 32% 0% 5% 10% 15% 20% 25% 30% 35% 40% 0% 5% 10% 15% 20% 25% 30% 35% 9
10 Primary File Sharing Tool Two- thirds of respondents indicated was a top most commonly used file sharing/collabora?on solu?on. One year from now, some expect to adopt other op?ons with dropping as a most used solu?on (from 64% to 52%). Q3: What are/were your top two most commonly used solutions for sharing and collaborating around files, both internally and externally? (Today) Other (Please specify) Cloud content management solutions External storage media Third-party cloud-based file-software Enterprise Content Management solutions Shared file server 1% 15% 19% 27% 32% 39% 64% 0% 10% 20% 30% 40% 50% 60% 70% 10
11 Files GePng Larger One in seven (14%) report the average size of file shared by their organiza?on to be more than 1 GB today Only 6% es?mated the average size of file to be more than 1 GB three years ago and five years ago. Less than 1 MB 1 to 3 MB 3 to 10 MB 10 to 20 MB 20 to 50 MB 50 to 100 MB 100 to 350 MB 350 MB to 1 GB More than 1 GB Q5: Estimate the average size of a file shared by your organization: (Today) 5% 8% 11% 12% 10% 11% 14% 14% 14% 0% 2% 4% 6% 8% 10% 12% 14% 16% 11
12 Symantec RecommendaAons Centralize file storage and management with a secure web- based system accessible regardless of device or loca?on Implement a scalable system that can grow with your business Implement access controls and permissions to keep private files private Maintain oversight into how and when business files are shared 12
13 Appendix All ques?ons included 13
14 Demographics 14
15 DEMO2: How many total employees does your organization have worldwide? 5 to 49 25% 50 to 99 25% 100 to % 250 to % 0% 5% 10% 15% 20% 25% 30% 15
16 DEMO3: What is your organization's primary industry? Agriculture and Food Processing Aviation Chemical Products Construction Eating and Drinking Services, Accommodations Education, Learning and Support Energy Finance and Insurance Government Information Technology Legal Living-related and Personal Services and Amusement Services Manufacturing Media Marketing Services Mass Transit and Rail Pharmaceuticals Medical, Health Care and Welfare Public Services Public Works Shipping, Freight, and Postal Services Real Estate and Goods Rental and Leasing Scientific Research, Professional and Technical Services Telecommunications Wholesale and Retail Other 1% 1% 1% 1% 1% 2% 1% 0% 1% 2% 2% 2% 2% 2% 3% 3% 4% 4% 5% 6% 7% 10% 10% 10% 10% 10% 0% 2% 4% 6% 8% 10% 12% 16
17 DEMO4: What is your primary role? 100% 90% 100% 80% 70% 60% 50% 40% 30% 20% 10% 0% Manage our computing resources 17
18 DEMO5: What is your title? Company owner Senior Management 19% 21% Day to day office management 5% Human resources 2% IT Management 37% IT Staff 11% Administrative assistant External consultant/outsourcer/var reseller Other external vendor Other 2% 1% 0% 3% 0% 5% 10% 15% 20% 25% 30% 35% 40% 18
19 DEMO6: What is your age? 50 or older (Boomer) 15% 30 or less (Millennial) 19% 31 to 49 (Gen-X) 66% 19
20 DEMO7: What is your gender? Female 32% Male 68% 20
21 DEMO8: For how many years have you been working in computer systems and technology? Mean Median 21
22 DEMO9: What are your company's annual revenues? Less than $500,000 32% $500,000 to $2 million 11% $2 million to $7.5 million 20% $7.5 million to $30 million 22% $30 million to $100 million 6% $100 million to $500 million 4% $500 million to $1.5 billion $1.5 billion to $5 billion $5 billion to $25 billion $25 billion to $100 billion More than $100 billion 2% 2% 3% 0% 0% 0% 5% 10% 15% 20% 25% 30% 35% 22
23 DEMO10: Characterize your company's year-over-year growth rate in terms of annual revenue: Declining 25% per year or greater Declining between 10 and 24% per year Declining between 1 and 9% per year 3% 4% 4% Flat: Neither growing nor declining 18% Growing between 1 and 9% per year 39% Growing between 10 and 24% per year 20% Growing between 25 and 49% per year Growing between 50 and 99% per year Growing 100% per year or more Decline to state 4% 4% 0% 3% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 23
24 File Sharing Drivers 24
25 Q1: What percentage of your organization (including contractors) works remotely? (Means shown) Three years ago 22% One year ago 26% Today 32% One year from now 37% 0% 5% 10% 15% 20% 25% 30% 35% 40% 25
26 Q1: What percentage of your organization (including contractors) works remotely? (Medians shown) Three years ago 15% One year ago 20% Today 25% One year from now 30% 0% 5% 10% 15% 20% 25% 30% 35% 26
27 Q2: What percentage of your organization (including contractors) regularly works from home at least once per week? (Means shown) Three years ago 20% One year ago 24% Today 28% One year from now 32% 0% 5% 10% 15% 20% 25% 30% 35% 27
28 Q2: What percentage of your organization (including contractors) regularly works from home at least once per week? (Medians shown) Three years ago 10% One year ago 16% Today 22% One year from now 25% 0% 5% 10% 15% 20% 25% 30% 28
29 Q3: What are/were your top two most commonly used solutions for sharing and collaborating around files, both internally and externally? (Three years ago) Other (Please specify) 1% Cloud content management solutions 8% External storage media 23% Third-party cloud-based file-software applications 19% Enterprise Content Management solutions 48% Shared file server 33% 65% 0% 10% 20% 30% 40% 50% 60% 70% 29
30 Q3: What are/were your top two most commonly used solutions for sharing and collaborating around files, both internally and externally? (Today) Other (Please specify) 1% Cloud content management solutions 15% External storage media 19% Third-party cloud-based file-software applications 27% Enterprise Content Management solutions 32% Shared file server 39% 64% 0% 10% 20% 30% 40% 50% 60% 70% 30
31 Q3: What are/were your top two most commonly used solutions for sharing and collaborating around files, both internally and externally? (One year from now) Other (Please specify) 2% Cloud content management solutions 25% External storage media 16% Third-party cloud-based file-software applications 30% Enterprise Content Management solutions 34% Shared file server 37% 52% 0% 10% 20% 30% 40% 50% 60% 31
32 Q4: Rate the importance of providing file sharing and collaboration technology for your organization for the following scenarios: 1 - Extremely unimportant 2 - Somewhat unimportant 3 - Neutral 4 - Somewhat important 5 - Extremely important 100% 90% 80% 37% 27% 28% 24% 25% 19% 70% 60% 50% 31% 35% 32% 35% 34% 34% 40% 30% 20% 27% 30% 30% 31% 29% 33% 10% 0% 4% 6% 7% 8% 8% 10% 2% 3% 4% 2% 3% 4% Between internal teams Project management - internal and external With clients and customers Remote collaboration Large file sharing With third party vendors 32
33 Q4: Rate the importance of providing file sharing and collaboration technology for your organization for the following scenarios: (Somewhat/Extremely important) With third party vendors 53% Large file sharing 59% Remote collaboration 59% With clients and customers 60% Project management - internal and external 61% Between internal teams 67% 0% 10% 20% 30% 40% 50% 60% 70% 80% 33
34 Q5: Estimate the average size of a file shared by your organization: (Today) Less than 1 MB 5% 1 to 3 MB 8% 3 to 10 MB 12% 10 to 20 MB 14% 20 to 50 MB 11% 50 to 100 MB 14% 100 to 350 MB 10% 350 MB to 1 GB 11% More than 1 GB 14% 0% 2% 4% 6% 8% 10% 12% 14% 16% 34
35 Q5: Estimate the average size of a file shared by your organization: (Three years ago) Less than 1 MB 8% 1 to 3 MB 13% 3 to 10 MB 13% 10 to 20 MB 14% 20 to 50 MB 15% 50 to 100 MB 12% 100 to 350 MB 12% 350 MB to 1 GB 8% More than 1 GB 6% 0% 2% 4% 6% 8% 10% 12% 14% 16% 35
36 Q5: Estimate the average size of a file shared by your organization: (Five years ago) Less than 1 MB 19% 1 to 3 MB 15% 3 to 10 MB 12% 10 to 20 MB 10% 20 to 50 MB 12% 50 to 100 MB 10% 100 to 350 MB 9% 350 MB to 1 GB 8% More than 1 GB 6% 0% 2% 4% 6% 8% 10% 12% 14% 16% 18% 20% 36
37 AdopAon Cycles 37
38 Q6: How influential are your employees when it comes to adopting technologies for official internal use in your organization? 1 - Not influential at all 2 - Not that influential 3 - Neutral 4 - Somewhat influential 5 - Extremely influential 100% 90% 27% 24% 24% 21% 80% 70% 60% 50% 37% 40% 36% 33% 40% 30% 32% 20% 28% 29% 31% 10% 0% 10% 7% 6% 7% 2% 1% 2% 5% PC/Laptop/Tablet usage Mobile device usage File sharing Social media/social network usage 38
39 Q6: How influential are your employees when it comes to adopting technologies for official internal use in your organization? (Somewhat/Extremely influential) Social media/social network usage 53% File sharing 61% Mobile device usage 63% PC/Laptop/Tablet usage 64% 0% 10% 20% 30% 40% 50% 60% 70% 39
40 Q7: How important are the following factors in providing employees with applications and devices they use for business purposes? 1 - Extremely unimportant 2 - Somewhat unimportant 3 - Neutral 4 - Somewhat important 5 - Extremely important 100% 90% 80% 40% 43% 36% 32% 34% 34% 33% 25% 70% 60% 50% 40% 34% 29% 36% 38% 36% 35% 36% 39% 30% 20% 10% 0% 20% 21% 22% 24% 23% 23% 25% 5% 5% 5% 4% 5% 5% 4% 6% 2% 2% 1% 2% 1% 3% 2% 2% Productivity Security Ability to complete work responsibilities Employee satisfaction 28% Ease of use Cost savings Control Networking with peers 40
41 Q7: How important are the following factors in providing employees with applications and devices they use for business purposes? (Somewhat/Extremely important) Networking with peers 64% Control 69% Cost savings 69% Ease of use 70% Employee satisfaction 71% Ability to complete work responsibilities 72% Security 72% Productivity 74% 0% 10% 20% 30% 40% 50% 60% 70% 80% 41
42 Q8: How important are the following features to your employees when it comes to accessing and sharing files? 1 - Extremely unimportant 2 - Somewhat unimportant 3 - Neutral 4 - Somewhat important 5 - Extremely important 100% 90% 80% 70% 60% 37% 34% 34% 30% 50% 40% 37% 37% 37% 38% 30% 20% 10% 0% 21% 23% 23% 1% 4% 5% 1% 4% 1% 5% 1% Ability to share large files Ability to access files across desktops, laptops and mobile devices, including personal devices Ability to upload and update files in shared workspaces 26% File collaboration 42
43 Q8: How important are the following features to your employees when it comes to accessing and sharing files? (Somewhat/Extremely important) File collaboration 68% Ability to upload and update files in shared workspaces 71% Ability to share large files 71% Ability to access files across desktops, laptops and mobile devices, including personal devices 74% 0% 10% 20% 30% 40% 50% 60% 70% 80% 43
44 Q9: What percentage of your employees do you estimate use personal devices for work or work devices for personal purposes? 40% 39% 38% 37% 39% 39% 36% 35% 34% 33% 32% 33% 34% Personal Work 31% 30% 29% Mean Median 44
45 Perceived Problems/Challenges/Risks 45
46 Q10: How familiar are you with how your employees share files internally and externally? Extremely familiar 25% Somewhat familiar 40% Neutral 25% Somewhat unfamiliar 7% Completely unfamiliar 3% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 46
47 Q11: How much of a challenge are the following factors when considering file access and sharing for your organization? 1 - Extremely small challenge 2 - Somewhat small challenge 3 - Neutral 4 - Somewhat large challenge 5 - Extremely large challenge 100% 90% 12% 14% 12% 10% 9% 10% 8% 80% 70% 34% 31% 31% 29% 29% 26% 27% 60% 50% 40% 30% 37% 38% 37% 41% 35% 45% 42% 20% 10% 0% 13% 13% 15% 14% 17% 5% 5% 5% 6% 10% Need to secure multiple endpoints Increasingly complicated security threats Increased mobility of employees, partners, and contractors More communication externally File sizes increasing 13% 16% 6% 7% Use of personal devices for work and vice versa Organization becoming more distributed 47
48 Q11: How much of a challenge are the following factors when considering file access and sharing for your organization? (Somewhat/Extremely large challenge) Organization becoming more distributed 35% Use of personal devices for work and vice versa 36% File sizes increasing 38% More communication externally 39% Increased mobility of employees, partners, and contractors 43% Increasingly complicated security threats 45% Need to secure multiple endpoints 46% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 48
49 Q12: How would you rate the following IT security risks with regards to file sharing solutions? 1 - Extremely low risk 2 - Somewhat low risk 3 - Neutral 4 - Somewhat high risk 5 - Extremely high risk 100% 90% 14% 10% 12% 14% 14% 10% 80% 70% 29% 34% 31% 27% 24% 24% 60% 50% 40% 34% 35% 36% 40% 40% 42% 30% 20% 10% 0% 15% 15% 16% 14% 16% 16% 7% 7% 6% 6% 7% 9% Employees sharing confidential information using unapproved solutions Malware Loss of confidential or Breach of confidential proprietary information information Embarrassment or damage to brand/ reputation Violating regulatory rules 49
50 Q12: How would you rate the following IT security risks with regards to file sharing solutions? Violating regulatory rules 34% Embarrassment or damage to brand/reputation 37% Breach of confidential information 41% Loss of confidential or proprietary information 43% Malware 44% Employees sharing confidential information using unapproved solutions 44% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 50
51 Outcomes 51
52 Q13: Have you implemented internal policies restricting how your employees can access and share files internally and externally? In the process of implementing 18% No 25% Yes 57% 52
53 Q14: Consider the following scenario: One of your employees needs to send a large file to a customer, contractor, or partner (too large for ). Which of the following might your employees do? Don't know 5% Employee searches for and downloads a free file sharing solution 27% Employee downloads application without input from IT 29% Employee utilizes IT system in place 33% Employee uses solution suggested by customer, contractor or partner 42% Employee asks IT for help 51% 0% 10% 20% 30% 40% 50% 60% 53
54 Q15: Consider the following scenario: A customer or partner needs a large file quickly. An employee is not able to meet the deadline due to limitations on the organization's file solutions. What are the potential consequences to your organization? Litigation costs 14% Involvement in data collection process for legal action Reduced stock price Regulatory fines 17% 17% 18% Costs to comply with regulations after a data loss or exposure incident Loss of organization, customer or employee data 22% 24% Direct financial cost 31% Lost revenue 37% Damaged brand reputation/loss of customer trust 41% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 54
State of Mobility Survey. France Results
State of Mobility Survey France Results Methodology Survey performed by Applied Research 6,275 global organizations 43 countries NAM 2 LAM 14 EMEA 13 APJ 14 SMBs: Individuals in charge of computers Enterprises:
More informationState of Security Survey GLOBAL FINDINGS
2011 State of Security Survey GLOBAL FINDINGS CONTENTS Introduction... 4 Methodology... 6 Finding 1: Cybersecurity is important to business... 8 Finding 2: The drivers of security are changing... 10 Finding
More informationThe Future of Network Security Sophos 2012 Network Security Survey
The Future of Network Security Sophos 2012 Network Security Survey Sophos and Vanson Bourne surveyed 571 IT decision makers globally to gain a deeper understanding of how IT teams are responding to technology
More informationThe Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T
The Cost of Insecure Mobile Devices in the Workplace! Sponsored by AT&T Independently conducted by Ponemon Institute LLC Publication Date: March 2014 Part 1. Introduction The Cost of Insecure Mobile Devices
More informationTHE STATE OF IT RECOVERY FOR SMBS: A SURVEY OF IT PROFESSIONALS
Introduction Unscheduled downtime can have dramatic impacts on business results. Outages are detrimental to any business, regardless of its size. With increasingly complex and critical IT environments,
More information2012 Bit9 Cyber Security Research Report
2012 Bit9 Cyber Security Research Report Table of Contents Executive Summary Survey Participants Conclusion Appendix 3 4 10 11 Executive Summary According to the results of a recent survey conducted by
More informationIs Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution
Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: March 2013 Ponemon Institute Research Report
More informationData loss prevention and endpoint security. Survey findings
Data loss prevention and endpoint security Survey findings Table of Contents Overview 3 Executive summary 4 Half of companies have lost confidential information through removable media 5 Intellectual property
More informationData Security in Development & Testing
Data Security in Development & Testing Sponsored by Micro Focus Independently conducted by Ponemon Institute LLC Publication Date: July 31, 2009 Ponemon Institute Research Report Data Security in Development
More informationIs Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution
Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: April 2013 Ponemon Institute Research Report
More informationBYOD & MOBILE SECURITY
2013 surve y results BYOD & MOBILE SECURITY Group Partner Information Security Sponsored by Symantec KPMG Zimbani MailGuard INTRODUCTION Welcome to the 2013 BYOD & Mobile Security Report! Bring Your Own
More informationCloud Infrastructure Services Survey: Key UK Takeaways. Survey conducted by
Cloud Infrastructure Services Survey: Key UK Takeaways Survey conducted by Despite Understanding the Benefits of Cloud Compu7ng, UK IT Teams are Taking a Staged Approach with Migra7on NaviSite Europe Limited,
More informationState of SMB Cyber Security Readiness: UK Study
State of SMB Cyber Security Readiness: UK Study Sponsored by Faronics Independently conducted by Ponemon Institute LLC Publication Date: November 2012 Ponemon Institute Research Report Part 1. Introduction
More informationState of the Phish 2015
Introduction The threat is real Phishing continues to pose a growing threat to the security of industries of every kind from financial organizations to government contractors to healthcare firms. Though
More informationSYMANTEC 2010 SMB INFORMATION PROTECTION SURVEY. Symantec 2010 SMB Information Protection Survey. Global Data
SYMANTEC 2010 SMB INFORMATION PROTECTION SURVEY Symantec 2010 SMB Information Protection Survey Global Data June 2010 CONTENTS Executive Summary...3 Methodology...4 Finding 1: SMBs serious about information
More informationAnalyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
More informationAftermath of a Data Breach Study
Aftermath of a Data Breach Study Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: January 2012 Ponemon Institute Research Report Aftermath
More informationWebinar and Marketing Technology Purchase Decision Analysis Prepared for ON24
Webinar and Marketing Technology Purchase Decision Analysis Prepared for ON24 December 2015 www.hanoverresearch.com Table of Contents Introduction and Methodology.. P 3 Executive Summary and Key Findings..
More informationCommunity and Economic Development: Collaborative Leadership To Promote Regional Workforce Development
Community and Economic Development: Collaborative Leadership To Promote Regional Workforce Development Presented By: Todd Greene Vice President ATLANTA SKYLINE Photo by Chuck Koehler, Creative Commons
More informationInformation Security Addressing Your Advanced Threats
Information Security Addressing Your Advanced Threats Where We are Going Information Security Landscape The Threats You Face How To Protect Yourself This Will Not Be Boring What Is Information Security?
More informationUpdate on the Cloud Demonstration Project
Update on the Cloud Demonstration Project Khalil Yazdi and Steven Wallace Spring Member Meeting April 19, 2011 Project Par4cipants BACKGROUND Eleven Universi1es: Caltech, Carnegie Mellon, George Mason,
More informationBuilding a Business Case:
Building a Business Case: Cloud-Based Security for Small and Medium-Size Businesses table of contents + Key Business Drivers... 3... 4... 6 A TechTarget White Paper brought to you by Investing in IT security
More informationUnderstanding Security Complexity in 21 st Century IT Environments:
Understanding Security Complexity in 21 st Century IT Environments: A study of IT practitioners in the US, UK, France, Japan & Germany Sponsored by Check Point Software Technologies Independently conducted
More informationFinancial Services/Banking (Portable Technology) Healthcare (Portable Technology) SoPware in U8li8es Industry (Office Produc8vity- CRM)
To show examples of how SMBs use technology in a posi8ve way for their businesses at their desks or out of the office. Focusing this on the many companies that are under 50 employees on Cape Cod and surrounding
More informationPu?ng B2B Research to the Legal Test
With the global leader in sampling and data services Pu?ng B2B Research to the Legal Test Ashlin Quirk, SSI General Counsel 2014 Survey Sampling Interna6onal 1 2014 Survey Sampling Interna6onal Se?ng the
More informationHow To Get A Cloud Service For A Small Business
Transforming SMB Security Stephen Banbury VP, Global SMB Channel & Alliances Compelling Trends for Change Symantec as a Leader in Security Winning Together 2 NOT SO LONG AGO SMB Attitudes Towards Business
More informationBIG SHIFT TO CLOUD-BASED SECURITY
GUIDE THE BIG SHIFT TO CLOUD-BASED SECURITY How mid-sized and smaller organizations can manage their IT risks and meet regulatory compliance with minimal staff and budget. CONTINUOUS SECURITY TABLE OF
More informationDon't Be The Next Data Loss Story
Don't Be The Next Data Loss Story Data Breaches Don t Discriminate DuPont scientist downloaded 22,000 sensitive documents as he got ready to take a job with a competitor Royal London Mutual Insurance Society
More informationLeveraging the Cloud for Your Business
Leveraging the Cloud for Your Business by CornerStone Telephone Company 2 Third Street Troy, NY 12180 As consumers, we enjoy the benefits of cloud services from companies like Amazon, Google, Apple and
More informationCybersecurity. Are you prepared?
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
More informationOn-premises Managed Services Study. Final Report Prepared for Dimension Data. Nov. 7, 2014 TBR T EC H N O LO G Y B U S I N ES S R ES EAR C H, I N C.
On-premises Managed Services Study Final Report Prepared for Dimension Data Nov. 7, 2014 T EC H N O LO G Y B U S I N ES S R ES EAR C H, I N C. Key Survey Findings 2 Premium Level Base-Level Key Survey
More informationHow To Back Up A Virtual Machine
2010 Symantec Disaster Recovery Study Global Results Methodology Applied Research performed survey 1,700 enterprises worldwide 5,000 employees or more Cross-industry 2 Key Findings Virtualization and Cloud
More informationHow To Protect Your Organization From Insider Threats
Research Conducted by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security FINANCIAL SERVICES EDITION #2015InsiderThreat RESEARCH BRIEF US FINANCIAL SERVICES SPOTLIGHT ABOUT
More informationMPS & VPS: Not Just for Hos1ng!
MPS & VPS: Not Just for Hos1ng! Ivan Hur) Sr. Product Manager Verio Inc Privileged and Confiden/al: NDA Required for External Disclosure 2/11/10 1 Privileged and Confiden/al: NDA Required for External
More informationin Switzerland. 1 The total values reported in the tables and
1 in Switzerland. Recruiting is increasingly social and Adecco wants to know how it evolves. An international survey, that involved over 17.000 candidates and 1.502 Human Resources managers between March
More informationCYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS
CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become
More informationDon t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks
Don t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks Thank you for joining us. We have a great many participants in today s call. Your phone is currently
More informationHow To Get A New Computer For Your Business
Selling Security to SMBs with 4 th gen Intel Core Processors 1 After this Sales Training, You Will Learn: Where new opportunities lie in the small and medium business market segment Why IT security is
More informationMOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)
MOBILE SECURITY Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device) JULY 2014 INTRODUCTION BYOD SECURITY 2014 It s no surprise that there are many articles and papers on
More informationWhitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: +1.877.896.3611 Web: www.infrascale.
Whitepaper How MSPs are Increasing Revenues by Solving BYOD Issues nfrascaletm Solving the BYOD Problem with Endpoint Data Management and Protection The prolific use of Bring Your Own Device (BYOD) in
More informationThe Unintentional Insider Risk in United States and German Organizations
The Unintentional Insider Risk in United States and German Organizations Sponsored by Raytheon Websense Independently conducted by Ponemon Institute LLC Publication Date: July 2015 2 Part 1. Introduction
More informationHow To Protect Your Endpoints From Attack
2012 Endpoint Security Best Practices Survey GLOBAL RESULTS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Top tier organizations fare better against attacks... 8 Finding 2: Top tier organizations
More informationAchieving Security in Workplace File Sharing. Sponsored by Axway Independently conducted by Ponemon Institute LLC Publication Date: January 2014
Achieving Security in Workplace File Sharing Sponsored by Axway Independently conducted by Ponemon Institute LLC Publication Date: January 2014 Ponemon Institute Research Report Part 1. Introduction Achieving
More information2011 NATIONAL SMALL BUSINESS STUDY
2011 NATIONAL SMALL BUSINESS STUDY The National Cyber Security Alliance has conducted a new study with Symantec to analyze cyber security practices, behaviors and perceptions of small businesses throughout
More information2012 Endpoint Security Best Practices Survey
WHITE PAPER: 2012 ENDPOINT SECURITY BEST PRACTICES SURVEY........................................ 2012 Endpoint Security Best Practices Survey Who should read this paper Small and medium business owners
More informationHow-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
More informationICT budget and staffing trends in the UK
ICT budget and staffing trends in the UK Enterprise ICT investment plans to 2013 January 2013 TABLE OF CONTENTS 1 Trends in ICT budgets... 1 1.1 Introduction... 1 1.2 Survey demographics... 1 1.3 IT budget
More informationProtect Your Universe with ArcSight
Protect Your Universe with ArcSight The ArcSight SIEM Platform: Prevent Data Theft Enforce Compliance Defeat Cybercrime Before ArcSight, it was difficult to know in realtime what was happening from an
More informationLeading the Pack - IBM Enterprise Content Management Solutions
IBM Enterprise Content Management Enterprise Content Management in 2015 Rich Howarth Vice President, ECM Products and Strategy Guide Executive Club March 30 2015 2014 IBM Corpora/on ECM is about driving
More informationSmall and Midsize Business Protection Guide
P r o t e c t i o n G u i d e : C l o s e t h e P r o t e c t i o n G a p Small and Midsize Business Protection Guide Close the protection gap and safeguard your business future Confidence in a connected
More informationFig. 2 - Active Company Presence on Social Media by Industry. % Value. Netherlands, 2014. 89,888,1 88,1 76,7 68,2 69,3 57,4 26,1 0,6 0,6 0 0,6 0,6
1 in Netherlands. Recruiting is increasingly social and Adecco wants to know how it evolves. An international survey, that involved over 17.000 candidates and 1.502 Human Resources managers between March
More informationProtecting personally identifiable information: What data is at risk and what you can do about it
Protecting personally identifiable information: What data is at risk and what you can do about it Virtually every organization acquires, uses and stores personally identifiable information (PII). Most
More information2015 VORMETRIC INSIDER THREAT REPORT
Research Conducted by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security HEALTHCARE EDITION #2015InsiderThreat RESEARCH BRIEF U.S. HEALTHCARE SPOTLIGHT ABOUT THIS RESEARCH
More informationManaging Cyber Security as a Business Risk: Cyber Insurance in the Digital Age
Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: August 2013
More informationBuilding your cloud porbolio APS Connect
Building your cloud porbolio APS Connect 5 th November 2014 Duncan Robinson, Parallels Business Consul3ng Introduc/on to BCS Who are we? Created 3 years ago in response to partner demand Define the strategy
More information2014: A Year of Mega Breaches
2014: A Year of Mega Breaches Sponsored by Identity Finder Independently conducted by Ponemon Institute LLC Publication Date: January 2015 Ponemon Institute Research Report Part 1. Introduction 2014: A
More information1.877.896.3611 www.infrascale.com
White Paper Making the Upgrade: From Backup Vendor to Data Protection Platform nfrascaletm Simplify Your Business and Offer Customers Complete Data Protection Your customers are ready to explore data protection
More informationEXECUTIVE BRIEF SPON. File Synchronization and Sharing Market Forecast, 2012-2017. Published May 2013. An Osterman Research Executive Brief
EXECUTIVE BRIEF N Sharing Market Forecast, sponsored by An Osterman Research Executive Brief Published May 2013 SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058
More informationExercising Your Enterprise Cyber Response Crisis Management Capabilities
Exercising Your Enterprise Cyber Response Crisis Management Capabilities Ray Abide, PricewaterhouseCoopers, LLP 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.
More informationIs Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach? The Second Annual Study on Data Breach Preparedness Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication
More informationOCIE Technology Controls Program
OCIE Technology Controls Program Cybersecurity Update Chris Hetner Cybersecurity Lead, OCIE/TCP 212-336-5546 Introduction (Role, Disclaimer, Background and Speech Topics) SEC Cybersecurity Program Overview
More informationMethods and Practices: Cloud in Retail
Methods and Practices: Cloud in Retail IDC Retail Insights: Retail IT Infrastructure Strategies METHODS AND PRACTICES #RI243398 Kimberly Knickle Leslie Hand Global Headquarters: 5 Speen Street Framingham,
More informationPerceptions About Network Security Survey of IT & IT security practitioners in the U.S.
Perceptions About Network Security Survey of IT & IT security practitioners in the U.S. Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: June 2011 Ponemon
More informationSURVEY RESULTS CYBER-SECURITY PRACTICES OF MINNESOTA REGISTERD INVESTMENT ADVISERS
SURVEY RESULTS CYBER-SECURITY PRACTICES OF MINNESOTA REGISTERD INVESTMENT ADVISERS Minnesota Department of Commerce July 2014 GENERIC FIRM INFORMATION Has your firm been the subject of a cyber-security
More informationREPORT 2014 Eastern Europe and MENA
Find out how companies and jobseekers use social media in the job market. REPORT 2014 Eastern Europe and MENA 1 The Use of Social Media in the Matching Between Supply and Demand within the Labor Market.
More informationInterna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES
Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define
More informationCybersecurity Report on Small Business: Study Shows Gap between Needs and Actions
SURVEY REPORT: cyber security Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions Confidence in a connected world. Executive summary An online survey revealed that while U.S.
More informationPayment Card Industry Data Security Standards
Payment Card Industry Data Security Standards Discussion Objectives Agenda Introduction PCI Overview and History The Protiviti Difference Questions and Discussion 2 2014 Protiviti Inc. CONFIDENTIAL: This
More informationManaging SSL Certificates with Ease
WHITE PAPER: MANAGING SSL CERTIFICATES WITH EASE White Paper Managing SSL Certificates with Ease Best Practices for Maintaining the Security of Sensitive Enterprise Transactions Managing SSL Certificates
More informationTwo-Factor Authentication
WHITE PAPER: TWO-FACTOR AUTHENTICATION: A TCO VIEWPOINT........................................ Two-Factor Authentication Who should read this paper This whitepaper is directed at IT, Security, and Compliance
More informationMigrating to Hosted Telephony. Your ultimate guide to migrating from on premise to hosted telephony. www.ucandc.com
Migrating to Hosted Telephony Your ultimate guide to migrating from on premise to hosted telephony Intro What is covered in this guide? A professional and reliable business telephone system is a central
More information2 P a g e IntelliSuite Whitepaper - How Cloud Computing Overcomes 11 Common IT Problems
Copyright 2014, IntelliSuite. All rights reserved. This document is provided for information purposes only and the contents hereof are subject to change without notice. This document is not warranted to
More informationUnderstanding Layered Security and Defense in Depth
Understanding Layered Security and Defense in Depth Introduction Cybercriminals are becoming far more sophisticated as technology evolves. Well-publicized security breaches of major corporations are capturing
More informationService Provider Licensing Program
Service Provider Licensing Program ABOUT THE SERVICE PROVIDER LICENSING PROGRAM The Service Provider License Agreement (SPLA) under the Service Provider Licensing Program enables an organization to license
More informationSafety at Work data from the Bureau of Labor Statistics. Chart 1
Safety at Work data from the Bureau of Labor Statistics Chart 1 Safety at Work: Fatal Injuries 2011: 4,609 fatal work injuries Older workers are 4 times more likely to be killed on the job. Over 90 percent
More informationHow To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device
Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,
More informationLegacy Archiving How many lights do you leave on? September 14 th, 2015
Legacy Archiving How many lights do you leave on? September 14 th, 2015 1 Introductions Wendy Laposata, Himforma(cs Tom Chase, Cone Health 2 About Cone Health More than 100 loca=ons 6 hospitals, 3 ambulatory
More informationMANAGED SERVICES WITH PANDA MANAGED OFFICE PROTECTION Increase your revenue, reduce your costs www.pandasecurity.com Pag. 1 Introduction S oftware as a Service or SaaS 1 is rapidly shifting from just a
More informationThe Security Impact of Mobile Device Use by Employees
The Security Impact of Mobile Device Use by Employees Sponsored by Accellion Independently conducted by Ponemon Institute LLC Publication Date: December 2014 Ponemon Institute Research Report The Security
More informationNETWORK SECURITY FOR SMALL AND MID-SIZE BUSINESSES
NETWORK SECURITY FOR SMALL AND MID-SIZE BUSINESSES September, 2015 Derek E. Brink, CISSP, Vice President and Research Fellow IT Security and IT GRC Report Highlights p2 p4 p6 p7 SMBs need to adopt a strategy
More informationSecuring Endpoints without a Security Expert
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Securing Endpoints without a Security Expert sponsored by Introduction to Realtime Publishers by Don Jones, Series
More information2015 Global Cyber Impact Report
2015 Global Cyber Impact Report Sponsored by Aon Risk Services Independently conducted by Ponemon Institute LLC Publication Date: April 2015 2015 Global Cyber Impact Report Ponemon Institute, April 2015
More informationWindows XP End-of-Life Handbook for Upgrade Latecomers
s Why Windows XP End-of-Life Handbook for Upgrade Latecomers s Why Introduction Windows XP end of life is April 8, 2014. Do you have Windows XP systems but can t upgrade to Windows 7 or Windows 8, or can
More informationHow To Grow A Data Center System
Zettaset Big Data Ecosystem Discussion Guide Jim Vogt, President & CEO, Zettaset June 20, 2014 The informa,on provided in this document cons,tutes confiden,al and proprietary informa,on of Ze8aset, Inc.
More informationSecurity and Privacy Considerations for BYOD
Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening
More informationTrend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond
Trend Micro Cloud App Security for Office 365 October 27, 2015 Trevor Richmond Too many malware incidents >90% Targeted Attacks Start with Email Attackers: Target specific companies or individuals Research
More information2015 Global Study on IT Security Spending & Investments
2015 Study on IT Security Spending & Investments Independently conducted by Ponemon Institute LLC Publication Date: May 2015 Sponsored by Part 1. Introduction Security risks are pervasive and becoming
More informationA PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS
A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS Every day McCann Security helps business decision-makers and stakeholders solve cybersecurity issues and protect their critical data and
More information2012 NCSA / Symantec. National Small Business Study
2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R T h e B e n e f i t s o f C l o u d - B a s e d B a c k u p : A d d r e s s i
More information10 Smart Ideas for. Keeping Data Safe. From Hackers
0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000
More informationMassachusetts Residents
Identity Theft & Fraud Protection for Identity Theft & Fraud Protection for Massachusetts Residents Copyright Notice November 2009 Joe Burns All rights reserved This PowerPoint presentation is a part of
More informationFor additional information and evaluation copies of Trend Micro products and services, visit our website at www.trendmicro.com.
TM TREND MICRO, Incorporated is a pioneer in secure content and threat management. Founded in 1988, provides individuals and organizations of all sizes with award-winning security software, hardware, and
More informationConnect and Protect: The Importance Of Security And Identity Access Management For Connected Devices
A Forrester Consulting Thought Leadership Paper Commissioned By Xively By LogMeIn August 2015 Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices Table
More informationWhat You Don t Know Will Hurt You: A Study of the Risk from Application Access and Usage
What You Don t Know Will Hurt You: A Study of the Risk from Application Access and Usage Sponsored by ObserveIT Independently conducted by Ponemon Institute LLC June 2015 Ponemon Institute Research Report
More informationCybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses
Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses October 2014 A Pilot Survey to Compile Cybersecurity Information In July 2014, the Ohio Division of Securities participated
More informationMy CEO wants an ipad now what? Mobile Security for the Enterprise
My CEO wants an ipad now what? Mobile Security for the Enterprise Agenda Introductions Emerging Mobile Trends Mobile Risk Landscape Response Framework Closing Thoughts 2 Introductions Amandeep Lamba Manager
More informationFrom Big Data to Value
From Big Data to Value The Power of Master Data Management 2.0 Sergio Juarez SVP Elemica EMEA & LATAM Reveal Oct 2014 Agenda Master Data Management Why Now? What To Do? How To Do It? What s Next? Today
More informationPeer Research Desktop Virtualization Insights for IT Strategic Planning
SEPTEMBER 2011 Peer Research Desktop Virtualization Insights for IT Strategic Planning Why you should read this document: This report describes key findings from a survey of 200 IT professionals that can
More information