Mobile Security Landscape in 2014 - A Report

Similar documents
Putting Operators at the Centre of

MOBILE SECURITY. Fixing the Disconnect Between Employer and Employee for BYOD (Bring Your Own Device)

4 Steps to Effective Mobile Application Security

CA Technologies Channel Index 2013

Consumerization Survey Report The Consumerization of IT

BOYD- Empowering Users, Not Weakening Security

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

Managing Web Security in an Increasingly Challenging Threat Landscape

The Future of Network Security Sophos 2012 Network Security Survey

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Preparing your network for the mobile onslaught

Software licensing: expectations, challenges and the future. November 2015

6 Pillars for Building a Successful BYOD Program. Protecting corporate assets while increasing employee productivity

10 Quick Tips to Mobile Security

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

Cyber Essentials Scheme

Yes MAM: How Mobile Device Management Plus Mobile Application Management Protects and Addresses BYOD

Riding technology waves

Web Protection for Your Business, Customers and Data

How To Protect Your Network From Threats From Your Network (For A Mobile) And From Your Customers (For An Enterprise)

BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.

SECURE AND MANAGE YOUR MOBILE FLEET Freedome for Business

Securing Health Data in a BYOD World

2012 NCSA / Symantec. National Small Business Study

Internet threats: steps to security for your small business

EXTENDING THREAT PROTECTION AND CONTROL TO MOBILE WORKERS

NAVIGATE THE UNCHARTERED WATERS OF BYOD WITH A SECURE POLICY

Kaspersky Security for Mobile

2011 NATIONAL SMALL BUSINESS STUDY

A number of factors contribute to the diminished regard for security:

Commissioned Study. SURVEY: Web Threats Expose Businesses to Data Loss

How To Improve Security In An Organization

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

The Security Impact of Mobile Device Use by Employees

THE EASY WAY TO SECURITY AND SIMPLICITY. Business Suite

Ibrahim Yusuf Presales Engineer at Sophos Smartphones and BYOD: what are the risks and how do you manage them?

Guideline on Safe BYOD Management

A strategic approach to fraud

10 BEST PRACTICES FOR MOBILE DEVICE MANAGEMENT (MDM)

Putting Web Threat Protection and Content Filtering in the Cloud

Chapter 6: Fundamental Cloud Security

Mitigating Bring Your Own Device (BYOD) Risk for Organisations

Enterprise Mobility Management

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Your Company Data, Their Personal Device What Could Go Wrong?

Putting your best foot forward. Managing corporate security in a world of consumer devices an analysis of primary research

UK School Opinions of Cloud Services and Student Privacy. A survey conducted by the Ponemon Institute for SafeGov.org May 2013

The Cost of Insecure Mobile Devices in the Workplace Sponsored by AT&T

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Cisco SAFE: A Security Reference Architecture

Stallioni Sügisseminar

Bluebox: Ushering in a New Era in Mobile Data Security

White Paper. Data Security. The Top Threat Facing Enterprises Today

Bring your. own device

Samsung Mobile Security

Mobility, Security Concerns, and Avoidance

2014 State of Endpoint Risk. Sponsored by Lumension. Independently conducted by Ponemon Institute LLC Publication Date: December 2013

EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management

Three Best Practices to Help Government Agencies Overcome BYOD Challenges

How To Support Bring Your Own Device (Byod)

Data Protection Act Bring your own device (BYOD)

A Channel Company White Paper. Online Security. Beyond Malware and Antivirus. Brought to You By:

Digital Consumer s Online Trends and Risks

On and off premises technologies Which is best for you?

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

How To Protect Your Network From Attack From A Cyber Threat

Offering a shopping 2.0 experience is a challenge for two out of three retailers... 3

EasiShare Whitepaper - Empowering Your Mobile Workforce

Neoscope

Guide Antivirus. You wouldn t leave the door to your premises open at night. So why risk doing the same with your network?

SECURING TODAY S MOBILE WORKFORCE

IMPLEMENTING YOUR BYOD MOBILITY STRATEGY

WHITE PAPER. Mobile Security. Top Five Security Threats for the Mobile Enterprise and How to Address Them

Protecting Customer Experience Against Distributed Denial Of Service (DDoS)

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Solution Brief. Aerohive and OpenDNS. Advanced Network Security for Retail Stores

10 Hidden IT Risks That Threaten Your Financial Services Firm

EXECUTIVE BRIEF SPON. File Synchronization and Sharing Market Forecast, Published May An Osterman Research Executive Brief

Risk and threats everywhere, all the time

Codeproof Mobile Security & SaaS MDM Platform

Perception and knowledge of IT threats: the consumer s point of view

Secure Your Mobile Workplace

Endpoint protection for physical and virtual desktops

DOBUS And SBL Cloud Services Brochure

Top 5 Global Bank Selects Resolution1 for Cyber Incident Response.

ISB13 Web security deployment options - which is really best for you? Duncan Mills, Piero DePaoli, Stuart Jones

Total Enterprise Mobility. Norbert Elek

The Advantages of Security as a Service versus On-Premise Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Where is your Corporate Data Going? 5 tips for selecting an enterprise-grade file sharing solution.

PULSE SECURE FOR GOOGLE ANDROID

2012 Bit9 Cyber Security Research Report

Enterprise Mobility Management 101

Security strategies to stay off the Børsen front page

SECURE YOUR BUSINESS WHEREVER IT TAKES YOU. Protection Service for Business

IBM Endpoint Manager for Mobile Devices

5 Considerations for a Successful BYOD Strategy Vincent Vanbiervliet

BYOD AND ME. How cell phone hacking effects your business.! Richard Rigby CEO Wraith Intelligence

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Transcription:

The Mobile Security Landscape in 2014 Securing BYOD in today s connected workplace A report by: Copyright 2014. All rights Reserved.

The Role for Mobile Operators in Enterprise Mobility Security Working with nine of the top ten operator groups and over 60 operators globally, protecting all services on fixed and mobile networks, AdaptiveMobile has unique insight into the global operator landscape. Having seen mobile operators services being commoditized by over-the-top cloud-based mobile device and security solutions, and the resultant erosion of mindshare and revenue from their enterprise accounts, AdaptiveMobile commissioned Harris Interactive to investigate the opportunity for operators in enterprise mobile security. An increasing number of employees use their own mobile device for work. The research showed that enterprises still provide employees with devices, but increasing numbers of employees use their own phone or tablet for work purposes: 93% supply mobile phones, 65% tablets Employees are relatively more likely to use their own devices than enterprise provided devices for work purposes 79% US, 77% EU enterprises allow employees to use their own devices And the proportion doing so could well grow as only 38% of employees are taking up the option to use their own devices right now Enterprises have pursued this BYOD strategy, allowing remote access to their internal network and servers, believing they are adequately protected. Over two-thirds of employees in both regions can access their company s corporate network. 91% of businesses told us that they have controls and policies in place for dealing with mobile security breaches and the vast majority (93%) also agreed that they can detect and respond to mobile security breaches when they occur. 84% went further and claimed they are future-proofed. Claim they can detect and respond to mobile security breaches when they occur. 93% 84% Believe their current mobile security solutions are future proofed. 2 Copyright 2014. All rights Reserved.

However, 52% enterprises have experienced security breaches in the last year, and 35% on more than one occasion. Regular breaches 9% Two-thirds of enterprises do not have visibility of their top security threats. Businesses typically use 4 or 5 mobile security solutions and almost two-fifths (38%) are sourcing these from multiple vendors. US businesses use more security solutions than those in EU and are more likely to source from multiple vendors. A few breaches One breach 17% Almost two-fifths of businesses admit they have no visibility of what their employees are doing when they are using their own devices No breaches 48% for work purposes and only one in three can identify common potential threats. Hacking and lost company data are the main types of mobile security breach. Many of these security breaches have very serious implications for businesses: A minor security breach caused the company to lose about 10 percent of its running capacity. We have leaked a lot of information to our competitors - mainly our strategy, our financial health and our weaknesses. Malware infection of devices Access to harmful websites Installation of unwanted apps Spyware in devices Unapproved data sharing sites Roaming costs protection MMS spam & malware distribution Damage to corporate brand Personal expenditure on data Use of 3rd party cloud services Compromise of customer data Spambot or botnet infection 34% 31% 31% 27% 25% 24% 24% 24% 24% The Mobile Security Landscape in 2014 Securing BYOD in today s connected workplace 3

Employee ignorance of BYOD policies leaves enterprises open to increased levels of security breaches. Enterprises believe that employees know that there is a cost of convenience in BYOD. Only just over half (53%) of employees are aware that their employer has a specific policy in place for employees who use their own mobile devices for work purposes. Three out of ten employees believe there is no policy in place at all and almost a fifth are not sure. 89% Of business that have visibility of employees own devices at all times believe that employees are aware of this. The reality is somewhat different however: 18% No policy 53% 30% Yes, there is a policy Don t know Only a minority of employees who use their own devices to access their company network are worried in any way about compromising their employer s business information security. The vast majority of employees do not believe that (or are unsure whether) their employer can see what they are doing on their personal devices. Don t know 39% 34% Yes No And just 23% believe their employer can lock or wipe their personal devices at any time. 18% Only a minority of employees who use their own devices to access their company network are worried in any way about compromising their employer s business information security. 27% Don t know 50% No 23% Yes This lack of understanding on the part of employees may well be a factor in the high level of security breaches experienced by businesses and points to the need for a comprehensive solution that is readily understood by enterprises and employees alike. And finally, a fifth (21%) of employees admit that they have no idea what control their employer has. 4 Copyright 2014. All rights Reserved.

Employees would react negatively if they knew what level of visibility and control their employer has over their own devices when used for company purposes. Data protection and privacy of personal activity are key concerns for employees, coming top of a list of criteria that are important when deciding whether to use a personal device in a work capacity. And when we tested what employees would do if they were to discover what employers can actually do... 51% Half said they would stop using the device if their employer had visibility at any time There is a clear implication here for enterprises the significant cost savings and productivity gains they are making through BYOD would likely reduce significantly if employees were to discover how much control of their devices they have ceded to their employer. Given that current solutions in place are neither protecting the enterprise adequately, nor giving employees the personal protection and privacy they are looking for: is there an opportunity for operators to step in? 67% Two-thirds would stop if their employer could lock of wipe their personal devices at any time Those prepared to carry on using their own devices knowing the above, would typically be unhappy about the situation. We tested reactions to AdaptiveMobile s Mobile Security Management (MSM) solution. Enterprises The AdaptiveMobile MSM service is a fully cloud-based platform providing companies with a full security offering to manage both employer-provided and employee-owned mobile phones and tablets. Employees The AdaptiveMobile MSM service is a cloud-based service that helps balance the requirements of an employer for security with the privacy and protection of an employee when using their own device inside and outside the office. Key Features Web Policy Controls Roaming Policy Controls Device to Cloud Traffic Encryption Compromised Device Detection Application Policy Controls Device Controls Reporting and Management The Mobile Security Landscape in 2014 Securing BYOD in today s connected workplace 5

The response to MSM was overwhelmingly positive from enterprises. Employees also responded very positively to the MSM service description. 87% expressed an interest in discussing it with their mobile operator if it were available. There were also high levels of agreement with more diagnostic questions that were posed: 66% Two-thirds were interested in having MSM at their company if it were available. Very relevant to the needs of my company New & different from other available solutions Offers clear benefits over other available solutions 83% 82% 82% And as with employers, the majority agreed that the solution is relevant, new and different and offers clear benefits over other solutions available. Additionally, 72% agreed that it provides the protection they need to use personal devices in a work capacity. Data privacy is a key theme of the most resonant aspects of MSM for employees Levels of interest were high in both regions and particularly so in the US. Comprehensive device security is the general message that resonates most with enterprises. It secures many aspects of mobile devices and addresses many different concerns. Protect from spyware & malware Prevent personal data visibility Protect your privacy Warn you when apps leak Ensure privacy of apps Warns about malicious sites Controls what employer does Different levels of access Limits risk of large bills 51% 50% 45% 45% 44% 42% 32% 30% 30% 6 Copyright 2014. All rights Reserved.

There is an opportunity for operators to step in with an Enterprise MSM solution. 72% of business decision-makers would be likely to take the solution from their operator and MSM has the potential to act as a key retention and acquisition tool for operators: More likely to stay with current operator if it offered MSM More likely to switch to an operator that offered MSM if current operator did not 77% 65% Employees are also very receptive to the idea of taking MSM from their mobile operator. The majority (75%) of employees feel confident that their mobile phone operator would be able to protect employers and employees alike if they were to offer MSM. And a clear majority of employees (65%) would trust MSM more if it were offered by their operator, than if it was run by their employer. In Summary We discovered that: Enterprises believe they are adequately protected from mobile security threats, including being future-proofed. However, security breaches are still taking place, repeatedly in a third of businesses, and typically result in significant inconvenience and / or loss of earnings. Only a minority of companies have visibility of security threats despite having multiple solutions (often from multiple vendors). Employee ignorance of work from home policies is leaving businesses open to potential breaches. And most employees are in the dark about the level of control their employer has over their BYOD devices and would stop using them if they found out a financially damaging outcome for enterprises. Responses to AdaptiveMobile s MSM service were overwhelmingly positive: 87% of enterprises were interested in discussing it with their operator if it were available and the majority found it relevant to their needs, new and different and offering clear benefits over other solutions. This is an outstanding response, particularly given that most businesses had previously expressed that they were confident in their current security solutions. Two-thirds of employees were interested in having MSM at their company if it were available. 72% business would take it from their operator and the vast majority said it would increase their loyalty to their operator and even encourage them to switch operators to get the service. There is clearly a role for operators to play in enterprise mobile security and AdaptiveMobile s MSM service is an opportunity to fulfil this role. The Mobile Security Landscape in 2014 Securing BYOD in today s connected workplace 7

Research Scope AdaptiveMobile commissioned Harris Interactive, an independent market research consultancy, to survey to a robust and representative sample of business decision-makers and employees in the US and in three major EU countries. In total, 1,007 interviews were conducted with business decisionmakers and 1,005 with employees working in equivalent (although not the same) organisations. All interviews were conducted online between 7th and 31st January 2014. Decision-makers were screened to ensure that they have significant involvement in IT operations and strategy within their organisation. All employees interviewed had to use a mobile device (mobile phone or tablet) for work purposes and this could be either a device provided by their employer or one of their own devices that they had agreed to use for work purposes. The research focused on organisations with 250 or more full-time employees. Quotas were set to ensure a mix of smaller (250-499) and larger (500+) companies were included. All business sectors were included in the research and the pattern of business types was broadly consistent across decisionmakers and employees surveyed. About AdaptiveMobile AdaptiveMobile is the world leader in mobile security, protecting over one billion consumer and enterprise subscribers worldwide, and the only mobile security company offering products designed to protect all the services on fixed, wi-fi and mobile networks. AdaptiveMobile s award-winning security products provide customers with real-time visibility into what is happening across their networks and the actionable intelligence to respond to these threats. Scaling from the largest global service providers down to the individual user, AdaptiveMobile offers the most comprehensive mobile security products available on the market today; as well as sophisticated revenue-generating security services empowering consumers and enterprises alike to take greater control of their own mobile security. www.adaptivemobile.com Copyright 2014. All rights Reserved.