[email protected] +44 20 8123 2220 (UK) +1 732 587 5005 (US) Contact Us | FAQ |

GI Mobile Security Survey Report 2009-2011 Data Version

April 2012 | 23 pages | ID: GA05A4EB7D2EN
Goode Intelligence

US$ 400.00

E-mail Delivery (PDF)

Download PDF Leaflet

Accepted cards
Wire Transfer
Checkout Later
Need Help? Ask a Question
The mSecurity Survey 2011 Report data only edition includes all of the survey data that Goode Intelligence has captured since the first edition of the survey report was published in 2009.

It is a valuable source of prime research data gathered by Goode Intelligence over a three-year period from 2009 until 2011.

Find out how CISOs, IT managers, CISOs and CEOs around the world view mobile security by analysing primary source data gathered by Goode Intelligence.

It is a rich source of mobile security data that is vital for market intelligence and product marketing resources - an invaluable insight into the key trends that are shaping the growing mobile security industry.

Coverage

Survey topics and questions include:
  • Policy and Regulation
  • Awareness and Education
  • Procurement and Resources
  • Smartphone and Tablet adoption
  • BYOD/Consumerisation trends and personal vs. company use of phones
  • Security Ranking of major smartphone platforms
  • Smartphones and network connectivity
  • Data Loss Prevention
  • Voice Protection (encryption)
  • Mobile Device Management (MDM)
  • Mobile Malware
  • Anti-Theft solutions
  • Adoption rates for mobile-phone based authentication solutions
  • Evidence of information security incidents, e.g. mobile malware infection and unauthorised access to data stored on a smartphone

Executive Summary
mSecurity Survey Data 2009-2011
Question 1: Does your organisation have a documented security policy?
Question 2: Does your organisation have a specific documented security policy for mobile devices?
Question 3: Does your organisation refer to mobile devices within an Acceptable User Policy (AUP)?
Question 4: In your opinion, do security standards and frameworks such as ISO 27001/2, COBIT and ISF standard of good practice, adequately cover mobile?
Question 5: Is your organisation governed by any specific industry regulation?
Question 6: At what level do you perceive your current awareness of msecurity to be?
Question 7: Do you feel that the current levels of general awareness for mSecurity is adequate?
Question 8: Which of the following do you use to find information regarding mSecurity threats?
Question 9: How concerned are you about mSecurity?
Question 10: How important is mSecurity in your overall information security strategy?
Question 11: who is responsible for purchasing mobile devices in your organisations?
Question 12: who is responsible for managing and supporting company-owned mobile devices in your organisation?
Question 13: what mobile platforms are being used within your organisation?
Question 14: has your organisation adopted tablet computers that run mobile platforms?
Question 15: Mobile BYOD: Does your organisation allow staff-owned/personal mobile devices to be used for company business?
Question 16: Does your information security function have any responsibility for the purchase of company mobile devices?
Question 17: Does your organisation have resource (staff) allocated to msecurity functions?
Question 18: How many people are allocated to msecurity functions?
Question 19: What department does the msecurity resource work in?
Question 20: Do you intend to recruit for an msecurity role?
Question 21: do you allow mobile devices to connect to your local network?
Question 22: if you do not allow mobile devices to connect to a local network then why is this?
Question 23: do you allow mobile devices to connect to network remotely?
Question 24: Do you use a VPN client on the mobile device?
Question 25: if you do not allow mobile devices to connect remotely then why is this?
Question 26: do you allow your users to store company data on their company-owned mobile devices?
Question 27: if you do not allow users to store company data on their company-owned mobile devices then why is this?
Question 28: do you encrypt data on company-owned mobile devices?
Question 29: do you allow your users to store company data on their personally-owned mobile devices?
Question 30: if you do not allow users to store company data on their personally-owned mobile devices then why is this?
Question 31: do you encrypt data on personally-owned mobile devices?
Question 32: do you manage company-owned mobile devices using a mobile device management (MDM) solution?
Question 33: if you are planning to deploy an mdm solution then when do you plan to do so?
Question 34: if you answered no to deploying mdm solutions then why is this?
Question 35: Do you percieve that mobile device management within the enterprise is a problem
Question 36: does your organisation currently use mobile devices as an authentication device?
Question 37: if you are planning to deploy mobile device-based authentication then when do you plan to do so?
Question 38: if you answered no to deploying mobile device-based authentication then why is this?
Question 39: does your organisation currently use mobile endpoint anti-malware solutions?
Question 40: if you are planning to deploy mobile device anti-malware solutions then when do you plan to do so?
Question 41: if you answered no to deploying mobile device anti-malware solutions then why is this?
Question 42: does your organisation currently use data encryption solutions on companyowned mobile devices to protect information?
Question 43: is the product part of the standard mobile platform or a third-party solution?
Question 44: why are you using standard mobile platform encryption rather then using a third-party product?
Question 45: if you answered no to deploying mobile device-based data encryption solutions then why is this?
Question 46: does your organisation currently use voice encryption solutions on companyowned mobile devices?
Question 47: if you answered no to deploying mobile device-based voice encryption solutions then why is this?
Question 48: does your organisation currently use mobile device-based anti-theft solutions?
Question 49: is the product part of the standard mobile platform or a third-party solution?
Question 50: why are you using standard mobile platform anti-theft rather then using a third-party solution?
Question 51: has your organisation experienced a mobile malware incident (mobile malware infection)
Question 52: in your opinion, what is the current threat from mobile malware?
Question 53: how do you feel that the threat from mobile malware will be within the next two years?
Question 54: has your organisation experienced unauthorised loss of information from a mobile device?
Question 55: in your opinion, what is the current threat from unauthorised loss of information from a mobile device?
Question 56: how do you feel that the threat from unauthorised loss of information from a mobile device? will be within the next two years?
About Goode Intelligence


More Publications