SlideShare a Scribd company logo
1 of 22
Download to read offline
Sponsored by
Group Partner
Information
Security
Spotlight Report
BYOD & Mobile
Security
BYOD & Mobile Security REPORT | Read the 2014 survey results 2
We would like to thank our sponsors for supporting the
BYOD & Mobile Security Report.
Lumension | www.lumension.com
Lumension Security, Inc., a global leader in endpoint management and security, develops security software
solutions that help businesses protect vital information and manage critical endpoint risk. Lumension delivers
the award-winning Lumension®
Endpoint Management and Security Suite with Vulnerability Management,
Endpoint Protection, Data Protection, and Reporting and Compliance.
Vectra Networks | www.vectranetworks.com
Vectra Networks is the leader of real-time detection of cyber attacks in progress. The Vectra X-series breach
detection platform continuously monitors network traffic to automatically detect any phase of an ongoing
cyber attack. The platform provides visually intuitive reports of hosts under attack and context about what
the attacker is doing. Vectra automatically prioritizes attacks that pose the greatest business risk, enabling
organizations to quickly make decisions on where to focus their time and resources. Vectra Networks’ investors
include Khosla Ventures, IA Ventures and AME Cloud Ventures. The company’s headquarters are in San Jose,
Calif. Visit www.vectranetworks.com for more information.
ZixCorp | www.zixcorp.com
ZixCorp offers industry-leading email encryption, a unique email DLP solution and an innovative email BYOD
solution to meet your company’s data protection and compliance needs. ZixCorp is trusted by the nation’s
most influential institutions in healthcare, finance and government for easy to use secure email solutions.
IBM | www.ibm.com/security
IBM’s security portfolio provides the security intelligence to help organizations holistically protect their
people, data, applications and infrastructure. IBM offers solutions for identity and access management,
security information and event management, database security, application development, risk management,
endpoint management, next-generation intrusion protection and more. IBM operates one of the world’s
broadest security research and development, and delivery organizations. IBM monitors 15 billion security
events per day in more than 130 countries and holds more than 3,000 security patents. For more information,
please visit www.ibm.com/security, follow @IBMSecurity on Twitter or visit the IBM Security Intelligence blog.
Sponsors
BYOD & Mobile Security REPORT | Read the 2014 survey results 3
Our second annual edition of the BYOD & Mobile Security Report explores the
state and challenges of securing BYOD and mobility in 2014.
The results are in. We received over 1,100 responses and gained new insights
into the state of BYOD and mobile security practices in 2014 - all reviewed in
detail on the following pages.
Thanks to everyone who participated in this survey.
We hope you will enjoy this report.
Holger Schulze
Holger Schulze
Group Founder
Information Security
Community on LinkedIn
Welcome to the 2014 edition of the BYOD & Mobile Security Report.
INTRODUCTION
Email: hhschulze@gmail.com
Group Partner
Information
Security
BYOD & Mobile Security REPORT | Read the 2014 survey results 4
The key drivers for BYOD are about keeping employees mobile (57 percent),
satisfied (56 percent) and productive (54 percent).
The biggest BYOD security concerns are loss of company or client data (67
percent) and unauthorized access to company data and systems (57 percent).
Additional IT resources to manage security incidents (30 percent) are by far the
biggest negative impact of mobile security threats.
Smartphones (87 percent) are the dominant form factor among supported mobile
devices, followed by laptops (79 percent) and tablets (68 percent).
The most common risk control measure is password protection (67 percent),
followed by remote wiping of data (52 percent) and use of encryption (43 percent).
The 5 Major Trends in BYOD & Mobile Security
SURVEY HIGHLIGHTS
1
2
3
4
5
BYOD & Mobile Security REPORT | Read the 2014 survey results 5
For 31 percent of organizations, BYOD is still under evaluation, followed by 26 percent of organizations
with privately owned devices in limited use, and 24 percent with widespread use of privately-owned
devices. Company-owned devices are widely used by 40 percent of organizations. 21 percent admit to
having unsupported personal mobile devices in their organization.
What is the overall state of BYOD adoption?
0% 20% 30% 50%10% 40%
40%Company-owned devices
are widely used
BYOD is under evaluation
Privately-owned devices are widely in use and
supported through a BYOD policy
There are currently no plans to use private devices
within the next 12 months
We plan to allow private devices
within the next 12 months
Privately-owned devices are
in very limited use
31%
Privately-owned devices are widely in use,
but not supported by the organization
21%
24%
26%
11%
7%
Other 3%
BYOD & Mobile Security REPORT | Read the 2014 survey results 6
What mobile form factors do you support?
Smartphones (87 percent) are the dominant form factor among supported mobile devices, followed
by laptops (79 percent) and tablets (68 percent).
87%
0
20
40
60
80
100
68%
5%
79%
Smartphone Laptop Tablet Other/None
BYOD & Mobile Security REPORT | Read the 2014 survey results 7
What mobile platforms DO YOU SUPPORT?
Among all mobile devices considered for BYOD (including smartphones, tablets and laptops), Apple’s
iOS is still the dominant mobile platform with 76 percent. RIM (40 percent) declined in popularity
compared to last year while Android (69 percent) and Windows (66 percent) are gaining popularity.
0% 20% 30% 50%
2014 2013
10% 40% 60% 70% 80%
76%iOS / Apple
Android / Google
RIM / Blackberry
Other
Windows / Microsoft
69%
None
40%
66%
3%
3%
2%
6%
48%
51%
61%
72%
BYOD & Mobile Security REPORT | Read the 2014 survey results 8
For what user groups is BYOD enabled?
Employees are the primary group of BYOD users (75 percent). The rise in extending BYOD to
partners, customers and suppliers causes a continued dissolution of the traditional security
perimeter and drives the need for new security strategies and architectures.
0% 20% 30% 50%10% 40% 60% 70% 80%
75%Employees
Contractors
Partners
Suppliers
Other
We don't
enable BYOD
21%
Customers 14%
16%
20%
10%
2%
BYOD & Mobile Security REPORT | Read the 2014 survey results 9
What are the most popular business
Email, calendar and contact management are the most popular mobile apps (86 percent). The
applications designed to boost productivity are the very same applications that can increase the risk
of data breaches, intrusions or malware incidents. Finding the right balance between productivity
and security will be critical to the success of BYOD initiatives.
apps on BYOD devices?
0% 20% 30% 50%10% 40% 70%60% 80% 90%
86%Email / Calendar
/ Contacts
Document access
/ editing
Access to company
built applications
Access to SaaS apps
such as Salesforce
Virtual Desktop
Access to Sharepoint
/ Intranet
45%
File sharing 34%
34%
41%
26%
22%
Cloud Backup
or storage
Video conferencing
Other 2%
21%
19%
BYOD & Mobile Security REPORT | Read the 2014 survey results 10
What are the main drivers and
The key drivers for BYOD are about keeping employees mobile (57 percent), satisfied (56 percent) and
productive (54 percent). Reducing cost for mobile devices (36 percent) and support cost (26 percent)
is important but secondary to employee-related benefits.
benefits of BYOD?
0% 20% 30% 50%10% 40% 60%
57%Improved employee
mobility
Greater employee
satisfaction
Reduced device / endpoint
hardware costs
Reduced security risk
Other
Increased employee
productivity
56%
Reduced operational
support costs
26%
36%
54%
19%
3%
BYOD & Mobile Security REPORT | Read the 2014 survey results 11
What are your biggest BYOD security concerns?
While security technologies are maturing, BYOD security concerns remain. Loss of company or
client data (67 percent), unauthorized access to company data and systems (57 percent) and fear of
downloading content or apps with security exploits (47 percent) top the list.
0% 10%
Loss of company or client data
Unauthorized access to company
data and systems
Malware infections
Inability to dictate endpoint security
Ensuring security software is
up-to-date (e.g. anti-virus)
Users download apps or content
with embedded security exploits
57%
47%
45%
41%
37%
37%
36%
28%
23%
5%
Lost or stolen devices
Device management
Compliance with industry regulations
Support & maintenance
Other / None
20% 30% 40% 50% 60% 70%
67%
BYOD & Mobile Security REPORT | Read the 2014 survey results 12
What type of sensitive data and intellectual
property are you most concerned about?
A majority of organizations are most concerned about protecting business data (74 percent), followed
by customer and employee data (69 percent).
0% 20% 30% 50%10% 40% 70%60% 80%
74%Business data
(e.g., database, apps)
Customer or
employee data
Emails
Images or multimedia
Text messages
Documents
69%
Contacts 29%
62%
66%
13%
11%
Voice conversations
Other 2%
9%
BYOD & Mobile Security REPORT | Read the 2014 survey results 13
What negative impact did mobile security
threats have on your organization?
Additional IT resources to manage security incidents (30 percent) are by far the biggest negative
impact of mobile security threats.
0%
Additional IT resources needed
to manage mobile security
Don't know
Corporate data loss or theft
Disrupted business activities
Cost of cleaning up malware infections
None
27%
23%
16%
14%
12%
12%
11%
5%
3%
2%
Increased helpdesk time to
repair damage
Reduced employee productivity
Increased cost due to devices
subscribed to premium pay services
Other
The company had to pay
regulatory fines
10% 20% 30%
30%
BYOD & Mobile Security REPORT | Read the 2014 survey results 14
What tools are used to manage mobile devices?
43 percent of organizations use mobile device management (MDM) tools to monitor and manage
mobile devices, followed by endpoint security tools (39 percent) and Network Access Controls (NAC)
with 38 percent.
0% 20% 30% 50%10% 40%
43%
Mobile Device Management
(MDM) Tools
Endpoint Security Tools
Endpoint Malware Protections
Configuration Controls /
Lifecycle Management
Other
Network Access Controls (NAC)
39%
None 22%
30%
38%
21%
4%
BYOD & Mobile Security REPORT | Read the 2014 survey results 15
What risk control measures are in place
for mobile devices?
The most common risk control measure is password protection (67 percent), followed by remote wiping
of data (52 percent) and use of encryption (43 percent, which includes technologies such as VPN and
disk encryption). 15 percent of organizations have no specific mobile security controls in place. Only 11
percent of respondents are running attack and penetration tests on mobile devices.
0% 20% 30% 50%10% 40% 70%60%
67%Password protection
Remote wiping of data
Auditing of mobile devices
None
Attack and penetration testing
of mobile applications
Mandatory use of encryption
52%
Endpoint Integrity Checking 21%
25%
43%
15%
11%
Other 4%
BYOD & Mobile Security REPORT | Read the 2014 survey results 16
What areas are covered BY YOUR
organization’s mobile device policy?
Email accounts (52 percent), access and authentication (50 percent), and acceptable usage &
employee education (46 percent) are the top-3 mobile device policy topics for organizations.
Malware protection (35 percent) scores relatively low considering that threats can easily walk
past perimeter security by mobile devices.
0% 20% 30% 50%10% 40% 60%
52%Email accounts
Access and authentication
Acceptable usage / employee education
Malware protection
Configuration
Device wiping
50%
Stored data 38%
44%
46%
35%
30%
Application management
Guest networking
We don’t have a mobile device policy
2%
27%
26%
24%
Location tracking
SMS 12%
17%
Other
BYOD & Mobile Security REPORT | Read the 2014 survey results 17
What are the key capabilities required
for mobile device management?
The most required MDM features include logging, monitoring and reporting (72 percent).
0% 20% 30% 50%10% 40% 70%60% 80%
72%Logging, monitoring
and reporting
Centralized functionality
Malware protection
Endpoint Integrity Checking
Role-based access rules
Ease of deployment
67%
Configuration controls 56%
60%
65%
52%
51%
Flexible configuration to support
different requirements and parameters
Harmonization across mobile
platform types
Integration with other Endpoint
Management Systems
3%
46%
44%
37%
Other
BYOD & Mobile Security REPORT | Read the 2014 survey results 18
What are your most important MEASURES
of BYOD success?
Employee productivity (61 percent) is the single most important measure of BYOD, which is aligned
with ‘increasing employee productivity’ receiving 54 percent when we asked about the main drivers
for BYOD. Improving security of the BYOD initiative ranks second with 52 percent.
0% 20% 30% 50%10% 40% 70%60%
61%Improving employee productivity
Improving security
Increasing usability
Increasing technology options
Accelerating innovation
Reducing cost
52%
Simplifying device
management 39%
41%
44%
26%
21%
Other 3%
BYOD & Mobile Security REPORT | Read the 2014 survey results 19
What stage of BYOD adoption have you reached?
While 20 percent of organizations are working on the policies, processes and infrastructure for BYOD,
21 percent have fully implemented BYOD. 26 percent of survey participants are considering BYOD but
have not adopted it yet.
0% 20% 30%10%
26%Not yet adopted, but considering
BYOD already fully implemented
Currently evaluating the cost /
benefits of BYOD adoption
Considering BYOD adoption within a year
Other
Currently implementing the policies,
procedures and infrastructure for BYOD
21%
Not yet adopted, and no plans 13%
15%
20%
12%
BYOD was tried but abandoned
BYOD will not be permitted 3%
3%
2%
BYOD & Mobile Security REPORT | Read the 2014 survey results 20
How ready are organizations for BYOD?
While we still have some way to go toward broad BYOD adoption, organizations are somewhat
better prepared for BYOD than a year ago. This year, 40 percent of respondents rank their
readiness at 60 percent or higher compared to 34 percent last year.
0 10 20 30 40 50 60 70 80 90 100
2013
0%
2%
4%
6%
8%
10%
12%
14%
Readiness in %
Responses in %
2014
BYOD & Mobile Security REPORT | Read the 2014 survey results 21
How are BYOD budgets changing
over the next 12 months?
For 25 percent of organizations, BYOD budgets will increase while budgets will remain flat for
33 percent. Only 6% anticipate budget decreases.
37% | Not sure
33% | BYOD budget will stay flat
25% | BYOD budget will increase
Budgets will increase or stay flat
6% | BYOD budget will decline
33%
25%
58%
BYOD & Mobile Security REPORT | Read the 2014 survey results 22
This survey was conducted from April through June 2014. We collected 1,122 responses from information
security professionals across the world – here is a detailed breakdown of the demographics.
Software & Internet
0% 5% 10% 15% 20%
Financial Services
Business Services
Government
Telecommunications
Computers & Electronics
Healthcare, Pharmaceuticals
& Biotech
Education
Manufacturing
Energy & Utilities
Other
INDUSTRY
Consultant
Director
Owner / CEO / President
CTO, CIO, CMO,
CFO, COO
Vice President
SENIORITY
0% 5% 10% 15% 20% 25%
Specialist
Manager
Other
SIZE (Number of Employees)
20% | 10-99
12% | Fewer than 10
27% | 100-999
21% | 1,000-10,000
20% | 10,000+
Sales
Operations
Engineering
Product Management
HR
DEPARTMENT
0% 40%30%20%10%
IT
IT-Security
Marketing
Finance
Legal
Other
Demographics & Methodology

More Related Content

Viewers also liked

Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesCisco Canada
 
Zika Virus: An Emerging Arboviral Threat of 2016
Zika Virus: An Emerging Arboviral Threat of 2016Zika Virus: An Emerging Arboviral Threat of 2016
Zika Virus: An Emerging Arboviral Threat of 2016Ruchi Pancholy, REHS
 
Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)Rui Miguel Feio
 
BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearSunnyhillsSchool
 
The New Threat on Campus: Ransomware Locks Down Education
The New Threat on Campus: Ransomware Locks Down EducationThe New Threat on Campus: Ransomware Locks Down Education
The New Threat on Campus: Ransomware Locks Down EducationCode42
 
10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD StrategySirius
 
Protecting Against Ransomware
Protecting Against RansomwareProtecting Against Ransomware
Protecting Against RansomwareSymantec
 

Viewers also liked (9)

Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
Zika Virus: An Emerging Arboviral Threat of 2016
Zika Virus: An Emerging Arboviral Threat of 2016Zika Virus: An Emerging Arboviral Threat of 2016
Zika Virus: An Emerging Arboviral Threat of 2016
 
Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)Tackling the cyber security threat (2016 - v1.0)
Tackling the cyber security threat (2016 - v1.0)
 
BYOD Presentation for 2015 Year
BYOD Presentation for 2015 YearBYOD Presentation for 2015 Year
BYOD Presentation for 2015 Year
 
Outside the Office: Mobile Security
Outside the Office: Mobile SecurityOutside the Office: Mobile Security
Outside the Office: Mobile Security
 
The New Threat on Campus: Ransomware Locks Down Education
The New Threat on Campus: Ransomware Locks Down EducationThe New Threat on Campus: Ransomware Locks Down Education
The New Threat on Campus: Ransomware Locks Down Education
 
10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy10 Steps to a Successful BYOD Strategy
10 Steps to a Successful BYOD Strategy
 
Protecting Against Ransomware
Protecting Against RansomwareProtecting Against Ransomware
Protecting Against Ransomware
 
Mobile Security
Mobile SecurityMobile Security
Mobile Security
 

Recently uploaded

(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 

Recently uploaded (20)

(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 

BYOD & Mobile Security Report

  • 2. BYOD & Mobile Security REPORT | Read the 2014 survey results 2 We would like to thank our sponsors for supporting the BYOD & Mobile Security Report. Lumension | www.lumension.com Lumension Security, Inc., a global leader in endpoint management and security, develops security software solutions that help businesses protect vital information and manage critical endpoint risk. Lumension delivers the award-winning Lumension® Endpoint Management and Security Suite with Vulnerability Management, Endpoint Protection, Data Protection, and Reporting and Compliance. Vectra Networks | www.vectranetworks.com Vectra Networks is the leader of real-time detection of cyber attacks in progress. The Vectra X-series breach detection platform continuously monitors network traffic to automatically detect any phase of an ongoing cyber attack. The platform provides visually intuitive reports of hosts under attack and context about what the attacker is doing. Vectra automatically prioritizes attacks that pose the greatest business risk, enabling organizations to quickly make decisions on where to focus their time and resources. Vectra Networks’ investors include Khosla Ventures, IA Ventures and AME Cloud Ventures. The company’s headquarters are in San Jose, Calif. Visit www.vectranetworks.com for more information. ZixCorp | www.zixcorp.com ZixCorp offers industry-leading email encryption, a unique email DLP solution and an innovative email BYOD solution to meet your company’s data protection and compliance needs. ZixCorp is trusted by the nation’s most influential institutions in healthcare, finance and government for easy to use secure email solutions. IBM | www.ibm.com/security IBM’s security portfolio provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. IBM operates one of the world’s broadest security research and development, and delivery organizations. IBM monitors 15 billion security events per day in more than 130 countries and holds more than 3,000 security patents. For more information, please visit www.ibm.com/security, follow @IBMSecurity on Twitter or visit the IBM Security Intelligence blog. Sponsors
  • 3. BYOD & Mobile Security REPORT | Read the 2014 survey results 3 Our second annual edition of the BYOD & Mobile Security Report explores the state and challenges of securing BYOD and mobility in 2014. The results are in. We received over 1,100 responses and gained new insights into the state of BYOD and mobile security practices in 2014 - all reviewed in detail on the following pages. Thanks to everyone who participated in this survey. We hope you will enjoy this report. Holger Schulze Holger Schulze Group Founder Information Security Community on LinkedIn Welcome to the 2014 edition of the BYOD & Mobile Security Report. INTRODUCTION Email: hhschulze@gmail.com Group Partner Information Security
  • 4. BYOD & Mobile Security REPORT | Read the 2014 survey results 4 The key drivers for BYOD are about keeping employees mobile (57 percent), satisfied (56 percent) and productive (54 percent). The biggest BYOD security concerns are loss of company or client data (67 percent) and unauthorized access to company data and systems (57 percent). Additional IT resources to manage security incidents (30 percent) are by far the biggest negative impact of mobile security threats. Smartphones (87 percent) are the dominant form factor among supported mobile devices, followed by laptops (79 percent) and tablets (68 percent). The most common risk control measure is password protection (67 percent), followed by remote wiping of data (52 percent) and use of encryption (43 percent). The 5 Major Trends in BYOD & Mobile Security SURVEY HIGHLIGHTS 1 2 3 4 5
  • 5. BYOD & Mobile Security REPORT | Read the 2014 survey results 5 For 31 percent of organizations, BYOD is still under evaluation, followed by 26 percent of organizations with privately owned devices in limited use, and 24 percent with widespread use of privately-owned devices. Company-owned devices are widely used by 40 percent of organizations. 21 percent admit to having unsupported personal mobile devices in their organization. What is the overall state of BYOD adoption? 0% 20% 30% 50%10% 40% 40%Company-owned devices are widely used BYOD is under evaluation Privately-owned devices are widely in use and supported through a BYOD policy There are currently no plans to use private devices within the next 12 months We plan to allow private devices within the next 12 months Privately-owned devices are in very limited use 31% Privately-owned devices are widely in use, but not supported by the organization 21% 24% 26% 11% 7% Other 3%
  • 6. BYOD & Mobile Security REPORT | Read the 2014 survey results 6 What mobile form factors do you support? Smartphones (87 percent) are the dominant form factor among supported mobile devices, followed by laptops (79 percent) and tablets (68 percent). 87% 0 20 40 60 80 100 68% 5% 79% Smartphone Laptop Tablet Other/None
  • 7. BYOD & Mobile Security REPORT | Read the 2014 survey results 7 What mobile platforms DO YOU SUPPORT? Among all mobile devices considered for BYOD (including smartphones, tablets and laptops), Apple’s iOS is still the dominant mobile platform with 76 percent. RIM (40 percent) declined in popularity compared to last year while Android (69 percent) and Windows (66 percent) are gaining popularity. 0% 20% 30% 50% 2014 2013 10% 40% 60% 70% 80% 76%iOS / Apple Android / Google RIM / Blackberry Other Windows / Microsoft 69% None 40% 66% 3% 3% 2% 6% 48% 51% 61% 72%
  • 8. BYOD & Mobile Security REPORT | Read the 2014 survey results 8 For what user groups is BYOD enabled? Employees are the primary group of BYOD users (75 percent). The rise in extending BYOD to partners, customers and suppliers causes a continued dissolution of the traditional security perimeter and drives the need for new security strategies and architectures. 0% 20% 30% 50%10% 40% 60% 70% 80% 75%Employees Contractors Partners Suppliers Other We don't enable BYOD 21% Customers 14% 16% 20% 10% 2%
  • 9. BYOD & Mobile Security REPORT | Read the 2014 survey results 9 What are the most popular business Email, calendar and contact management are the most popular mobile apps (86 percent). The applications designed to boost productivity are the very same applications that can increase the risk of data breaches, intrusions or malware incidents. Finding the right balance between productivity and security will be critical to the success of BYOD initiatives. apps on BYOD devices? 0% 20% 30% 50%10% 40% 70%60% 80% 90% 86%Email / Calendar / Contacts Document access / editing Access to company built applications Access to SaaS apps such as Salesforce Virtual Desktop Access to Sharepoint / Intranet 45% File sharing 34% 34% 41% 26% 22% Cloud Backup or storage Video conferencing Other 2% 21% 19%
  • 10. BYOD & Mobile Security REPORT | Read the 2014 survey results 10 What are the main drivers and The key drivers for BYOD are about keeping employees mobile (57 percent), satisfied (56 percent) and productive (54 percent). Reducing cost for mobile devices (36 percent) and support cost (26 percent) is important but secondary to employee-related benefits. benefits of BYOD? 0% 20% 30% 50%10% 40% 60% 57%Improved employee mobility Greater employee satisfaction Reduced device / endpoint hardware costs Reduced security risk Other Increased employee productivity 56% Reduced operational support costs 26% 36% 54% 19% 3%
  • 11. BYOD & Mobile Security REPORT | Read the 2014 survey results 11 What are your biggest BYOD security concerns? While security technologies are maturing, BYOD security concerns remain. Loss of company or client data (67 percent), unauthorized access to company data and systems (57 percent) and fear of downloading content or apps with security exploits (47 percent) top the list. 0% 10% Loss of company or client data Unauthorized access to company data and systems Malware infections Inability to dictate endpoint security Ensuring security software is up-to-date (e.g. anti-virus) Users download apps or content with embedded security exploits 57% 47% 45% 41% 37% 37% 36% 28% 23% 5% Lost or stolen devices Device management Compliance with industry regulations Support & maintenance Other / None 20% 30% 40% 50% 60% 70% 67%
  • 12. BYOD & Mobile Security REPORT | Read the 2014 survey results 12 What type of sensitive data and intellectual property are you most concerned about? A majority of organizations are most concerned about protecting business data (74 percent), followed by customer and employee data (69 percent). 0% 20% 30% 50%10% 40% 70%60% 80% 74%Business data (e.g., database, apps) Customer or employee data Emails Images or multimedia Text messages Documents 69% Contacts 29% 62% 66% 13% 11% Voice conversations Other 2% 9%
  • 13. BYOD & Mobile Security REPORT | Read the 2014 survey results 13 What negative impact did mobile security threats have on your organization? Additional IT resources to manage security incidents (30 percent) are by far the biggest negative impact of mobile security threats. 0% Additional IT resources needed to manage mobile security Don't know Corporate data loss or theft Disrupted business activities Cost of cleaning up malware infections None 27% 23% 16% 14% 12% 12% 11% 5% 3% 2% Increased helpdesk time to repair damage Reduced employee productivity Increased cost due to devices subscribed to premium pay services Other The company had to pay regulatory fines 10% 20% 30% 30%
  • 14. BYOD & Mobile Security REPORT | Read the 2014 survey results 14 What tools are used to manage mobile devices? 43 percent of organizations use mobile device management (MDM) tools to monitor and manage mobile devices, followed by endpoint security tools (39 percent) and Network Access Controls (NAC) with 38 percent. 0% 20% 30% 50%10% 40% 43% Mobile Device Management (MDM) Tools Endpoint Security Tools Endpoint Malware Protections Configuration Controls / Lifecycle Management Other Network Access Controls (NAC) 39% None 22% 30% 38% 21% 4%
  • 15. BYOD & Mobile Security REPORT | Read the 2014 survey results 15 What risk control measures are in place for mobile devices? The most common risk control measure is password protection (67 percent), followed by remote wiping of data (52 percent) and use of encryption (43 percent, which includes technologies such as VPN and disk encryption). 15 percent of organizations have no specific mobile security controls in place. Only 11 percent of respondents are running attack and penetration tests on mobile devices. 0% 20% 30% 50%10% 40% 70%60% 67%Password protection Remote wiping of data Auditing of mobile devices None Attack and penetration testing of mobile applications Mandatory use of encryption 52% Endpoint Integrity Checking 21% 25% 43% 15% 11% Other 4%
  • 16. BYOD & Mobile Security REPORT | Read the 2014 survey results 16 What areas are covered BY YOUR organization’s mobile device policy? Email accounts (52 percent), access and authentication (50 percent), and acceptable usage & employee education (46 percent) are the top-3 mobile device policy topics for organizations. Malware protection (35 percent) scores relatively low considering that threats can easily walk past perimeter security by mobile devices. 0% 20% 30% 50%10% 40% 60% 52%Email accounts Access and authentication Acceptable usage / employee education Malware protection Configuration Device wiping 50% Stored data 38% 44% 46% 35% 30% Application management Guest networking We don’t have a mobile device policy 2% 27% 26% 24% Location tracking SMS 12% 17% Other
  • 17. BYOD & Mobile Security REPORT | Read the 2014 survey results 17 What are the key capabilities required for mobile device management? The most required MDM features include logging, monitoring and reporting (72 percent). 0% 20% 30% 50%10% 40% 70%60% 80% 72%Logging, monitoring and reporting Centralized functionality Malware protection Endpoint Integrity Checking Role-based access rules Ease of deployment 67% Configuration controls 56% 60% 65% 52% 51% Flexible configuration to support different requirements and parameters Harmonization across mobile platform types Integration with other Endpoint Management Systems 3% 46% 44% 37% Other
  • 18. BYOD & Mobile Security REPORT | Read the 2014 survey results 18 What are your most important MEASURES of BYOD success? Employee productivity (61 percent) is the single most important measure of BYOD, which is aligned with ‘increasing employee productivity’ receiving 54 percent when we asked about the main drivers for BYOD. Improving security of the BYOD initiative ranks second with 52 percent. 0% 20% 30% 50%10% 40% 70%60% 61%Improving employee productivity Improving security Increasing usability Increasing technology options Accelerating innovation Reducing cost 52% Simplifying device management 39% 41% 44% 26% 21% Other 3%
  • 19. BYOD & Mobile Security REPORT | Read the 2014 survey results 19 What stage of BYOD adoption have you reached? While 20 percent of organizations are working on the policies, processes and infrastructure for BYOD, 21 percent have fully implemented BYOD. 26 percent of survey participants are considering BYOD but have not adopted it yet. 0% 20% 30%10% 26%Not yet adopted, but considering BYOD already fully implemented Currently evaluating the cost / benefits of BYOD adoption Considering BYOD adoption within a year Other Currently implementing the policies, procedures and infrastructure for BYOD 21% Not yet adopted, and no plans 13% 15% 20% 12% BYOD was tried but abandoned BYOD will not be permitted 3% 3% 2%
  • 20. BYOD & Mobile Security REPORT | Read the 2014 survey results 20 How ready are organizations for BYOD? While we still have some way to go toward broad BYOD adoption, organizations are somewhat better prepared for BYOD than a year ago. This year, 40 percent of respondents rank their readiness at 60 percent or higher compared to 34 percent last year. 0 10 20 30 40 50 60 70 80 90 100 2013 0% 2% 4% 6% 8% 10% 12% 14% Readiness in % Responses in % 2014
  • 21. BYOD & Mobile Security REPORT | Read the 2014 survey results 21 How are BYOD budgets changing over the next 12 months? For 25 percent of organizations, BYOD budgets will increase while budgets will remain flat for 33 percent. Only 6% anticipate budget decreases. 37% | Not sure 33% | BYOD budget will stay flat 25% | BYOD budget will increase Budgets will increase or stay flat 6% | BYOD budget will decline 33% 25% 58%
  • 22. BYOD & Mobile Security REPORT | Read the 2014 survey results 22 This survey was conducted from April through June 2014. We collected 1,122 responses from information security professionals across the world – here is a detailed breakdown of the demographics. Software & Internet 0% 5% 10% 15% 20% Financial Services Business Services Government Telecommunications Computers & Electronics Healthcare, Pharmaceuticals & Biotech Education Manufacturing Energy & Utilities Other INDUSTRY Consultant Director Owner / CEO / President CTO, CIO, CMO, CFO, COO Vice President SENIORITY 0% 5% 10% 15% 20% 25% Specialist Manager Other SIZE (Number of Employees) 20% | 10-99 12% | Fewer than 10 27% | 100-999 21% | 1,000-10,000 20% | 10,000+ Sales Operations Engineering Product Management HR DEPARTMENT 0% 40%30%20%10% IT IT-Security Marketing Finance Legal Other Demographics & Methodology