Mobile Security Survey 2010
The full report is an 80 page+ analyst report that explores all of the data that has been derived from the 2010 mSecurity survey. It includes quantitative data, analysis, industry news, opinion and recommendations and offers real insight for market intelligence, product marketing and private equity companies that are interested in this emerging area of information security.
2010 was an extraordinary year for mobile. Smartphones and tablet computers are having a transformational effect on the way that an organisation does business and manages information. There is a big question over whether information security professionals can keep up with the pace of change currently seen with smart mobile devices (SMD) and can manage the risks associated with them.
The Goode Intelligence mSecurity Survey 2010 Report provides a snapshot of how an organisation views mobile security (mSecurity) and asks key questions to information security professionals and IT managers around the world. Question topics include:
The mSecurity incidents that have been reported within an organisation, including malware, voice interception, data loss and theft
This vendor-independent survey also examines how smartphones like the iPhone and Google Android phone and tablet computers, such as the iPad and the Samsung Galaxy Tab, are altering the way that security professionals deal with enterprise security.
2010 was an extraordinary year for mobile. Smartphones and tablet computers are having a transformational effect on the way that an organisation does business and manages information. There is a big question over whether information security professionals can keep up with the pace of change currently seen with smart mobile devices (SMD) and can manage the risks associated with them.
The Goode Intelligence mSecurity Survey 2010 Report provides a snapshot of how an organisation views mobile security (mSecurity) and asks key questions to information security professionals and IT managers around the world. Question topics include:
- How organisations are tackling the security problems posed by smart mobile devices
- Current adoption rates for mSecurity products and services; who is using what?
- Planned adoption rates for mSecurity products and services; if not currently being used when do they plan to deploy?
- How information security professionals rank the security of Smartphones
- What mobile platforms are being adopted and is the Apple iPad being deployed within the enterprise?
The mSecurity incidents that have been reported within an organisation, including malware, voice interception, data loss and theft
This vendor-independent survey also examines how smartphones like the iPhone and Google Android phone and tablet computers, such as the iPad and the Samsung Galaxy Tab, are altering the way that security professionals deal with enterprise security.
Methodology
Definition
Executive Summary
1. WHO TOOK PART
Sector
Regions
Role
Organisation Size
1. MSECURITY POLICY AND REGULATION
General Information Security Policy and mSecurity Policy
Information Security Standards and Frameworks
mSecurity Regulation
Acceptable Use Policy (AUP)
Summary
2. MSECURITY AWARENESS AND CONCERN
mSecurity Awareness
Information Security Community
End-user
mSecurity Concern
Summary
3. MSECURITY EDUCATION
Opportunity for Mobile Network Operators
4. MSECURITY STRATEGY
5. MSECURITY TRENDS
Procurement – Who is responsible for purchasing smart mobile devices?
Management and Support
Resourcing
Smartphone Adoption
Tablet Adoption
Security Ranking of Mobile Platforms
Summary
Detail
Consumerisation
Summary
6. SMART MOBILE DEVICES AND NETWORK ACCESS
Local Network Access
Remote Network Access
Smartphone Virtual Private Network (VPN) Usage
Summary
7. SMART MOBILE DEVICES AND DATA
Data Storage
Company-owned devices
Personally-owned devices
Data Encryption
Company-owned devices
Personally-owned devices
Smartphone encryption products and services
Company-owned devices
Security threats from unauthorised loss of information from smartphones
Summary
Goode Intelligence threat rating
Current (2010) threat rating
Short-term future (2010-2012) threat rating
8. SMART MOBILE DEVICES AND VOICE
Summary
9. MOBILE (SECURITY) DEVICE MANAGEMENT (MDM/SDM)
Summary
10. THE MOBILE PHONE AS AN AUTHENTICATION DEVICE
Summary
11. MOBILE MALWARE (MM)
Mobile Anti-Virus Products and Services Adoption
Mobile Malware Incidents
Mobile Malware Threat Perception
Goode Intelligence threat rating
Current (2010) threat rating
Short-term future (2010-2012) threat rating
Summary
12. MOBILE DEVICE ANTI-THEFT PRODUCTS AND SERVICES
Summary
13. SUMMARY AND OUTLOOK
Goode Intelligence mSecurity Report Series
mSecurity Series: The Mobile Phone As An Authentication Device - Analysis and Forecasts 2010-2014. The next generation for authentication and authorisation
mSecurity Series: Smartphone Security Products and Services – Analysis and Forecasts 2011-2015
mSecurity Series: Mobile Phone Biometric Security Products and Services – Analysis and Forecasts 2011-2015
About Goode Intelligence
Definition
Executive Summary
1. WHO TOOK PART
Sector
Regions
Role
Organisation Size
1. MSECURITY POLICY AND REGULATION
General Information Security Policy and mSecurity Policy
Information Security Standards and Frameworks
mSecurity Regulation
Acceptable Use Policy (AUP)
Summary
2. MSECURITY AWARENESS AND CONCERN
mSecurity Awareness
Information Security Community
End-user
mSecurity Concern
Summary
3. MSECURITY EDUCATION
Opportunity for Mobile Network Operators
4. MSECURITY STRATEGY
5. MSECURITY TRENDS
Procurement – Who is responsible for purchasing smart mobile devices?
Management and Support
Resourcing
Smartphone Adoption
Tablet Adoption
Security Ranking of Mobile Platforms
Summary
Detail
Consumerisation
Summary
6. SMART MOBILE DEVICES AND NETWORK ACCESS
Local Network Access
Remote Network Access
Smartphone Virtual Private Network (VPN) Usage
Summary
7. SMART MOBILE DEVICES AND DATA
Data Storage
Company-owned devices
Personally-owned devices
Data Encryption
Company-owned devices
Personally-owned devices
Smartphone encryption products and services
Company-owned devices
Security threats from unauthorised loss of information from smartphones
Summary
Goode Intelligence threat rating
Current (2010) threat rating
Short-term future (2010-2012) threat rating
8. SMART MOBILE DEVICES AND VOICE
Summary
9. MOBILE (SECURITY) DEVICE MANAGEMENT (MDM/SDM)
Summary
10. THE MOBILE PHONE AS AN AUTHENTICATION DEVICE
Summary
11. MOBILE MALWARE (MM)
Mobile Anti-Virus Products and Services Adoption
Mobile Malware Incidents
Mobile Malware Threat Perception
Goode Intelligence threat rating
Current (2010) threat rating
Short-term future (2010-2012) threat rating
Summary
12. MOBILE DEVICE ANTI-THEFT PRODUCTS AND SERVICES
Summary
13. SUMMARY AND OUTLOOK
Goode Intelligence mSecurity Report Series
mSecurity Series: The Mobile Phone As An Authentication Device - Analysis and Forecasts 2010-2014. The next generation for authentication and authorisation
mSecurity Series: Smartphone Security Products and Services – Analysis and Forecasts 2011-2015
mSecurity Series: Mobile Phone Biometric Security Products and Services – Analysis and Forecasts 2011-2015
About Goode Intelligence