[email protected] +44 20 8123 2220 (UK) +1 732 587 5005 (US) Contact Us | FAQ |

Mobile Security Survey 2010

February 2011 | 79 pages | ID: ME010F09221EN
Goode Intelligence

US$ 995.00

E-mail Delivery (PDF)

Download PDF Leaflet

Accepted cards
Wire Transfer
Checkout Later
Need Help? Ask a Question
The full report is an 80 page+ analyst report that explores all of the data that has been derived from the 2010 mSecurity survey. It includes quantitative data, analysis, industry news, opinion and recommendations and offers real insight for market intelligence, product marketing and private equity companies that are interested in this emerging area of information security.

2010 was an extraordinary year for mobile. Smartphones and tablet computers are having a transformational effect on the way that an organisation does business and manages information. There is a big question over whether information security professionals can keep up with the pace of change currently seen with smart mobile devices (SMD) and can manage the risks associated with them.

The Goode Intelligence mSecurity Survey 2010 Report provides a snapshot of how an organisation views mobile security (mSecurity) and asks key questions to information security professionals and IT managers around the world. Question topics include:
  • How organisations are tackling the security problems posed by smart mobile devices
  • Current adoption rates for mSecurity products and services; who is using what?
  • Planned adoption rates for mSecurity products and services; if not currently being used when do they plan to deploy?
  • How information security professionals rank the security of Smartphones
  • What mobile platforms are being adopted and is the Apple iPad being deployed within the enterprise?

The mSecurity incidents that have been reported within an organisation, including malware, voice interception, data loss and theft

This vendor-independent survey also examines how smartphones like the iPhone and Google Android phone and tablet computers, such as the iPad and the Samsung Galaxy Tab, are altering the way that security professionals deal with enterprise security.
Methodology
Definition
Executive Summary

1. WHO TOOK PART

Sector
Regions
Role
Organisation Size

1. MSECURITY POLICY AND REGULATION

General Information Security Policy and mSecurity Policy
Information Security Standards and Frameworks
mSecurity Regulation
Acceptable Use Policy (AUP)
Summary

2. MSECURITY AWARENESS AND CONCERN

mSecurity Awareness
Information Security Community
End-user
mSecurity Concern
Summary

3. MSECURITY EDUCATION

Opportunity for Mobile Network Operators

4. MSECURITY STRATEGY

5. MSECURITY TRENDS

Procurement – Who is responsible for purchasing smart mobile devices?
Management and Support
Resourcing
Smartphone Adoption
Tablet Adoption
Security Ranking of Mobile Platforms
Summary
Detail
Consumerisation
Summary

6. SMART MOBILE DEVICES AND NETWORK ACCESS

Local Network Access
Remote Network Access
Smartphone Virtual Private Network (VPN) Usage
Summary

7. SMART MOBILE DEVICES AND DATA

Data Storage
Company-owned devices
Personally-owned devices
Data Encryption
Company-owned devices
Personally-owned devices
Smartphone encryption products and services
Company-owned devices
Security threats from unauthorised loss of information from smartphones
Summary
Goode Intelligence threat rating
Current (2010) threat rating
Short-term future (2010-2012) threat rating

8. SMART MOBILE DEVICES AND VOICE

Summary

9. MOBILE (SECURITY) DEVICE MANAGEMENT (MDM/SDM)

Summary

10. THE MOBILE PHONE AS AN AUTHENTICATION DEVICE

Summary

11. MOBILE MALWARE (MM)

Mobile Anti-Virus Products and Services Adoption
Mobile Malware Incidents
Mobile Malware Threat Perception
Goode Intelligence threat rating
Current (2010) threat rating
Short-term future (2010-2012) threat rating
Summary

12. MOBILE DEVICE ANTI-THEFT PRODUCTS AND SERVICES

Summary

13. SUMMARY AND OUTLOOK

Goode Intelligence mSecurity Report Series
mSecurity Series: The Mobile Phone As An Authentication Device - Analysis and Forecasts 2010-2014. The next generation for authentication and authorisation
mSecurity Series: Smartphone Security Products and Services – Analysis and Forecasts 2011-2015
mSecurity Series: Mobile Phone Biometric Security Products and Services – Analysis and Forecasts 2011-2015
About Goode Intelligence


More Publications