[email protected] +44 20 8123 2220 (UK) +1 732 587 5005 (US) Contact Us | FAQ |

GI mSecurity 2011 Survey Report

April 2012 | 76 pages | ID: GF93915BCDDEN
Goode Intelligence

US$ 995.00

E-mail Delivery (PDF)

Download PDF Leaflet

Accepted cards
Wire Transfer
Checkout Later
Need Help? Ask a Question
The GI mSecurity 2011 survey report provides a detailed picture of how organisations currently view mobile security (mSecurity) and collates responses from information security professionals and IT managers across the globe regarding key mobile security themes. Question topics covered in the report include:
  • How organisations are tackling the security problems posed by smart mobile devices (SMD)
  • The impact of the BYOD trend
  • How information security professionals rank the security of smartphones
  • How prepared and equipped businesses are to deal with these unique challenges
  • The impact of mobile device management (MDM) solutions with actual adoption rates
  • The mSecurity incidents that have been reported within organisations, including malware, voice interception, data loss and theft with expert and independent analysis to determine if challenges like mobile malware is actually a real threat
Coverage

The third GI mSecurity survey report is an essential guide to mobile security trends and practices gathered from a wide variety of organisations around the world. Record numbers of participants in this survey ensure an accurate understanding of the current status of mobile security. In addition, the data from the survey provides actionable intelligence for both buyers (end-users) and suppliers of mSecurity products and services.

Report sections include:
  • Policy and Regulation
  • Awareness and Education
  • Procurement and Resources
  • Smartphone and Tablet adoption
  • BYOD/Consumerisation trends and personal vs. company use of phones
  • Security Ranking of major smartphone platforms
  • Smartphones and network connectivity
  • Data Loss Prevention
  • Voice Protection (encryption)
  • Mobile Device Management (MDM)
  • Mobile Malware
  • Anti-Theft solutions
  • Adoption rates for mobile-phone based authentication solutions
  • Evidence of information security incidents, e.g. mobile malware infection and unauthorised access to data stored on a smartphone

Executive Summary
Who Took Part
  Sector
  Regions
  Role
  Organisation Size
mSecurity Policy, Regulation and Standards
  Security Policy
  Information Security Standards and Frameworks
  mSecurity Regulation
  Acceptable Use Policy (AUP)
  Summary
mSecurity Awareness and Mobility Strategy
  mSecurity Awareness
  Mobility Strategy
  Summary
mSecurity Education
mSecurity and mobility trends
  Procurement – Who is responsible for purchasing smart mobile devices?
  Management and Support
  Smartphone Adoption
  Tablet Adoption – The rise of the tablets
  Security Ranking of Mobile Platforms
  Consumerisation
  Mobile Device Management (MDM) Adoption
  Trends Summary
Smart Mobile Devices and Network Access
  Local Network Access
  Remote Network Access
  Smartphone Virtual Private Network (VPN) Usage
  Summary
Smart Mobile Devices and Data
  Data Storage
  Company-owned devices
  Mobile BYOD - personally-owned devices
  Data Encryption
    Company-owned devices
    Mobile BYOD - personally-owned devices
  Security threats from unauthorised loss of information from smart mobile devices
  Mobile Data Loss Threat Perception
  Summary
  Goode Intelligence threat rating – data loss
    Current (2011) threat rating
    Short-term future (2011-2013) threat rating
Smart Mobile Devices and Voice
  Summary
The mobile phone as an authentication device
  Summary
Mobile Malware (MM)
  Mobile Anti-Malware Products and Services Adoption
  Mobile Malware Incidents
  Mobile Malware Threat Perception
  Summary
  Goode Intelligence threat rating
    Current (2011) threat rating
    Short-term future (2011-2013) threat rating
Mobile Device Anti-Theft Products and Services
  Summary
Summary and Outlook
  Policy, Awareness and Strategy
  Trends
    Mobile Platforms
    Consumerisation of IT (CoIT) and Bring Your Own Device (BYOD)
    Mobile Malware
  mSecurity Products and Services
    Mobile authentication products and services
    Mobile voice protection
About Goode Intelligence


More Publications