GI mSecurity 2011 Survey Report
The GI mSecurity 2011 survey report provides a detailed picture of how organisations currently view mobile security (mSecurity) and collates responses from information security professionals and IT managers across the globe regarding key mobile security themes. Question topics covered in the report include:
The third GI mSecurity survey report is an essential guide to mobile security trends and practices gathered from a wide variety of organisations around the world. Record numbers of participants in this survey ensure an accurate understanding of the current status of mobile security. In addition, the data from the survey provides actionable intelligence for both buyers (end-users) and suppliers of mSecurity products and services.
Report sections include:
- How organisations are tackling the security problems posed by smart mobile devices (SMD)
- The impact of the BYOD trend
- How information security professionals rank the security of smartphones
- How prepared and equipped businesses are to deal with these unique challenges
- The impact of mobile device management (MDM) solutions with actual adoption rates
- The mSecurity incidents that have been reported within organisations, including malware, voice interception, data loss and theft with expert and independent analysis to determine if challenges like mobile malware is actually a real threat
The third GI mSecurity survey report is an essential guide to mobile security trends and practices gathered from a wide variety of organisations around the world. Record numbers of participants in this survey ensure an accurate understanding of the current status of mobile security. In addition, the data from the survey provides actionable intelligence for both buyers (end-users) and suppliers of mSecurity products and services.
Report sections include:
- Policy and Regulation
- Awareness and Education
- Procurement and Resources
- Smartphone and Tablet adoption
- BYOD/Consumerisation trends and personal vs. company use of phones
- Security Ranking of major smartphone platforms
- Smartphones and network connectivity
- Data Loss Prevention
- Voice Protection (encryption)
- Mobile Device Management (MDM)
- Mobile Malware
- Anti-Theft solutions
- Adoption rates for mobile-phone based authentication solutions
- Evidence of information security incidents, e.g. mobile malware infection and unauthorised access to data stored on a smartphone
Executive Summary
Who Took Part
Sector
Regions
Role
Organisation Size
mSecurity Policy, Regulation and Standards
Security Policy
Information Security Standards and Frameworks
mSecurity Regulation
Acceptable Use Policy (AUP)
Summary
mSecurity Awareness and Mobility Strategy
mSecurity Awareness
Mobility Strategy
Summary
mSecurity Education
mSecurity and mobility trends
Procurement – Who is responsible for purchasing smart mobile devices?
Management and Support
Smartphone Adoption
Tablet Adoption – The rise of the tablets
Security Ranking of Mobile Platforms
Consumerisation
Mobile Device Management (MDM) Adoption
Trends Summary
Smart Mobile Devices and Network Access
Local Network Access
Remote Network Access
Smartphone Virtual Private Network (VPN) Usage
Summary
Smart Mobile Devices and Data
Data Storage
Company-owned devices
Mobile BYOD - personally-owned devices
Data Encryption
Company-owned devices
Mobile BYOD - personally-owned devices
Security threats from unauthorised loss of information from smart mobile devices
Mobile Data Loss Threat Perception
Summary
Goode Intelligence threat rating – data loss
Current (2011) threat rating
Short-term future (2011-2013) threat rating
Smart Mobile Devices and Voice
Summary
The mobile phone as an authentication device
Summary
Mobile Malware (MM)
Mobile Anti-Malware Products and Services Adoption
Mobile Malware Incidents
Mobile Malware Threat Perception
Summary
Goode Intelligence threat rating
Current (2011) threat rating
Short-term future (2011-2013) threat rating
Mobile Device Anti-Theft Products and Services
Summary
Summary and Outlook
Policy, Awareness and Strategy
Trends
Mobile Platforms
Consumerisation of IT (CoIT) and Bring Your Own Device (BYOD)
Mobile Malware
mSecurity Products and Services
Mobile authentication products and services
Mobile voice protection
About Goode Intelligence
Who Took Part
Sector
Regions
Role
Organisation Size
mSecurity Policy, Regulation and Standards
Security Policy
Information Security Standards and Frameworks
mSecurity Regulation
Acceptable Use Policy (AUP)
Summary
mSecurity Awareness and Mobility Strategy
mSecurity Awareness
Mobility Strategy
Summary
mSecurity Education
mSecurity and mobility trends
Procurement – Who is responsible for purchasing smart mobile devices?
Management and Support
Smartphone Adoption
Tablet Adoption – The rise of the tablets
Security Ranking of Mobile Platforms
Consumerisation
Mobile Device Management (MDM) Adoption
Trends Summary
Smart Mobile Devices and Network Access
Local Network Access
Remote Network Access
Smartphone Virtual Private Network (VPN) Usage
Summary
Smart Mobile Devices and Data
Data Storage
Company-owned devices
Mobile BYOD - personally-owned devices
Data Encryption
Company-owned devices
Mobile BYOD - personally-owned devices
Security threats from unauthorised loss of information from smart mobile devices
Mobile Data Loss Threat Perception
Summary
Goode Intelligence threat rating – data loss
Current (2011) threat rating
Short-term future (2011-2013) threat rating
Smart Mobile Devices and Voice
Summary
The mobile phone as an authentication device
Summary
Mobile Malware (MM)
Mobile Anti-Malware Products and Services Adoption
Mobile Malware Incidents
Mobile Malware Threat Perception
Summary
Goode Intelligence threat rating
Current (2011) threat rating
Short-term future (2011-2013) threat rating
Mobile Device Anti-Theft Products and Services
Summary
Summary and Outlook
Policy, Awareness and Strategy
Trends
Mobile Platforms
Consumerisation of IT (CoIT) and Bring Your Own Device (BYOD)
Mobile Malware
mSecurity Products and Services
Mobile authentication products and services
Mobile voice protection
About Goode Intelligence