Trend Micro Consumerization

Size: px
Start display at page:

Download "Trend Micro Consumerization"

Transcription

1 Trend Micro Consumerization Research Findings Free range devices: The cause and effect of consumerization in the workplace A Trend Micro Executive Summary January 2012

2 Executive Summary Mobile device use in the workplace has experienced explosive growth over recent years. Whether it s smartphones, laptops or tablets, wireless network-connected devices have changed the way we access, generate and share corporate information. In parallel to this, consumer mobile computing technology has become more advanced and accessible. This in turn has led to the emergence of a phenomenon commonly known as consumerization; the trend towards consumer technology moving from the home into the enterprise. This global research project involving 2,245 office workers from across Europe aims to identify what is driving this consumerization of workplace technology, what its impact is, and who is responsible for ensuring employees, devices and data remain secure. These times of rapid technological change within organisations are putting immense pressure on technology professionals to manage and retain control of the data entering and leaving their organisations. Businesses that can accomplish this while continuing to realise the benefits that consumerization can bring will be best positioned for success. This report explores in more depth what the root of these challenges is and what organisations can do to overcome them. Key Findings The research identifies a series of key trends and challenges related to consumerization impacting on the enterprise: While employers are perceived to expect a rise in productivity as the primary advantage of consumerization (48%), employees value the capability to work remotely (55%), convenience (47%) and the ability to combine work and personal device use () Mobile devices that have the potential to put company data at risk are rife in the workplace (70%), however security policies and procedures have yet to catch up where policies are in place, they are often ignored by staff (25%) Data security on personal devices a major corporate risk is being dealt with on a maintenance level, rather than a strategic level (70%) The security risks of some applications are currently underestimated, while others are overestimated Belgium Denmark 4% 3% UK 22% Respondent breakdown: Methodology France 22% Sweden 4% Norway 2% Netherlands 4% The research was conducted via an online survey of 2,245 respondents (UK: 500, Denmark: 70, Belgium: 100, Sweden: 80, Norway: 50, Ireland: 45, Netherlands: 100, Italy: 300, France: 500, Germany: 500). All respondents were office workers in companies of 500 or more. The sample was 50% male / 50% female. The survey Germany 22% Ireland 2% Italy 13% was conducted in October 2011 and managed by Loudhouse, an independent research consultancy based in London. 1 Executive Summary The cause and effect of consumerization in the workplace

3 Personal devices in the workplace: here to stay With nearly half of those questioned (47%) stating that their employer allows staff to use personal devices for work, it is clear that consumerization in the workplace has truly arrived. However this shift in technology use within the workplace is largely happening outside of IT departments roadmaps, with 39% of respondents agreeing that the growth of employees using their personal devices for work related activities is rapid and unplanned. Of those taking their personal devices into the workplace, laptops (76%), mobiles (non-smartphone) (61%) and smartphones (57%) are the most commonly used devices, followed by netbooks (32%) and tablets (). The trend towards these personal devices that can store and transport data are common across all markets. When asked about the perceived benefits of giving employees the freedom to bring their own devices into the workplace (fig 1), an increase in productivity (48%) and IT department capital cost savings () came out on top. While these perceived benefits are consistent across all markets, there are slight regional variations, with Ireland and Norway leaning towards productivity being the primary benefit (68% and 57% respectively) and Italy and Germany (49% and 50%) citing cost savings as the main advantage. This is compared to just 18% of those questioned claiming there are perceived benefits in terms of retention of younger generation employees, and 23% perceiving benefits due to enhanced social media enablement. Both much-hyped potential benefits to organisations embracing consumerization that appear to not be playing out in reality. In fact contrary to popular belief that organisations are rolling out bring your own device policies with a view to hiring and retaining the cream of Generation Y s talent, it seems those decisions are currently being made on a much more cost-centric basis; making current staff more productive and cutting departmental expenditure. The data shows a very clear void between the motivations of employers and employees in pursuing the consumerization of their workplace. Whereas employers perceive benefits of workplace consumerization to be an increase in productivity (in terms of reducing distractions from office tasks), the employees themselves gravitate towards the practicalities of bringing their own devices into the workplace. Flexibility in work location (55%), convenience (47%) and the ability to use the same device at home and in the office () are cited as the primary perceived benefits. Of all those surveyed, data loss, security, privacy and blurring of boundaries between work and personal lives are the most feared, with 22% of those questioned believing that an ever-growing amount of their organisation s intellectual property is lost on smartphones (fig2). 59% of respondents perceived the risk of loss or theft of corporate data to be their primary concern, followed by personal privacy issues () and the mingling of personal and corporate data (38%). Interestingly, only 14% 2 Executive Summary The cause and effect of consumerization in the workplace

4 of those surveyed claim to have no concerns about the use of personal devices in the workplace - a figure that is constant across all markets, bar the Netherlands where it rises to 36%. Fig 1: The perceived benefits of consumerization Fig 2: The biggest concerns surrounding consumerization: Productivity enablement 48% Risk of data loss/theft 59% Business IT capital cost savings Using personal devices will create security issues Employees privacy on personal devices 57% Executives want it 31% Mingling of personal data and corporate data 38% Workplace trend 27% Employees don t understand security and privacy risks 37% Social collaboration enablement Retention of younger generation of employees Fashion Other 2% 9% 18% 23% Compliance / legal implications The company will have difficulty in managing multiple devices, operating systems, network providers, etc. Lack of device and application standardization people using different devices and programs Level of access and connectivity allowed for personal devices some employees having less access than others Employees don t have enough knowledge about mobile devices 16% 35% 27% 23% No opinion 12% Other I have no concerns 1% 14% Q6. Why, in your opinion, does your company allow employees to use their personal devices(s) for work-related activities? Base: All (1060), Denmark (33)*, Belgium (43)*, Sweden (28)*, Norway (21)*, Ireland (19)*, Netherlands (67), Italy (178), France (261), Germany (179), UK (231) Q19. What are your concerns, if any, about employees using their personal devices for work purposes? Base: All (2245), Denmark (70), Belgium (100), Sweden (80), Norway (50), Ireland (45)*, Netherlands (100), Italy (300), France (500), Germany (500), UK (500) Un-checked access to corporate networks is rife One of the biggest challenges facing those responsible for IT within the enterprise is managing what data is entering or leaving their organisation. With 70% of those surveyed reporting that their organisation allows employees to access company networks via personal devices, that is no mean feat. In companies that allow personal device use, on average 29% of devices accessing corporate resources are employee-owned, a large pool of personal devices for which there often is not adequate policy supervision or practical support. Employees themselves are aware of the risks, with 63% stating that they trust company-owned devices more than personal devices. This trust in company devices is likely to come from more stable operating systems and/or the better support and continuity that comes from large numbers of employees having the same device. The perception of risk around employee-owned devices is a concern, especially when the high degree of access these devices have to corporate information is considered. Clearly, employees perceive a potential problem. Despite widespread concern about the use of personal devices in the workplace, organisations are still allowing access to a range of information on the network via non-corporate devices (fig 3). While a majority of organisations will allow access to (83%), contact information (64%), calendars (63%) and intranets (54%), some are enabling un-regulated access to very sensitive company data, even financial information (11%) and corporate strategy and planning documents (11%). In fact, 68% of 3 Executive Summary The cause and effect of consumerization in the workplace

5 respondents believe that any information stored on a corporate device is vulnerable. Overall, the perception of risk is not the problem employees know that information on both personal and work devices is vulnerable, but lack support in limiting that risk. Awareness of what can be done to avoid security risks is low (fig 4). While file and folder encryption (44%) and network access controls (43%) scored higher on awareness than most, familiarity with most security tools is generally limited. When asked what security techniques their organisation has in place to protect company-owned devices, basic security software is by far the most common strategy named (60%), followed by the ability to lock-down devices remotely () and remote monitoring (28%). One quarter (24%) of those questioned do not know what security measures their employer has in place to protect corporate mobile devices. When questioned about what measures are in place to protect personal devices in the workplace, the number of respondents unaware of the security measures in place rose to. Employees and companies are not translating their general understandings of risk into concrete measures to manage that risk. Without long-term strategic policy to guide them, or the appropriate staff to assist them, employees are taking unnecessary risks with corporate data and networks, even when they can see the potential for problems. Fig 3: What data is being accessed Fig 4: Familiarity with security tools 83% File and Folder Encryption 44% Contacts 64% (Wireless) Network Access Control 43% Calendars 63% Mobile Security 38% Intranet Web Databases Custom applications Customer Relationship Management (CRM) Financial data Corporate strategies/planning 11% 11% 17% 32% 54% Mobile Device Management Data Loss Prevention (DLP) Virtual Desktop Intrastructure Communication and Collaboration Security (Mobile) Application Control Server Virtualization Whole Disk Encryption 36% 36% 36% 31% Other 1% PC Life Cycle Management (PCLCM) 29% Don t know 6% Virtualisation Security 26% Q9. What corporate applications or databases can employees access from their personal devices? Base: All (1060), Denmark (33)*, Belgium (43)*, Sweden (28)*, Norway (21)*, Ireland (19)*, Netherlands (67), Italy (178), France (261), Germany (179), UK (231) Q1. How familiar are you with the following technologies? Base: All (2245), Denmark (70), Belgium (100), Sweden (80), Norway (50), Ireland (45)*, Netherlands (100), Italy (300), France (500), Germany (500), UK (500) Where does responsibility for mobile devices at work lay? There appears to be a significant level of ambiguity when it comes to who is responsible for managing the security of personal mobile devices in use at work. When questioned about who is responsible for the management of corporate devices that are able to access corporate networks within their 4 Executive Summary The cause and effect of consumerization in the workplace

6 organisation, respondents generally believe it is the IT help desk (43%). Due to its stringent data security standards, Germany is the one big exception to this rule with nearly one third (28%) of respondents claiming their organisation has a dedicated mobile security team to handle such challenges. 42% agree or strongly agree with the statement IT needs to enable/empower employees in using their devices. Worryingly however, 70% of those questioned state that their employer does not offer IT support to cover personal devices in use in their organisation, leaving these businesses open to serious and un-checked risk (fig 5). Interestingly however, one third (32%) of participants believe their company shouldn t offer security support to employee-owned mobile devices. 41% of respondents believe the IT department s role is shifting from a commander/controller to an advisor in support of employees bringing their own devices to work. This suggests that the IT department is beginning to evolve as consumerization is becoming more prevalent within organisations. Fig 5: Help desk support for personal devices Yes, we offer full support Yes, but we only offer limited support No, we do not offer any support All 35% 35% Italy 44% 29% 28% Germany 34% 31% 35% Norway Belgium 28% 23% 49% Denmark 27% 42% Ireland 26% 53% 21% Netherlands 25% 34% UK 25% 44% 31% France 25% 34% 42% Sweden 7% 25% 68% Q4. To the best of your knowledge, does your company offer IT support to employees who use their personal devices in the workplace? Base: All (1060), Denmark (33)*, Belgium (43)*, Sweden (28)*, Norway (21)*, Ireland (19)*, Netherlands (67), Italy (178), France (261), Germany (179), UK (231) Are security policy and compliance working? Surprisingly, 28% of companies have no policies for personal devices at work currently in place or in their planned security roadmap. Even in organisations that do offer help-desk support to cover personal as well as corporate devices, personal device policy is patchy and often doesn t cover the 5 Executive Summary The cause and effect of consumerization in the workplace

7 full range of devices and locations. Just 54% have policies in place to cover personal devices accessing corporate networks from home and 53% cover personal devices being brought into the office, leaving serious holes in corporate security. (fig 6) Looking beyond device use to broader security policies (fig 7), collaboration and social network tools (52%) are regulated at a similar level to mobile devices (49%). Companies are therefore spending as much energy on efforts to reduce the distraction from apps and tools as they are on devices that have the potential to compromise company security. Giving equal focus to areas that pose disproportionate risks suggests a lack of clear thinking about where a genuine threat resides. A further concern with regards to the parity of focus between social and mobile is the level of access allowed to financial data (32%) and corporate documents (70%) ( whilst only 20% allow access to social networks). Not only is there greater risk from mobile access (due to the possibility of misuse), it is also a more likely route to sensitive company data (which is rarely posted to relatively public social networks.) For social network usage policies, the global figure (52%) falls to just 39% in Germany and rises to 68% in the UK, indicative of the stark cultural differences in the sharing of information and the perceived risks of doing so. Of those businesses that do have personal device policies in place, 25% of those questioned believe that employees within their organisations do not adhere to that policy. Fig 6: Device policies in place Policies for using employee's own laptop/notebook remotely (e.g. at home) 54% Policies for using employee's own laptop/notebook in the office 53% Policies for using employee's own Smartphone in the office 49% Policies for using employee's own tablet computer remotely (e.g. at home) Policies for using employee's own tablet computer in the office 38% Other 19% Q17. Which of the following policies related to use of employees personal devices does your company currently have? Which are you actively considering? Base: All (2245), Denmark (70), Belgium (100), Sweden (80), Norway (50), Ireland (45)*, Netherlands (100), Italy (300), France (500), Germany (500), UK (500) 6 Executive Summary The cause and effect of consumerization in the workplace

8 Fig 7: What existing policies cover We have policies about usage of Internal collaboration and social networking tools 52% We apply the same policy for using company-owned devices in the office vs. remotely (e.g. at home) 49% We have policies about usage of external collaboration and social networking tools (e.g. Facebook and LinkedIn) 49% We enforce mobile device policy when the device is not used for work-related activities 43% We apply the same policy for using employee's personal devices in the office vs. remotely (e.g. at home) Our employees use private communication channels and social networks to interact on work-related topics Q18. For each of the following statements, please state whether this is true or false at your organisation. Base: All (2245), Denmark (70), Belgium (100), Sweden (80), Norway (50), Ireland (45)*, Netherlands (100), Italy (300), France (500), Germany (500), UK (500) Conclusions It is clear there is a high degree of ambiguity when it comes to what is permitted within organisations, resulting in patchy mobile device policies, lack of adherence, and misplaced priorities. Not only is there a high degree of demand for employers to facilitate the use of personal devices in the workplace, it is already happening whether the organisation has put provisions for it in place or not. While this organic trend towards consumerization of the workplace is having some perceived benefits, the fact it has occurred so rapidly, unmonitored and without adequate security procedures in place means organisations are currently leaving themselves open to a severe degree of risk. This is especially the case in organisations where policy on personal device use is set at the help-desk level, where staff are generally focused on maintenance rather than strategic planning. With these findings in mind, it is recommended that in order to effectively manage the inevitable rise of consumerization within their organisation, those responsible for managing IT must adopt a threepronged approach to security; know the risks, work proactively and think strategically. Only when the risks are known can they be effectively managed. IT departments must take the reins here, counting and monitoring personal devices, particularly riskier ones, in use in the workplace or accessing corporate networks remotely. Emphasis must be placed on creating and implementing policies covering applications that create risk rather than those that are mere distractions. With mobile device use common throughout all business departments, organisation-wide buy-in is required 7 Executive Summary The cause and effect of consumerization in the workplace

9 to ensure any policies are effective. Bring the HR department into the process to help disseminate information about the benefits and risks. Technology is evolving at a pace never previously experienced within the enterprise. As such, IT departments must work continually and proactively. A write now, review in five years approach to policy development and enforcement can simply no longer suffice. Develop and implement an integrated strategy to proactively address potential problems to take advantage of the development of comsumerization. It s also vital to ensure the integrated strategy must include mobile, static and personal devices. Mobile device security can no longer be managed as a help-desk issue. With such vast volumes of corporate data now accessible via company-owned and personal devices, it has become a strategic issue. Management needs to recognise that data risks have evolved as such and move policy decisions to a strategic level within IT and the wider organisation. Those responsible for managing IT must seek to understand employee motivations for personal device use in the workplace and for possible abuse before either happens on a wide scale. As businesses become ever more mobile and increasingly connected, this policy vacuum and patchiness of understanding is only going to become increasingly apparent and ever more dangerous. In a world where data security is becoming an increasingly important part of strategic business continuity, the value of a planned, proactive and pragmatic approach to security in ensuring devices, data and staff are protected cannot be underestimated by Trend Micro Incorporated. All rights reserved. Trend Micro, the Trend Micro t-ball logo, and TrendLabs are trademarks or registered trademarks of Trend Micro Incorporated. All other company and/or product names may be trademarks or registered trademarks of their owners. Information contained in this document is subject to change without notice. 8 Executive Summary The cause and effect of consumerization in the workplace

Building a Comprehensive Mobile Security Strategy

Building a Comprehensive Mobile Security Strategy WHITE PAPER Building a Comprehensive Mobile Security Strategy A key to safeguarding data and apps is finding the right partner. protecting mobile environments has become more complex. Fortunately, solutions

More information

Consumerization Survey Report The Consumerization of IT

Consumerization Survey Report The Consumerization of IT Securing Your Journey to the Cloud Consumerization Survey Report The Consumerization of IT An increasing number of organizations are taking a strategic approach to Consumerization. Learn what they are

More information

In-flight broadband takes off in Europe - why airlines can no longer afford to wait. Change is in the Air. AVIATION > Connectivity > Research

In-flight broadband takes off in Europe - why airlines can no longer afford to wait. Change is in the Air. AVIATION > Connectivity > Research In-flight broadband takes off in Europe - why airlines can no longer afford to wait Change is in the Air AVIATION > Connectivity > Research In a highly competitive market, airlines are fighting for a way

More information

How To Get Rid Of Byo

How To Get Rid Of Byo Bring Your Own Application: The New Reality for the Mobile Workforce IT consumerization and the evolving mobile professional have given rise to the BYOA movement. IT professionals need to understand why

More information

IT Executive and CEO Survey

IT Executive and CEO Survey Mobile Consumerization Trends & Perceptions IT Executive and CEO Survey FINAL REPORT COMPARISONS: WAVES 1 AND 2 PREPARED FOR: TREND MICRO, INC. BY: DECISIVE ANALYTICS, LLC Cheryl Harris, Ph.D. Chief Research

More information

The Convergence of IT Operations

The Convergence of IT Operations SOLUTION WHITE PAPER The Convergence of IT Operations A Case for IT Service and Asset Process Integration and Automation TABLE OF CONTENTS TODAY S REALITY: THE FUTURE IS NOW. 1 AUTOMATION & INTEGRATION:

More information

Insights: Data Protection and the Cloud Europe

Insights: Data Protection and the Cloud Europe Insights: Data Protection and the Cloud Europe September 11 we can Table of Contents Executive Summary Page 3 Further Information Page 3 Key findings Page 4 Vertical sector findings Page 4 Investment in

More information

Web 2.0 in the Workplace Today

Web 2.0 in the Workplace Today Web 2.0 in the Workplace Today 2 Contents Foreword 3 Employers enthusiastically embracing potential of Web 2.0 4 Brave new world 5 Web 2.0 and security: new approach needed? 7 Clearswift SECURE Gateways

More information

F5 Cloud / Virtualisation Research. October 2010

F5 Cloud / Virtualisation Research. October 2010 F5 Cloud / Virtualisation Research October 2010 In a nutshell Cloud Pleaser Cloud services are being adopted at a lightening pace across Europe. The nature of adoption is varied and few companies take

More information

A number of factors contribute to the diminished regard for security:

A number of factors contribute to the diminished regard for security: TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand

More information

Mitigating Bring Your Own Device (BYOD) Risk for Organisations

Mitigating Bring Your Own Device (BYOD) Risk for Organisations Mitigating Bring Your Own Device (BYOD) Risk for Organisations Harness the benefits and mitigate the risks of BYOD espiongroup.com Executive Summary Mobile devices such as smart phones, tablets, or laptops

More information

Enterprise Mobility: The Impact of Changing Employee Behaviour

Enterprise Mobility: The Impact of Changing Employee Behaviour Enterprise Mobility: The Impact of Changing Employee Behaviour Richard Absalom, Principal Analyst, Enterprise Mobility richard.absalom@ovum.com / @RichAbsalom 23 April 2015 1 About Ovum Leading independent

More information

Enhancing your collaboration platform for the evolving project workforce

Enhancing your collaboration platform for the evolving project workforce WHITE PAPER Social PPM: Enhancing your collaboration platform for the evolving project workforce By: Neil Stolovitsky GENIUS INSIDE S.A. 17, Rue de Genève CH-1003 Lausanne Switzerland Phone: +41 (0)21

More information

trends and audit considerations

trends and audit considerations Bring your own device (BYOD) trends and audit considerations SIFMA IT audit session 4 October 2012 Disclaimer Ernst & Young refers to the global organization of member firms of Ernst & Young Global Limited,

More information

Why Your Employer Brand Matters

Why Your Employer Brand Matters Hiring Solutions Whitepaper Why Your Employer Brand Matters The impact of company brand and employer brand on job consideration Key Findings 1) A strong overall company brand certainly doesn t hurt in

More information

Survey findings. Executive Summary. Subject: BYOD

Survey findings. Executive Summary. Subject: BYOD 2013 Survey findings Executive Summary Subject: TEKsystems IT Industry Survey series explores the hottest trends affecting the IT workforce. With over 80,000 IT professionals deployed at 6,000 client sites

More information

Results, 1st Quarter 2016. Patient Engagement. www.himss.eu/analytics. HIMSS Analytics ehealth TRENDBAROMETER Q1/2016

Results, 1st Quarter 2016. Patient Engagement. www.himss.eu/analytics. HIMSS Analytics ehealth TRENDBAROMETER Q1/2016 Results, 1st Quarter 2016 Patient Engagement www.himss.eu/analytics 1 TABLE OF CONTENT HIMSS Analytics Who we are page 3 Survey overview page 4 Results Overall page 9 Formal strategy page 10 Tools provided

More information

Whitepaper. How to Implement a Strong BYOD Policy. BYOD on the Rise - But with Challenges

Whitepaper. How to Implement a Strong BYOD Policy. BYOD on the Rise - But with Challenges How to Implement a Strong BYOD Policy Mobility carries with it promises of convenience, productivity, and remarkable amounts of information at everyone s fingertips. While smartphones and other devices

More information

EUROPE ERICSSON MOBILITY REPORT

EUROPE ERICSSON MOBILITY REPORT EUROPE ERICSSON MOBILITY REPORT NOVEMBER 2015 Market Overview Key figures: Europe 2015 2021 CAGR 2015 2021 Mobile subscriptions (million) 1,140 1,250 1% Smartphone subscriptions (million) 550 880 10% Data

More information

BYOD Strategy - Advantages and Disadvantages

BYOD Strategy - Advantages and Disadvantages BRING YOUR OWN DEVICE AN INTRODUCTION BYOD An Introduction 3 The Management Challenge and Opportunity 5 Adopting a Step by Step BYOD Strategy 8 BYOD It s Time 14 1NService Your BYOD Partner 15 Copyright

More information

Social Media Study in European Police Forces: First Results on Usage and Acceptance

Social Media Study in European Police Forces: First Results on Usage and Acceptance Social Media Study in European Police Forces: First Results on Usage and Acceptance P. Saskia Bayerl, Ph.D., Erasmus University Rotterdam, the Netherlands September 29 th, 2012 Table of Contents Main Findings...

More information

BYOD and IT Service Management: what is the likely impact?

BYOD and IT Service Management: what is the likely impact? BYOD and IT Service Management: what is the likely impact? Written by Paul Wilkinson and Steve Lawless, Purple Griffon Introduction Bring your own device (BYOD) is a business strategy of employees bringing

More information

White paper. Selecting and Implementing Secure

White paper. Selecting and Implementing Secure White paper Selecting and Implementing Secure Mobile ERP Content Why now?... 1 Challenges and opportunities... 2 Not a new problem... 3 Striking a balance... 4 Work with your ERP vendor... 5 Conclusion...

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

Today s Best Practices: How smart business is protecting enterprise data integrity and employee privacy on popular mobile devices. Your Device Here.

Today s Best Practices: How smart business is protecting enterprise data integrity and employee privacy on popular mobile devices. Your Device Here. Securing Business Mobility Today s Best Practices: How smart business is protecting enterprise data integrity and employee privacy on popular mobile devices Your Device Here. Good supports hundreds of

More information

Kaspersky Lab PR Survey 2013 Report Netherlands_V1.0. TNS Infratest

Kaspersky Lab PR Survey 2013 Report Netherlands_V1.0. TNS Infratest Kaspersky Lab PR Survey 2013 Report Netherlands_V1.0 Contents 1 Summary 03 2 Survey Information 06 3 Loss of Equipment 10 4 Data Security & Encryption 15 5 Policies & Employment 21 2 1 Summary Summary

More information

How social technologies drive business success EUROPEAN SURVEY RESULTS 15 TH MAY 2012

How social technologies drive business success EUROPEAN SURVEY RESULTS 15 TH MAY 2012 How social technologies drive business success EUROPEAN SURVEY RESULTS 15 TH MAY 2012 Contents Foreword... 1 Executive summary... 2 How are social tools being used today?... 4 How will social tools be

More information

How Technology Executives are Managing the Shift to BYOD

How Technology Executives are Managing the Shift to BYOD A UBM TECHWEB WHITE PAPER SEPTEMBER 2012 How Technology Executives are Managing the Shift to BYOD An analysis of the benefits and hurdles of enabling employees to use their own consumer devices in the

More information

Law Firms in Transition: Marketing, Business Development and the Quest for Growth

Law Firms in Transition: Marketing, Business Development and the Quest for Growth Law Firms in Transition: Marketing, Business Development and the Quest for Growth A survey of over 100 legal marketers and business development professionals Law Firms in Transition: Marketing, Business

More information

The Shape of Email. Research Report. June 2012. www.mimecast.com

The Shape of Email. Research Report. June 2012. www.mimecast.com The Shape of Email Research Report June 2012 www.mimecast.com Introduction Many companies today are concerned with how information is exchanged both between their organization and others and also within

More information

BUYER S GUIDE. The Unified Communications Buyer s Guide: Four Steps to Prepare for the Modern, Mobile Workforce

BUYER S GUIDE. The Unified Communications Buyer s Guide: Four Steps to Prepare for the Modern, Mobile Workforce BUYER S GUIDE The Unified Communications Buyer s Guide: Four Steps to Prepare for the Modern, Mobile Workforce Not all that long ago, the word office had a pretty straightforward meaning. When you heard

More information

The Use of Social Media by Electronics Design Engineers

The Use of Social Media by Electronics Design Engineers The Use of Social Media by Electronics Design Engineers A Study by the University of Chichester and Napier Partnership Limited August 2009 ABSTRACT This joint project between Napier and the University

More information

Improving business performance: Taking the pain out of document management

Improving business performance: Taking the pain out of document management Improving business performance: Taking the pain out of document management A white paper to investigate documents and how they can be better managed to improve business performance Introduction Australian

More information

Table of Contents. Application Vulnerability Trends Report 2013. Introduction. 99% of Tested Applications Have Vulnerabilities

Table of Contents. Application Vulnerability Trends Report 2013. Introduction. 99% of Tested Applications Have Vulnerabilities Application Vulnerability Trends Report : 2013 Table of Contents 3 4 5 6 7 8 8 9 10 10 Introduction 99% of Tested Applications Have Vulnerabilities Cross Site Scripting Tops a Long List of Vulnerabilities

More information

How To Protect Your Employees From Being Hacked By A Corporate Firewall

How To Protect Your Employees From Being Hacked By A Corporate Firewall The case for supporting mobile users with secure remote access Your employees are mobile and your remote support strategy needs to be too - but manage the security risks of remote access tools. A study

More information

CHALLENGES FACING HR IN 2015

CHALLENGES FACING HR IN 2015 CHALLENGES FACING HR IN 2015 Contents Executive Summary... 1 Challenges of HR... 2 A war on two sides... 2 Failure to embrace technology... 3 Not following the latest trends... 3 Barriers to candidate

More information

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM

Consumerization. Managing the BYOD trend successfully. Harish Krishnan, General Manager, Wipro Mobility Solutions WWW.WIPRO.COM Consumerization Managing the BYOD trend successfully WWW.WIPRO.COM Harish Krishnan, General Manager, Wipro Mobility Solutions Employees dictate IT Enterprises across the world are giving in to the Consumerization

More information

METHODOLOGY THANKS TO CONNECTED DEVICES LIKE TABLETS AND SMARTPHONES, THE WAY PEOPLE SHOP IS CHANGING DRAMATICALLY.

METHODOLOGY THANKS TO CONNECTED DEVICES LIKE TABLETS AND SMARTPHONES, THE WAY PEOPLE SHOP IS CHANGING DRAMATICALLY. METHODOLOGY THANKS TO CONNECTED DEVICES LIKE TABLETS AND SMARTPHONES, THE WAY PEOPLE SHOP IS CHANGING DRAMATICALLY. We aim to better prepare brands for the future of retail. So for the second consecutive

More information

Balancing business needs with user expectations to deliver. The New Mobile Experience

Balancing business needs with user expectations to deliver. The New Mobile Experience Balancing business needs with user expectations to deliver The New Mobile Experience What does mobility mean to you? Is mobility simply about being able to take your laptop or tablet into meetings and

More information

The State of Work-Life Balance in Hong Kong Survey

The State of Work-Life Balance in Hong Kong Survey Survey Examining Hong Kong s work-life culture and establishing responsibility for positive change 2012 Robin Bishop and Amanda Yik October 2012 About Community Business Community Business is a unique

More information

SOCIAL NETWORKING POLICY

SOCIAL NETWORKING POLICY SOCIAL NETWORKING POLICY Ratified 9 th March 2016 Reviewed Policy Authorisation Authorised Date By Version March 2016 Governors 1.0 Review Date Changes Made Next Review 1 SOCIAL NETWORKING POLICY This

More information

The Challenges Posed by BYOD.

The Challenges Posed by BYOD. The Challenges Posed by BYOD. The Challenges Posed by BYOD.... 1 Introduction... 3 Primary Bring Your Own Device Challenges... 3 Enable Workers to Securely Accomplish Business Tasks... 4 Managing Multiple

More information

Mobility in Business Report

Mobility in Business Report Mobility in Business Report Prepared by: Citrix and Vanson Bourne www.citrix.com Executive Summary Mobility continues to change the way we do business at a dramatic rate. Ten years ago, no one was talking

More information

IT Organizations Embrace Bring-Your-Own Devices

IT Organizations Embrace Bring-Your-Own Devices Global BYO Index IT Organizations Embrace Bring-Your-Own Devices Global BYO Index www.citrix.com Foreword The consumerization of IT, led by powerful, easy-to-use mobile devices such as smartphones, laptops

More information

A 4- Letter Acronym Sending CIOs Running Scared - BYOD

A 4- Letter Acronym Sending CIOs Running Scared - BYOD A 4- Letter Acronym Sending CIOs Running Scared - BYOD What This Means for the other 4- Letter Acronym - ITSM Karen Ferris ABSTRACT Bring Your Own Device (BYOD) or Bring Your Own Computing (BYOC) is being

More information

How To Use Social Media For A Job

How To Use Social Media For A Job kelly Global workforce index 120,000 people Social media and technology release: NOV 2013 31 countries Socialising recruitment Social media in recruitment has altered the way people search for and communicate

More information

Branding the Government As An Employer of Choice

Branding the Government As An Employer of Choice Branding the Government As An Employer of Choice By Neil Reichenberg, IPMA-HR Executive Director If governments are both to compete successfully for talented applicants and retain high performing employees,

More information

Mobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options

Mobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options Mobile Security Challenge Emerges Smart IT Leaders Evaluating Pervasive Security Options By Robin Gareiss Executive Vice President and Founder, Nemertes Research Executive Summary As more employees bring

More information

KEY FINDINGS. 2 New trends in global shopping habits. Smartphones are increasingly important during all stages of the consumer journey

KEY FINDINGS. 2 New trends in global shopping habits. Smartphones are increasingly important during all stages of the consumer journey KEY FINDINGS 1 Smartphones are increasingly important during all stages of the consumer journey 2 New trends in global shopping habits 3 Social media s influence varies widely by country METHODOLOGY To

More information

The Bring Your Own Device Era:

The Bring Your Own Device Era: The Bring Your Own Device Era: Benefits Clearly Justify BYOD, but Businesses Must Mitigate Security, Compliance and Application Performance Risks Executive Overview The Bring-Your-Own-Device (BYOD) era

More information

Commissioned Study. SURVEY: Mobile Threats are Real and Costly

Commissioned Study. SURVEY: Mobile Threats are Real and Costly Commissioned Study SURVEY: Mobile Threats are Real and Costly Introduction A lack of integrated mobile security is costing companies in terms of everything from lost productivity to lost data. Cyber criminals

More information

A number of factors contribute to the diminished regard for security:

A number of factors contribute to the diminished regard for security: TrendLabs Enterprises cite security as their number one concern with regard to consumerization. During the actual execution of a consumerization strategy, however, IT groups find that the increasing demand

More information

Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci www.deepsecurity.us

Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci www.deepsecurity.us Emerging threats for the healthcare industry: The BYOD Revolution By Luca Sambucci www.deepsecurity.us Copyright 2013 Emerging threats for the healthcare industry: The BYOD REVOLUTION Copyright 2013 Luca

More information

The changing role of the IT department in a cloud-based world. Vodafone Power to you

The changing role of the IT department in a cloud-based world. Vodafone Power to you The changing role of the IT department in a cloud-based world Vodafone Power to you 02 Introduction With competitive pressures intensifying and the pace of innovation accelerating, recognising key trends,

More information

Internal Communication

Internal Communication Internal Communication 2013 2014 www.internal communication.com/stateofthesector 1 2 Introduction State of the Sector is an industry wide census that aims to investigate the challenges internal communicators

More information

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril. Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing

More information

Survey Results. Presented to ERPtips and JDEtips Jan 20, 2010

Survey Results. Presented to ERPtips and JDEtips Jan 20, 2010 Social Media's Role in Decision Making by Business Professionals Survey Results Presented to ERPtips and JDEtips Jan 20, 2010 Vanessa DiMauro, CEO Leader Networks and SNCR Fellow Don Bulmer, VP Global

More information

The Australian ONLINE CONSUMER LANDSCAPE

The Australian ONLINE CONSUMER LANDSCAPE The Australian ONLINE CONSUMER LANDSCAPE March 2012 THE AUSTRALIAN ONLINE MARKET & GLOBAL POPULATION Internet usage in Australia is widespread and approaching saturation point with only minimal increases

More information

BRING YOUR OWN DEVICE

BRING YOUR OWN DEVICE WHITE PAPER BRING YOUR OWN DEVICE This white paper from Stylusinc addresses on how to introduce BYOD programs in an enterprise and how an IT department can implement a practical and a secure strategy.

More information

Raise your game go CLouD

Raise your game go CLouD Raise your game GO CLOUD The latest research from Symantec dispels myths about cloud computing and talks common sense about the value of cloud computing for small businesses. We all feel perfectly at home

More information

Business Attitudes Toward Cybersecurity 2014

Business Attitudes Toward Cybersecurity 2014 Business Attitudes Toward Cybersecurity 2014 Contents The Main Findings... 2 Current Status of Cybersecurity in Business... 2 Business Cybersecurity Trends... 2 Methodology... 3 Current Status of Cybersecurity

More information

Privileged user management

Privileged user management Privileged user management vv It s time to take control Bob Tarzey, Analyst and Director, Quocirca Ltd Introduction The data presented is based on 270 telephone interviews with organisations across Europe

More information

The Path Forward. International Women s Day 2012 Global Research Results

The Path Forward. International Women s Day 2012 Global Research Results The Path Forward International Women s Day 2012 Global Research Results Research objectives Accenture conducted its global research study, The Path Forward for release on International Women s Day to gain

More information

Customer Testimonial V1.03-1115

Customer Testimonial V1.03-1115 Customer Testimonial V1.03-1115 About Plantiflor Plantiflor has been providing high quality horticultural products direct to the customer for many years; growing from strength to strength to become one

More information

Adults media use and attitudes. Report 2016

Adults media use and attitudes. Report 2016 Adults media use and attitudes Report Research Document Publication date: April About this document This report is published as part of our media literacy duties. It provides research that looks at media

More information

VMware Cloud Adoption Study

VMware Cloud Adoption Study VMware Cloud Adoption Study Executive Summary May 2012 Contents About the research 3 Objectives 4 Overview 4 Key Findings 5 European enterprises to spend a third of IT budgets this year on cloud computing,

More information

NAVIGATE THE UNCHARTERED WATERS OF BYOD WITH A SECURE POLICY

NAVIGATE THE UNCHARTERED WATERS OF BYOD WITH A SECURE POLICY IT INDUSTRY TRENDS NAVIGATE THE UNCHARTERED WATERS OF BYOD WITH A SECURE POLICY Any successful sailing trip must be carefully planned to avoid danger and ensure a safe return. The captain evaluates the

More information

The Career Paradox for UK Women. An in-depth study across industry sectors exploring career support, the working environment and the talent pipeline.

The Career Paradox for UK Women. An in-depth study across industry sectors exploring career support, the working environment and the talent pipeline. The Career Paradox for UK Women An in-depth study across industry sectors exploring career support, the working environment and the talent pipeline. Executive Summary This report is an examination of the

More information

PwC s 5th Annual Digital IQ Survey

PwC s 5th Annual Digital IQ Survey www.pwc.com/digitaliq PwC s 5th Annual Digital IQ Survey Digital Conversations and the C-suite Digital IQ PwC s 5th Annual Survey Findings: Leadership teams integrate digital conversations across all aspects

More information

Global Survey: What s creating tension between IT and business leaders? April 2014

Global Survey: What s creating tension between IT and business leaders? April 2014 Global Survey: What s creating tension between IT and business leaders? April 2014 1 Research & Insights Executive summary If the marketing department is making its own decisions about an email marketing

More information

PensionsEurope position paper on personal pension products

PensionsEurope position paper on personal pension products March 2014 PensionsEurope position paper on personal pension products About PensionsEurope PensionsEurope represents national associations of pension funds and similar institutions for workplace pensions.

More information

Maintaining Information Security while Allowing Personal Hand-Held Devices in the Enterprise

Maintaining Information Security while Allowing Personal Hand-Held Devices in the Enterprise IT@Intel White Paper Intel IT IT Best Practices Information Security and Employee Productivity November 2010 Maintaining Information Security while Allowing Personal Hand-Held Devices in the Enterprise

More information

ENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM

ENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM ENTERPRISE BYOD BEST PRACTICES 1 ENTERPRISE BYOD BEST PRACTICES POLICY AND SECURITY BEST PRACTICES FOR A SOUND ENTERPRISE MOBILITY PROGRAM BYOD, Bring Your Own Device, is a rapidly growing trend in which

More information

CIBECS / IDG Connect DATA LOSS SURVEY. The latest statistics and trends around user data protection for business. www.cibecs.

CIBECS / IDG Connect DATA LOSS SURVEY. The latest statistics and trends around user data protection for business. www.cibecs. CIBECS / IDG Connect 2014 DATA LOSS SURVEY The latest statistics and trends around user data protection for business. REPORT www.cibecs.com 2 Table of ontents EXECUTIVE 01 02 03 04 05 06 SUMMARY WHO PARTICIPATED

More information

Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence

Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence Vodafone Global Enterprise Deploy the Apple iphone across your Enterprise with confidence White Paper Vodafone Global Enterprise 3 The Apple iphone has become a catalyst for changing the way both users

More information

Fluoride and Dental Health in Europe

Fluoride and Dental Health in Europe Fluoride and Dental Health in Europe Dental Health in Europe - A Problem for Disadvataged Groups Report of an EU-funded Conference A conference of dental and public health experts drawn from every Member

More information

July 2007. Management Practice & Productivity: Why they matter

July 2007. Management Practice & Productivity: Why they matter July 2007 Management Practice & Productivity: Why they matter Nick Bloom Stanford University Stephen Dorgan McKinsey & Company John Dowdy McKinsey & Company John Van Reenen Centre for Economic Performance,

More information

Feature BYOD - MOBILITY GOES VIRAL

Feature BYOD - MOBILITY GOES VIRAL Feature BYOD - MOBILITY GOES VIRAL 68 Quarter One 2012 A year ago it was the development no employer wanted to know about; now, it s the movement every employer has to deal with. Bringyour-own-device (BYOD)

More information

Security Awareness Research 5 November 2010

Security Awareness Research 5 November 2010 Security Awareness Research 5 November 2010 31% of data breaches happen as a result of frustrations with IT security policy restricting employees from doing their job Foreword I am delighted to introduce

More information

The Business Impact of the Cloud. According to 460 Senior Financial Decision-Makers

The Business Impact of the Cloud. According to 460 Senior Financial Decision-Makers The Business Impact of the Cloud According to 460 Senior Financial Decision-Makers March 2012 Contents Summary of key findings 4 Finance decision-makers have a high awareness of cloud computing 4 The majority

More information

When Desktops Go Virtual

When Desktops Go Virtual When Desktops Go Virtual Addressing security challenges in your virtual desktop infrastructure A Trend Micro White Paper I. INTRODUCTION Server virtualization is well on its way to becoming mainstream.

More information

W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e

W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R E m b r a c i n g C o n s u m e r i z a t i o n w i t h C o n f i d e n c e Sponsored

More information

BOYD- Empowering Users, Not Weakening Security

BOYD- Empowering Users, Not Weakening Security BOYD- Empowering Users, Not Weakening Security Table of Contents Exec summary... 3 Benefits of BYOD... 4 Threats that BYOD Harbours... 5 Malware... 5 Data Leakage... 5 Lost or Stolen Devices... 5 Public

More information

State of Mobile Commerce.

State of Mobile Commerce. State of Mobile Commerce. Leading mobile retailers dominate - and the gap is growing Q4 2015 FEBRUARY 2016 Executive summary Criteo s analysis of shopping data from Q4 2015 demonstrates that mobile is

More information

WHITE PAPER. Mobile HR Solutions: Connecting & Empowering Your Workforce

WHITE PAPER. Mobile HR Solutions: Connecting & Empowering Your Workforce MAY 2011 WHITE PAPER Mobile & Wireless Practice Mobile HR Solutions: Connecting & Empowering Your Workforce MOBILE HR SOLUTIONS: CONNECTING & EMPOWERING YOUR WORKFORCE 1 EXECUTIVE SUMMARY VDC Research

More information

The great debate: Corporate vs. personal liability for smartphones and tablet devices in the workplace

The great debate: Corporate vs. personal liability for smartphones and tablet devices in the workplace The great debate: Corporate vs. personal liability for smartphones and tablet devices in the workplace Jeff R Fawcett Dell SecureWorks Security Practice Executive M Brandon Swain Dell SecureWorks Security

More information

Business Benefits of Volunteering

Business Benefits of Volunteering Business Benefits of Volunteering An introduction to skills based volunteering Mari Frengstad TABLE OF CONTENT: Executive Summary... 3 Introduction... 5 What skills are key to Hammerson s success?... 5

More information

Don t Let A Security Breach Put You Out of Business

Don t Let A Security Breach Put You Out of Business Don t Let A Security Breach Put You Out of Business Committed to providing you with the most innovative security and privacy solutions. www.boomtechit.com Bring Your Own Device (BYOD) and Mobile Device

More information

Workplace of the Future: a global market research report

Workplace of the Future: a global market research report Mobile Workstyles Survey White Paper Workplace of the Future: a global market research report The workplace of the future offers mobility, bring-yourown device (BYOD) and innovative workspaces 2 Over the

More information

The Smart Shopper Snapshot. September 2015

The Smart Shopper Snapshot. September 2015 The Smart Shopper Snapshot September 2015 About the Consumer Barometer Introduction The Consumer Barometer is a free tool that delivers consumer insights to support planning and decision-making in a fast

More information

INSIGHTS CUPP COMPUTING MOBILE SECURITY MULTINATIONAL DECISIONMAKERS STUDY 2015

INSIGHTS CUPP COMPUTING MOBILE SECURITY MULTINATIONAL DECISIONMAKERS STUDY 2015 INSIGHTS CUPP COMPUTING MOBILE SECURITY MULTINATIONAL DECISIONMAKERS STUDY 2015 CHERYL HARRIS, PH.D. DECISIVE ANALYTICS LLC 575 MADISON AVENUE, 10 TH FL NEW YORK, NY 10022 917.628.6167 14. January 2015

More information

Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER

Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them WHITE PAPER WHITE PAPER 2 Enterprise Mobility & BYOD: Four Biggest Challenges And How to Solve Them Business success is highly

More information

UK Commission s Employer Perspectives Survey 2012. Executive Summary 64 December 2012

UK Commission s Employer Perspectives Survey 2012. Executive Summary 64 December 2012 UK Commission s Employer Perspectives Survey 2012 Executive Summary 64 December 2012 UK Commission s Employer Perspectives Survey 2012 Jan Shury, David Vivian, Katie Gore, Camilla Huckle, IFF Research

More information

WHITE PAPER. Be Active about Passives! Why Corporations need to rethink how they recruit for executive and strategic roles

WHITE PAPER. Be Active about Passives! Why Corporations need to rethink how they recruit for executive and strategic roles WHITE PAPER Be Active about Passives! Why Corporations need to rethink how they recruit for executive and strategic roles Published by Dillistone Systems September 2015 Introduction Today, passive candidate

More information

BYOD IN EDUCATION Miller 1

BYOD IN EDUCATION Miller 1 BYOD IN EDUCATION Miller 1 BYOD in Education: Policy, Risk Management, & Contingency Planning Randall Miller East Carolina University millerra11@students.ecu.edu BYOD IN EDUCATION Miller 2 Abstract There

More information

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management EOH Cloud EOH Cloud Services - EOH Cloud Page 1 EOH Mobile Device Management Manage a fleet of diverse mobile devices, support new secure mobile workflows and effectively distribute apps. The evolving

More information

Enterprise on the Go. How enterprises can leverage mobile apps

Enterprise on the Go. How enterprises can leverage mobile apps Enterprise on the Go How enterprises can leverage mobile apps Vivek Narasimhan June 2012 Contents I. Project Scope II. Consumerization of IT drives demand for apps III. Enterprise App Considerations IV.

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

DEVELOPMENTS FOR OUR EMPLOYEES

DEVELOPMENTS FOR OUR EMPLOYEES 2015 ANNUAL REPORT FORWARD-LOOKING STATEMENT This annual report contains certain forward-looking statements regarding the financial situation and results of USG People N.V., as well as a number of associated

More information