SMB File Sharing Flash Poll. Global Key Findings

Size: px
Start display at page:

Download "SMB File Sharing Flash Poll. Global Key Findings"

Transcription

1 SMB File Sharing Flash Poll Global Key Findings

2 Methodology Survey performed by Applied Research 1,325 global organiza?ons 30 countries NAM 2 LAM 14 EMEA 7 APJ 7 Person in charge of IT Cross- industry 2

3 Key Findings Behaviors surrounding file sharing are making SMBs vulnerable to risk SMB employees influence adop?on of file sharing solu?ons within their organiza?ons Security threats and data loss are poten?al risks associated with file sharing SMB organiza?ons are becoming more distributed while file size is growing 3

4 Employees Influence AdopAon Employees somewhat- to- extremely influen?al in adop?ng various technologies Security and produc?vity were the top considera?ons for providing technologies to employees Q7: How important are the following factors in providing employees with applications and devices they use for business purposes? (Somewhat/Extremely important) Networking with peers Control Cost savings Ease of use Employee satisfaction Ability to complete work Security Productivity 64% 69% 69% 70% 71% 72% 72% 74% 0% 10% 20% 30% 40% 50% 60% 70% 80% Q6: How influential are your employees when it comes to adopting technologies for official internal use in your organization? (Somewhat/Extremely influential) Social media/social network File sharing Mobile device usage PC/Laptop/Tablet usage 53% 61% 63% 64% 0% 10% 20% 30% 40% 50% 60% 70% 4

5 File Sharing PrioriAes 74% report the access to files across devices as somewhat/ extremely important feature The ability to share files (71 %); the ability to upload and update files in shared workspaces (71%), and file collabora?on (68 %) were also viewed as somewhat/ extremely important Q8: How important are the following features to your employees when it comes to accessing and sharing files? (Somewhat/Extremely important) File collaboration Ability to upload and update files in shared workspaces Ability to share large files Ability to access files across desktops, laptops and mobile devices, including personal devices 68% 71% 71% 74% 0% 10% 20% 30% 40% 50% 60% 70% 80% 5

6 File Sharing Risks Security and data loss were viewed as the most significant poten?al risks with regards to file sharing solu?ons 44% of respondents viewed employees sharing confiden?al informa?on using unapproved solu?ons to be somewhat- to- extremely high risk 44% of respondents viewed malware to be somewhat- to- extremely high risk 43% reported loss of confiden?al or proprietary informa?on to be somewhat- to- extremely high risk 6

7 File Sharing Awareness 10% of respondents were somewhat/completely unfamiliar with how employees are sharing files internally/externally 25% have not implemented internal policies restric?ng how employees access/share files; 18% in the process of implemen?ng Q13: Have you implemented internal policies restricting how your employees can access and share files internally and externally? No 25% In the process of implementing 18% Yes 57% 7

8 File Sharing Behaviors When asked what employees might do when they need to share a large file, respondents indicated they would: Search online and download a free solu?on (27%) Download applica?on without input from IT (29%) U?lize IT system in place (33%) Use solu?on suggested by customer, contractor or partner (42%) Ask IT for help (51%) 41% indicated damaged brand reputa?on/loss of customer consequence of not sharing a large file quickly 8

9 SMBs Becoming More Distributed SMB employees are increasingly working remotely and from home Q1: What percentage of your organization (including contractors) works remotely? Three years ago One year ago Today 22% 26% 32% Q2: What percentage of your organization (including contractors) regularly works from home at least once per week? Three years ago One year ago Today 20% 24% 28% One year from now 37% One year from now 32% 0% 5% 10% 15% 20% 25% 30% 35% 40% 0% 5% 10% 15% 20% 25% 30% 35% 9

10 Primary File Sharing Tool Two- thirds of respondents indicated was a top most commonly used file sharing/collabora?on solu?on. One year from now, some expect to adopt other op?ons with dropping as a most used solu?on (from 64% to 52%). Q3: What are/were your top two most commonly used solutions for sharing and collaborating around files, both internally and externally? (Today) Other (Please specify) Cloud content management solutions External storage media Third-party cloud-based file-software Enterprise Content Management solutions Shared file server 1% 15% 19% 27% 32% 39% 64% 0% 10% 20% 30% 40% 50% 60% 70% 10

11 Files GePng Larger One in seven (14%) report the average size of file shared by their organiza?on to be more than 1 GB today Only 6% es?mated the average size of file to be more than 1 GB three years ago and five years ago. Less than 1 MB 1 to 3 MB 3 to 10 MB 10 to 20 MB 20 to 50 MB 50 to 100 MB 100 to 350 MB 350 MB to 1 GB More than 1 GB Q5: Estimate the average size of a file shared by your organization: (Today) 5% 8% 11% 12% 10% 11% 14% 14% 14% 0% 2% 4% 6% 8% 10% 12% 14% 16% 11

12 Symantec RecommendaAons Centralize file storage and management with a secure web- based system accessible regardless of device or loca?on Implement a scalable system that can grow with your business Implement access controls and permissions to keep private files private Maintain oversight into how and when business files are shared 12

13 Appendix All ques?ons included 13

14 Demographics 14

15 DEMO2: How many total employees does your organization have worldwide? 5 to 49 25% 50 to 99 25% 100 to % 250 to % 0% 5% 10% 15% 20% 25% 30% 15

16 DEMO3: What is your organization's primary industry? Agriculture and Food Processing Aviation Chemical Products Construction Eating and Drinking Services, Accommodations Education, Learning and Support Energy Finance and Insurance Government Information Technology Legal Living-related and Personal Services and Amusement Services Manufacturing Media Marketing Services Mass Transit and Rail Pharmaceuticals Medical, Health Care and Welfare Public Services Public Works Shipping, Freight, and Postal Services Real Estate and Goods Rental and Leasing Scientific Research, Professional and Technical Services Telecommunications Wholesale and Retail Other 1% 1% 1% 1% 1% 2% 1% 0% 1% 2% 2% 2% 2% 2% 3% 3% 4% 4% 5% 6% 7% 10% 10% 10% 10% 10% 0% 2% 4% 6% 8% 10% 12% 16

17 DEMO4: What is your primary role? 100% 90% 100% 80% 70% 60% 50% 40% 30% 20% 10% 0% Manage our computing resources 17

18 DEMO5: What is your title? Company owner Senior Management 19% 21% Day to day office management 5% Human resources 2% IT Management 37% IT Staff 11% Administrative assistant External consultant/outsourcer/var reseller Other external vendor Other 2% 1% 0% 3% 0% 5% 10% 15% 20% 25% 30% 35% 40% 18

19 DEMO6: What is your age? 50 or older (Boomer) 15% 30 or less (Millennial) 19% 31 to 49 (Gen-X) 66% 19

20 DEMO7: What is your gender? Female 32% Male 68% 20

21 DEMO8: For how many years have you been working in computer systems and technology? Mean Median 21

22 DEMO9: What are your company's annual revenues? Less than $500,000 32% $500,000 to $2 million 11% $2 million to $7.5 million 20% $7.5 million to $30 million 22% $30 million to $100 million 6% $100 million to $500 million 4% $500 million to $1.5 billion $1.5 billion to $5 billion $5 billion to $25 billion $25 billion to $100 billion More than $100 billion 2% 2% 3% 0% 0% 0% 5% 10% 15% 20% 25% 30% 35% 22

23 DEMO10: Characterize your company's year-over-year growth rate in terms of annual revenue: Declining 25% per year or greater Declining between 10 and 24% per year Declining between 1 and 9% per year 3% 4% 4% Flat: Neither growing nor declining 18% Growing between 1 and 9% per year 39% Growing between 10 and 24% per year 20% Growing between 25 and 49% per year Growing between 50 and 99% per year Growing 100% per year or more Decline to state 4% 4% 0% 3% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 23

24 File Sharing Drivers 24

25 Q1: What percentage of your organization (including contractors) works remotely? (Means shown) Three years ago 22% One year ago 26% Today 32% One year from now 37% 0% 5% 10% 15% 20% 25% 30% 35% 40% 25

26 Q1: What percentage of your organization (including contractors) works remotely? (Medians shown) Three years ago 15% One year ago 20% Today 25% One year from now 30% 0% 5% 10% 15% 20% 25% 30% 35% 26

27 Q2: What percentage of your organization (including contractors) regularly works from home at least once per week? (Means shown) Three years ago 20% One year ago 24% Today 28% One year from now 32% 0% 5% 10% 15% 20% 25% 30% 35% 27

28 Q2: What percentage of your organization (including contractors) regularly works from home at least once per week? (Medians shown) Three years ago 10% One year ago 16% Today 22% One year from now 25% 0% 5% 10% 15% 20% 25% 30% 28

29 Q3: What are/were your top two most commonly used solutions for sharing and collaborating around files, both internally and externally? (Three years ago) Other (Please specify) 1% Cloud content management solutions 8% External storage media 23% Third-party cloud-based file-software applications 19% Enterprise Content Management solutions 48% Shared file server 33% 65% 0% 10% 20% 30% 40% 50% 60% 70% 29

30 Q3: What are/were your top two most commonly used solutions for sharing and collaborating around files, both internally and externally? (Today) Other (Please specify) 1% Cloud content management solutions 15% External storage media 19% Third-party cloud-based file-software applications 27% Enterprise Content Management solutions 32% Shared file server 39% 64% 0% 10% 20% 30% 40% 50% 60% 70% 30

31 Q3: What are/were your top two most commonly used solutions for sharing and collaborating around files, both internally and externally? (One year from now) Other (Please specify) 2% Cloud content management solutions 25% External storage media 16% Third-party cloud-based file-software applications 30% Enterprise Content Management solutions 34% Shared file server 37% 52% 0% 10% 20% 30% 40% 50% 60% 31

32 Q4: Rate the importance of providing file sharing and collaboration technology for your organization for the following scenarios: 1 - Extremely unimportant 2 - Somewhat unimportant 3 - Neutral 4 - Somewhat important 5 - Extremely important 100% 90% 80% 37% 27% 28% 24% 25% 19% 70% 60% 50% 31% 35% 32% 35% 34% 34% 40% 30% 20% 27% 30% 30% 31% 29% 33% 10% 0% 4% 6% 7% 8% 8% 10% 2% 3% 4% 2% 3% 4% Between internal teams Project management - internal and external With clients and customers Remote collaboration Large file sharing With third party vendors 32

33 Q4: Rate the importance of providing file sharing and collaboration technology for your organization for the following scenarios: (Somewhat/Extremely important) With third party vendors 53% Large file sharing 59% Remote collaboration 59% With clients and customers 60% Project management - internal and external 61% Between internal teams 67% 0% 10% 20% 30% 40% 50% 60% 70% 80% 33

34 Q5: Estimate the average size of a file shared by your organization: (Today) Less than 1 MB 5% 1 to 3 MB 8% 3 to 10 MB 12% 10 to 20 MB 14% 20 to 50 MB 11% 50 to 100 MB 14% 100 to 350 MB 10% 350 MB to 1 GB 11% More than 1 GB 14% 0% 2% 4% 6% 8% 10% 12% 14% 16% 34

35 Q5: Estimate the average size of a file shared by your organization: (Three years ago) Less than 1 MB 8% 1 to 3 MB 13% 3 to 10 MB 13% 10 to 20 MB 14% 20 to 50 MB 15% 50 to 100 MB 12% 100 to 350 MB 12% 350 MB to 1 GB 8% More than 1 GB 6% 0% 2% 4% 6% 8% 10% 12% 14% 16% 35

36 Q5: Estimate the average size of a file shared by your organization: (Five years ago) Less than 1 MB 19% 1 to 3 MB 15% 3 to 10 MB 12% 10 to 20 MB 10% 20 to 50 MB 12% 50 to 100 MB 10% 100 to 350 MB 9% 350 MB to 1 GB 8% More than 1 GB 6% 0% 2% 4% 6% 8% 10% 12% 14% 16% 18% 20% 36

37 AdopAon Cycles 37

38 Q6: How influential are your employees when it comes to adopting technologies for official internal use in your organization? 1 - Not influential at all 2 - Not that influential 3 - Neutral 4 - Somewhat influential 5 - Extremely influential 100% 90% 27% 24% 24% 21% 80% 70% 60% 50% 37% 40% 36% 33% 40% 30% 32% 20% 28% 29% 31% 10% 0% 10% 7% 6% 7% 2% 1% 2% 5% PC/Laptop/Tablet usage Mobile device usage File sharing Social media/social network usage 38

39 Q6: How influential are your employees when it comes to adopting technologies for official internal use in your organization? (Somewhat/Extremely influential) Social media/social network usage 53% File sharing 61% Mobile device usage 63% PC/Laptop/Tablet usage 64% 0% 10% 20% 30% 40% 50% 60% 70% 39

40 Q7: How important are the following factors in providing employees with applications and devices they use for business purposes? 1 - Extremely unimportant 2 - Somewhat unimportant 3 - Neutral 4 - Somewhat important 5 - Extremely important 100% 90% 80% 40% 43% 36% 32% 34% 34% 33% 25% 70% 60% 50% 40% 34% 29% 36% 38% 36% 35% 36% 39% 30% 20% 10% 0% 20% 21% 22% 24% 23% 23% 25% 5% 5% 5% 4% 5% 5% 4% 6% 2% 2% 1% 2% 1% 3% 2% 2% Productivity Security Ability to complete work responsibilities Employee satisfaction 28% Ease of use Cost savings Control Networking with peers 40

41 Q7: How important are the following factors in providing employees with applications and devices they use for business purposes? (Somewhat/Extremely important) Networking with peers 64% Control 69% Cost savings 69% Ease of use 70% Employee satisfaction 71% Ability to complete work responsibilities 72% Security 72% Productivity 74% 0% 10% 20% 30% 40% 50% 60% 70% 80% 41

42 Q8: How important are the following features to your employees when it comes to accessing and sharing files? 1 - Extremely unimportant 2 - Somewhat unimportant 3 - Neutral 4 - Somewhat important 5 - Extremely important 100% 90% 80% 70% 60% 37% 34% 34% 30% 50% 40% 37% 37% 37% 38% 30% 20% 10% 0% 21% 23% 23% 1% 4% 5% 1% 4% 1% 5% 1% Ability to share large files Ability to access files across desktops, laptops and mobile devices, including personal devices Ability to upload and update files in shared workspaces 26% File collaboration 42

43 Q8: How important are the following features to your employees when it comes to accessing and sharing files? (Somewhat/Extremely important) File collaboration 68% Ability to upload and update files in shared workspaces 71% Ability to share large files 71% Ability to access files across desktops, laptops and mobile devices, including personal devices 74% 0% 10% 20% 30% 40% 50% 60% 70% 80% 43

44 Q9: What percentage of your employees do you estimate use personal devices for work or work devices for personal purposes? 40% 39% 38% 37% 39% 39% 36% 35% 34% 33% 32% 33% 34% Personal Work 31% 30% 29% Mean Median 44

45 Perceived Problems/Challenges/Risks 45

46 Q10: How familiar are you with how your employees share files internally and externally? Extremely familiar 25% Somewhat familiar 40% Neutral 25% Somewhat unfamiliar 7% Completely unfamiliar 3% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 46

47 Q11: How much of a challenge are the following factors when considering file access and sharing for your organization? 1 - Extremely small challenge 2 - Somewhat small challenge 3 - Neutral 4 - Somewhat large challenge 5 - Extremely large challenge 100% 90% 12% 14% 12% 10% 9% 10% 8% 80% 70% 34% 31% 31% 29% 29% 26% 27% 60% 50% 40% 30% 37% 38% 37% 41% 35% 45% 42% 20% 10% 0% 13% 13% 15% 14% 17% 5% 5% 5% 6% 10% Need to secure multiple endpoints Increasingly complicated security threats Increased mobility of employees, partners, and contractors More communication externally File sizes increasing 13% 16% 6% 7% Use of personal devices for work and vice versa Organization becoming more distributed 47

48 Q11: How much of a challenge are the following factors when considering file access and sharing for your organization? (Somewhat/Extremely large challenge) Organization becoming more distributed 35% Use of personal devices for work and vice versa 36% File sizes increasing 38% More communication externally 39% Increased mobility of employees, partners, and contractors 43% Increasingly complicated security threats 45% Need to secure multiple endpoints 46% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 48

49 Q12: How would you rate the following IT security risks with regards to file sharing solutions? 1 - Extremely low risk 2 - Somewhat low risk 3 - Neutral 4 - Somewhat high risk 5 - Extremely high risk 100% 90% 14% 10% 12% 14% 14% 10% 80% 70% 29% 34% 31% 27% 24% 24% 60% 50% 40% 34% 35% 36% 40% 40% 42% 30% 20% 10% 0% 15% 15% 16% 14% 16% 16% 7% 7% 6% 6% 7% 9% Employees sharing confidential information using unapproved solutions Malware Loss of confidential or Breach of confidential proprietary information information Embarrassment or damage to brand/ reputation Violating regulatory rules 49

50 Q12: How would you rate the following IT security risks with regards to file sharing solutions? Violating regulatory rules 34% Embarrassment or damage to brand/reputation 37% Breach of confidential information 41% Loss of confidential or proprietary information 43% Malware 44% Employees sharing confidential information using unapproved solutions 44% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% 50

51 Outcomes 51

52 Q13: Have you implemented internal policies restricting how your employees can access and share files internally and externally? In the process of implementing 18% No 25% Yes 57% 52

53 Q14: Consider the following scenario: One of your employees needs to send a large file to a customer, contractor, or partner (too large for ). Which of the following might your employees do? Don't know 5% Employee searches for and downloads a free file sharing solution 27% Employee downloads application without input from IT 29% Employee utilizes IT system in place 33% Employee uses solution suggested by customer, contractor or partner 42% Employee asks IT for help 51% 0% 10% 20% 30% 40% 50% 60% 53

54 Q15: Consider the following scenario: A customer or partner needs a large file quickly. An employee is not able to meet the deadline due to limitations on the organization's file solutions. What are the potential consequences to your organization? Litigation costs 14% Involvement in data collection process for legal action Reduced stock price Regulatory fines 17% 17% 18% Costs to comply with regulations after a data loss or exposure incident Loss of organization, customer or employee data 22% 24% Direct financial cost 31% Lost revenue 37% Damaged brand reputation/loss of customer trust 41% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 54

State of Security Survey GLOBAL FINDINGS

State of Security Survey GLOBAL FINDINGS 2011 State of Security Survey GLOBAL FINDINGS CONTENTS Introduction... 4 Methodology... 6 Finding 1: Cybersecurity is important to business... 8 Finding 2: The drivers of security are changing... 10 Finding

More information

The Future of Network Security Sophos 2012 Network Security Survey

The Future of Network Security Sophos 2012 Network Security Survey The Future of Network Security Sophos 2012 Network Security Survey Sophos and Vanson Bourne surveyed 571 IT decision makers globally to gain a deeper understanding of how IT teams are responding to technology

More information

The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T

The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T The Cost of Insecure Mobile Devices in the Workplace! Sponsored by AT&T Independently conducted by Ponemon Institute LLC Publication Date: March 2014 Part 1. Introduction The Cost of Insecure Mobile Devices

More information

Data loss prevention and endpoint security. Survey findings

Data loss prevention and endpoint security. Survey findings Data loss prevention and endpoint security Survey findings Table of Contents Overview 3 Executive summary 4 Half of companies have lost confidential information through removable media 5 Intellectual property

More information

Data Security in Development & Testing

Data Security in Development & Testing Data Security in Development & Testing Sponsored by Micro Focus Independently conducted by Ponemon Institute LLC Publication Date: July 31, 2009 Ponemon Institute Research Report Data Security in Development

More information

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution

Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Is Your Company Ready for a Big Data Breach? Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: April 2013 Ponemon Institute Research Report

More information

BYOD & MOBILE SECURITY

BYOD & MOBILE SECURITY 2013 surve y results BYOD & MOBILE SECURITY Group Partner Information Security Sponsored by Symantec KPMG Zimbani MailGuard INTRODUCTION Welcome to the 2013 BYOD & Mobile Security Report! Bring Your Own

More information

State of SMB Cyber Security Readiness: UK Study

State of SMB Cyber Security Readiness: UK Study State of SMB Cyber Security Readiness: UK Study Sponsored by Faronics Independently conducted by Ponemon Institute LLC Publication Date: November 2012 Ponemon Institute Research Report Part 1. Introduction

More information

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary

More information

Aftermath of a Data Breach Study

Aftermath of a Data Breach Study Aftermath of a Data Breach Study Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: January 2012 Ponemon Institute Research Report Aftermath

More information

Webinar and Marketing Technology Purchase Decision Analysis Prepared for ON24

Webinar and Marketing Technology Purchase Decision Analysis Prepared for ON24 Webinar and Marketing Technology Purchase Decision Analysis Prepared for ON24 December 2015 www.hanoverresearch.com Table of Contents Introduction and Methodology.. P 3 Executive Summary and Key Findings..

More information

Building a Business Case:

Building a Business Case: Building a Business Case: Cloud-Based Security for Small and Medium-Size Businesses table of contents + Key Business Drivers... 3... 4... 6 A TechTarget White Paper brought to you by Investing in IT security

More information

Understanding Security Complexity in 21 st Century IT Environments:

Understanding Security Complexity in 21 st Century IT Environments: Understanding Security Complexity in 21 st Century IT Environments: A study of IT practitioners in the US, UK, France, Japan & Germany Sponsored by Check Point Software Technologies Independently conducted

More information

Pu?ng B2B Research to the Legal Test

Pu?ng B2B Research to the Legal Test With the global leader in sampling and data services Pu?ng B2B Research to the Legal Test Ashlin Quirk, SSI General Counsel 2014 Survey Sampling Interna6onal 1 2014 Survey Sampling Interna6onal Se?ng the

More information

How To Get A Cloud Service For A Small Business

How To Get A Cloud Service For A Small Business Transforming SMB Security Stephen Banbury VP, Global SMB Channel & Alliances Compelling Trends for Change Symantec as a Leader in Security Winning Together 2 NOT SO LONG AGO SMB Attitudes Towards Business

More information

BIG SHIFT TO CLOUD-BASED SECURITY

BIG SHIFT TO CLOUD-BASED SECURITY GUIDE THE BIG SHIFT TO CLOUD-BASED SECURITY How mid-sized and smaller organizations can manage their IT risks and meet regulatory compliance with minimal staff and budget. CONTINUOUS SECURITY TABLE OF

More information

Don't Be The Next Data Loss Story

Don't Be The Next Data Loss Story Don't Be The Next Data Loss Story Data Breaches Don t Discriminate DuPont scientist downloaded 22,000 sensitive documents as he got ready to take a job with a competitor Royal London Mutual Insurance Society

More information

Leveraging the Cloud for Your Business

Leveraging the Cloud for Your Business Leveraging the Cloud for Your Business by CornerStone Telephone Company 2 Third Street Troy, NY 12180 As consumers, we enjoy the benefits of cloud services from companies like Amazon, Google, Apple and

More information

Cybersecurity. Are you prepared?

Cybersecurity. Are you prepared? Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data

More information

On-premises Managed Services Study. Final Report Prepared for Dimension Data. Nov. 7, 2014 TBR T EC H N O LO G Y B U S I N ES S R ES EAR C H, I N C.

On-premises Managed Services Study. Final Report Prepared for Dimension Data. Nov. 7, 2014 TBR T EC H N O LO G Y B U S I N ES S R ES EAR C H, I N C. On-premises Managed Services Study Final Report Prepared for Dimension Data Nov. 7, 2014 T EC H N O LO G Y B U S I N ES S R ES EAR C H, I N C. Key Survey Findings 2 Premium Level Base-Level Key Survey

More information

How To Back Up A Virtual Machine

How To Back Up A Virtual Machine 2010 Symantec Disaster Recovery Study Global Results Methodology Applied Research performed survey 1,700 enterprises worldwide 5,000 employees or more Cross-industry 2 Key Findings Virtualization and Cloud

More information

How To Protect Your Organization From Insider Threats

How To Protect Your Organization From Insider Threats Research Conducted by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security FINANCIAL SERVICES EDITION #2015InsiderThreat RESEARCH BRIEF US FINANCIAL SERVICES SPOTLIGHT ABOUT

More information

in Switzerland. 1 The total values reported in the tables and

in Switzerland. 1 The total values reported in the tables and 1 in Switzerland. Recruiting is increasingly social and Adecco wants to know how it evolves. An international survey, that involved over 17.000 candidates and 1.502 Human Resources managers between March

More information

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become

More information

How To Get A New Computer For Your Business

How To Get A New Computer For Your Business Selling Security to SMBs with 4 th gen Intel Core Processors 1 After this Sales Training, You Will Learn: Where new opportunities lie in the small and medium business market segment Why IT security is

More information

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device) MOBILE SECURITY Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device) JULY 2014 INTRODUCTION BYOD SECURITY 2014 It s no surprise that there are many articles and papers on

More information

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: +1.877.896.3611 Web: www.infrascale.

Whitepaper. How MSPs are Increasing Revenues by Solving BYOD Issues. nfrascaletm. Infrascale Phone: +1.877.896.3611 Web: www.infrascale. Whitepaper How MSPs are Increasing Revenues by Solving BYOD Issues nfrascaletm Solving the BYOD Problem with Endpoint Data Management and Protection The prolific use of Bring Your Own Device (BYOD) in

More information

The Unintentional Insider Risk in United States and German Organizations

The Unintentional Insider Risk in United States and German Organizations The Unintentional Insider Risk in United States and German Organizations Sponsored by Raytheon Websense Independently conducted by Ponemon Institute LLC Publication Date: July 2015 2 Part 1. Introduction

More information

How To Protect Your Endpoints From Attack

How To Protect Your Endpoints From Attack 2012 Endpoint Security Best Practices Survey GLOBAL RESULTS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Top tier organizations fare better against attacks... 8 Finding 2: Top tier organizations

More information

Achieving Security in Workplace File Sharing. Sponsored by Axway Independently conducted by Ponemon Institute LLC Publication Date: January 2014

Achieving Security in Workplace File Sharing. Sponsored by Axway Independently conducted by Ponemon Institute LLC Publication Date: January 2014 Achieving Security in Workplace File Sharing Sponsored by Axway Independently conducted by Ponemon Institute LLC Publication Date: January 2014 Ponemon Institute Research Report Part 1. Introduction Achieving

More information

2011 NATIONAL SMALL BUSINESS STUDY

2011 NATIONAL SMALL BUSINESS STUDY 2011 NATIONAL SMALL BUSINESS STUDY The National Cyber Security Alliance has conducted a new study with Symantec to analyze cyber security practices, behaviors and perceptions of small businesses throughout

More information

2012 Endpoint Security Best Practices Survey

2012 Endpoint Security Best Practices Survey WHITE PAPER: 2012 ENDPOINT SECURITY BEST PRACTICES SURVEY........................................ 2012 Endpoint Security Best Practices Survey Who should read this paper Small and medium business owners

More information

How-To Guide: Cyber Security. Content Provided by

How-To Guide: Cyber Security. Content Provided by How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses

More information

ICT budget and staffing trends in the UK

ICT budget and staffing trends in the UK ICT budget and staffing trends in the UK Enterprise ICT investment plans to 2013 January 2013 TABLE OF CONTENTS 1 Trends in ICT budgets... 1 1.1 Introduction... 1 1.2 Survey demographics... 1 1.3 IT budget

More information

Protect Your Universe with ArcSight

Protect Your Universe with ArcSight Protect Your Universe with ArcSight The ArcSight SIEM Platform: Prevent Data Theft Enforce Compliance Defeat Cybercrime Before ArcSight, it was difficult to know in realtime what was happening from an

More information

Small and Midsize Business Protection Guide

Small and Midsize Business Protection Guide P r o t e c t i o n G u i d e : C l o s e t h e P r o t e c t i o n G a p Small and Midsize Business Protection Guide Close the protection gap and safeguard your business future Confidence in a connected

More information

Fig. 2 - Active Company Presence on Social Media by Industry. % Value. Netherlands, 2014. 89,888,1 88,1 76,7 68,2 69,3 57,4 26,1 0,6 0,6 0 0,6 0,6

Fig. 2 - Active Company Presence on Social Media by Industry. % Value. Netherlands, 2014. 89,888,1 88,1 76,7 68,2 69,3 57,4 26,1 0,6 0,6 0 0,6 0,6 1 in Netherlands. Recruiting is increasingly social and Adecco wants to know how it evolves. An international survey, that involved over 17.000 candidates and 1.502 Human Resources managers between March

More information

Protecting personally identifiable information: What data is at risk and what you can do about it

Protecting personally identifiable information: What data is at risk and what you can do about it Protecting personally identifiable information: What data is at risk and what you can do about it Virtually every organization acquires, uses and stores personally identifiable information (PII). Most

More information

Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age

Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age Managing Cyber Security as a Business Risk: Cyber Insurance in the Digital Age Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: August 2013

More information

Building your cloud porbolio APS Connect

Building your cloud porbolio APS Connect Building your cloud porbolio APS Connect 5 th November 2014 Duncan Robinson, Parallels Business Consul3ng Introduc/on to BCS Who are we? Created 3 years ago in response to partner demand Define the strategy

More information

1.877.896.3611 www.infrascale.com

1.877.896.3611 www.infrascale.com White Paper Making the Upgrade: From Backup Vendor to Data Protection Platform nfrascaletm Simplify Your Business and Offer Customers Complete Data Protection Your customers are ready to explore data protection

More information

EXECUTIVE BRIEF SPON. File Synchronization and Sharing Market Forecast, 2012-2017. Published May 2013. An Osterman Research Executive Brief

EXECUTIVE BRIEF SPON. File Synchronization and Sharing Market Forecast, 2012-2017. Published May 2013. An Osterman Research Executive Brief EXECUTIVE BRIEF N Sharing Market Forecast, sponsored by An Osterman Research Executive Brief Published May 2013 SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058

More information

Exercising Your Enterprise Cyber Response Crisis Management Capabilities

Exercising Your Enterprise Cyber Response Crisis Management Capabilities Exercising Your Enterprise Cyber Response Crisis Management Capabilities Ray Abide, PricewaterhouseCoopers, LLP 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.

More information

Is Your Company Ready for a Big Data Breach?

Is Your Company Ready for a Big Data Breach? Is Your Company Ready for a Big Data Breach? The Second Annual Study on Data Breach Preparedness Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication

More information

OCIE Technology Controls Program

OCIE Technology Controls Program OCIE Technology Controls Program Cybersecurity Update Chris Hetner Cybersecurity Lead, OCIE/TCP 212-336-5546 Introduction (Role, Disclaimer, Background and Speech Topics) SEC Cybersecurity Program Overview

More information

Methods and Practices: Cloud in Retail

Methods and Practices: Cloud in Retail Methods and Practices: Cloud in Retail IDC Retail Insights: Retail IT Infrastructure Strategies METHODS AND PRACTICES #RI243398 Kimberly Knickle Leslie Hand Global Headquarters: 5 Speen Street Framingham,

More information

Perceptions About Network Security Survey of IT & IT security practitioners in the U.S.

Perceptions About Network Security Survey of IT & IT security practitioners in the U.S. Perceptions About Network Security Survey of IT & IT security practitioners in the U.S. Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: June 2011 Ponemon

More information

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP [email protected] HP ENTERPRISE SECURITY SERVICES

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP EVA.KUIPER@HP.COM HP ENTERPRISE SECURITY SERVICES Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP [email protected] HP ENTERPRISE SECURITY SERVICES Agenda Importance of Common Cloud Standards Outline current work undertaken Define

More information

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions SURVEY REPORT: cyber security Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions Confidence in a connected world. Executive summary An online survey revealed that while U.S.

More information

Payment Card Industry Data Security Standards

Payment Card Industry Data Security Standards Payment Card Industry Data Security Standards Discussion Objectives Agenda Introduction PCI Overview and History The Protiviti Difference Questions and Discussion 2 2014 Protiviti Inc. CONFIDENTIAL: This

More information

Managing SSL Certificates with Ease

Managing SSL Certificates with Ease WHITE PAPER: MANAGING SSL CERTIFICATES WITH EASE White Paper Managing SSL Certificates with Ease Best Practices for Maintaining the Security of Sensitive Enterprise Transactions Managing SSL Certificates

More information

Two-Factor Authentication

Two-Factor Authentication WHITE PAPER: TWO-FACTOR AUTHENTICATION: A TCO VIEWPOINT........................................ Two-Factor Authentication Who should read this paper This whitepaper is directed at IT, Security, and Compliance

More information

Migrating to Hosted Telephony. Your ultimate guide to migrating from on premise to hosted telephony. www.ucandc.com

Migrating to Hosted Telephony. Your ultimate guide to migrating from on premise to hosted telephony. www.ucandc.com Migrating to Hosted Telephony Your ultimate guide to migrating from on premise to hosted telephony Intro What is covered in this guide? A professional and reliable business telephone system is a central

More information

Service Provider Licensing Program

Service Provider Licensing Program Service Provider Licensing Program ABOUT THE SERVICE PROVIDER LICENSING PROGRAM The Service Provider License Agreement (SPLA) under the Service Provider Licensing Program enables an organization to license

More information

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,

More information

Legacy Archiving How many lights do you leave on? September 14 th, 2015

Legacy Archiving How many lights do you leave on? September 14 th, 2015 Legacy Archiving How many lights do you leave on? September 14 th, 2015 1 Introductions Wendy Laposata, Himforma(cs Tom Chase, Cone Health 2 About Cone Health More than 100 loca=ons 6 hospitals, 3 ambulatory

More information

The Security Impact of Mobile Device Use by Employees

The Security Impact of Mobile Device Use by Employees The Security Impact of Mobile Device Use by Employees Sponsored by Accellion Independently conducted by Ponemon Institute LLC Publication Date: December 2014 Ponemon Institute Research Report The Security

More information

NETWORK SECURITY FOR SMALL AND MID-SIZE BUSINESSES

NETWORK SECURITY FOR SMALL AND MID-SIZE BUSINESSES NETWORK SECURITY FOR SMALL AND MID-SIZE BUSINESSES September, 2015 Derek E. Brink, CISSP, Vice President and Research Fellow IT Security and IT GRC Report Highlights p2 p4 p6 p7 SMBs need to adopt a strategy

More information

Security and Privacy Considerations for BYOD

Security and Privacy Considerations for BYOD Security and Privacy Considerations for BYOD Carol Woodbury, President SkyView Partners, Inc 1 Introduction The world of BYOD (Bring Your Own Device) is rapidly expanding. You may not think it s happening

More information

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond

Trend Micro Cloud App Security for Office 365. October 27, 2015 Trevor Richmond Trend Micro Cloud App Security for Office 365 October 27, 2015 Trevor Richmond Too many malware incidents >90% Targeted Attacks Start with Email Attackers: Target specific companies or individuals Research

More information

2015 Global Study on IT Security Spending & Investments

2015 Global Study on IT Security Spending & Investments 2015 Study on IT Security Spending & Investments Independently conducted by Ponemon Institute LLC Publication Date: May 2015 Sponsored by Part 1. Introduction Security risks are pervasive and becoming

More information

A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS

A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS Every day McCann Security helps business decision-makers and stakeholders solve cybersecurity issues and protect their critical data and

More information

2012 NCSA / Symantec. National Small Business Study

2012 NCSA / Symantec. National Small Business Study 2012 NCSA / Symantec National Small Business Study National Cyber Security Alliance Symantec JZ Analytics October 2012 Methodology and Sample Characteristics JZ Analytics was commissioned by the National

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R T h e B e n e f i t s o f C l o u d - B a s e d B a c k u p : A d d r e s s i

More information

10 Smart Ideas for. Keeping Data Safe. From Hackers

10 Smart Ideas for. Keeping Data Safe. From Hackers 0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000

More information

For additional information and evaluation copies of Trend Micro products and services, visit our website at www.trendmicro.com.

For additional information and evaluation copies of Trend Micro products and services, visit our website at www.trendmicro.com. TM TREND MICRO, Incorporated is a pioneer in secure content and threat management. Founded in 1988, provides individuals and organizations of all sizes with award-winning security software, hardware, and

More information

Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices

Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices A Forrester Consulting Thought Leadership Paper Commissioned By Xively By LogMeIn August 2015 Connect and Protect: The Importance Of Security And Identity Access Management For Connected Devices Table

More information

Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses

Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses Cybersecurity Practices of Ohio Investment Advisers; A Summary of Survey Responses October 2014 A Pilot Survey to Compile Cybersecurity Information In July 2014, the Ohio Division of Securities participated

More information