SlideShare a Scribd company logo
1 of 7
Vanson Bourne, Summer 2013
Interviews with 100 IT decision-makers from organisations with more than
1,000 employees, across a range of commercial sectors in the UK
Research snapshot –
A corporate view of
Reviewing IT Security
How much are organisations spending on IT security?
Source: Vanson BourneAmount organisations are spending on security, as a percentage of their overall IT budget
On average
organisations
are spending
just 8% of
their overall IT
budget on
security
65% of
organisations
have
increased
their IT
security
spend
compared to
three years
ago…
… whilst IT
spend
has
decreased
for an
average of
7% of
organisations
But how many organisations are reviewing their IT security?
Source: Vanson Bourne
of organisations have a
formal process for reviewing
their security protocols and
security providers/partners
of organisations do not
have a formal process for
reviewing either their
security protocols or
security providers/partners
Organisations with a formal process for reviewing their security protocols and security providers/partners
Does your IT organisation have a formal process for reviewing security protocols
and security providers/partners?
Security protocols
and security
providers/partners
Neither
Security
providers/
partners only
Security
protocols only
8.3%
7.1% 7.3% 7.3%
Organisations who have a
formal process for reviewing
their security protocols and
security providers/partners
are spending more of their
IT budget on security
Source: Vanson BourneFrequency of formal review process for reviewing security protocols and security providers/partners
And how frequently is IT security being reviewed?
On average
organisations are
reviewing their security
protocols and security
providers/partners
every 7 months
One quarter of
organisations are
carrying out the review
on a quarterly basis or
more frequently
Three in ten organisations with
increased spend on IT security review
their security protocols and
providers/partners on at least a quarterly
basis. This compares to almost one in six
organisations who have not increased
their IT security spend
31%
14%
IT security
review
Increased spend on IT
security
Not increased spend on
IT security
Source: Vanson BourneOrganisations who feel that their employees regard security as the top priority when it comes to use of IT
Finally, to what extent is IT security a priority?
When it comes to IT use, less than one
quarter of organisations feel that
security is regarded by employees as the
top priority
Security protocols
and security
providers/partners
Neither
Security
providers/
partners only
Security
protocols only
31%
15% 20% 0%
Although organisations who have a
formal process for reviewing their
security protocols and security
providers/partners are most likely
to prioritise IT security, only three
in ten employees within this
category regard it as a priority
www.vansonbourne.com
Email: enquiries@vansonbourne.com
Tel: 01635 550449
Follow us on Twitter and LinkedIn
If you’d like to know more….
About our global B2B and B2C technology research services
Research snapshot –
A corporate view of
Reviewing IT Security
Vanson Bourne, Summer 2013

More Related Content

More from Vanson Bourne

Vanson Bourne Research Report: Wearable Tech
Vanson Bourne Research Report: Wearable TechVanson Bourne Research Report: Wearable Tech
Vanson Bourne Research Report: Wearable TechVanson Bourne
 
Vanson Bourne Infographic: Wearable Tech
Vanson Bourne Infographic: Wearable TechVanson Bourne Infographic: Wearable Tech
Vanson Bourne Infographic: Wearable TechVanson Bourne
 
Vanson Bourne Christmas Percents Infographic
Vanson Bourne Christmas Percents InfographicVanson Bourne Christmas Percents Infographic
Vanson Bourne Christmas Percents InfographicVanson Bourne
 
Shadow IT 2014: Webcast Slides
Shadow IT 2014: Webcast SlidesShadow IT 2014: Webcast Slides
Shadow IT 2014: Webcast SlidesVanson Bourne
 
Vanson Bourne Data Summary: Shadow IT - IT Decision-Makers
Vanson Bourne Data Summary: Shadow IT - IT Decision-MakersVanson Bourne Data Summary: Shadow IT - IT Decision-Makers
Vanson Bourne Data Summary: Shadow IT - IT Decision-MakersVanson Bourne
 
Vanson Bourne Case Study: IBM
Vanson Bourne Case Study: IBMVanson Bourne Case Study: IBM
Vanson Bourne Case Study: IBMVanson Bourne
 
Vanson Bourne Case Study: Progress Software
Vanson Bourne Case Study: Progress SoftwareVanson Bourne Case Study: Progress Software
Vanson Bourne Case Study: Progress SoftwareVanson Bourne
 
Vanson Bourne Case Study: NTT
Vanson Bourne Case Study: NTTVanson Bourne Case Study: NTT
Vanson Bourne Case Study: NTTVanson Bourne
 
Vanson Bourne Case Study: Porter Novelli
Vanson Bourne Case Study: Porter NovelliVanson Bourne Case Study: Porter Novelli
Vanson Bourne Case Study: Porter NovelliVanson Bourne
 
Vanson Bourne Infographic: Mobile Strategy
Vanson Bourne Infographic: Mobile StrategyVanson Bourne Infographic: Mobile Strategy
Vanson Bourne Infographic: Mobile StrategyVanson Bourne
 
Vanson Bourne White Paper: Market Research
Vanson Bourne White Paper: Market ResearchVanson Bourne White Paper: Market Research
Vanson Bourne White Paper: Market ResearchVanson Bourne
 
Vanson Bourne Research Insight: Tech Marketing
Vanson Bourne Research Insight: Tech MarketingVanson Bourne Research Insight: Tech Marketing
Vanson Bourne Research Insight: Tech MarketingVanson Bourne
 
Vanson Bourne Infographic: IT Security
Vanson Bourne Infographic: IT SecurityVanson Bourne Infographic: IT Security
Vanson Bourne Infographic: IT SecurityVanson Bourne
 
Vanson Bourne Infographic: Social Media 2010 v 2013
Vanson Bourne Infographic: Social Media 2010 v 2013Vanson Bourne Infographic: Social Media 2010 v 2013
Vanson Bourne Infographic: Social Media 2010 v 2013Vanson Bourne
 
Vanson Bourne Infographic: Social Media
Vanson Bourne Infographic: Social MediaVanson Bourne Infographic: Social Media
Vanson Bourne Infographic: Social MediaVanson Bourne
 
Vanson Bourne Infographic: Technology Marketing
Vanson Bourne Infographic: Technology MarketingVanson Bourne Infographic: Technology Marketing
Vanson Bourne Infographic: Technology MarketingVanson Bourne
 
Vanson Bourne Webcast: IT Security
Vanson Bourne Webcast: IT SecurityVanson Bourne Webcast: IT Security
Vanson Bourne Webcast: IT SecurityVanson Bourne
 
At a glance - A corporate view of 4G
At a glance - A corporate view of 4GAt a glance - A corporate view of 4G
At a glance - A corporate view of 4GVanson Bourne
 
Research snapshot – A corporate view of 4G
Research snapshot – A corporate view of 4GResearch snapshot – A corporate view of 4G
Research snapshot – A corporate view of 4GVanson Bourne
 
Research snapshot – A corporate view of mobile strategy
Research snapshot – A corporate view of mobile strategyResearch snapshot – A corporate view of mobile strategy
Research snapshot – A corporate view of mobile strategyVanson Bourne
 

More from Vanson Bourne (20)

Vanson Bourne Research Report: Wearable Tech
Vanson Bourne Research Report: Wearable TechVanson Bourne Research Report: Wearable Tech
Vanson Bourne Research Report: Wearable Tech
 
Vanson Bourne Infographic: Wearable Tech
Vanson Bourne Infographic: Wearable TechVanson Bourne Infographic: Wearable Tech
Vanson Bourne Infographic: Wearable Tech
 
Vanson Bourne Christmas Percents Infographic
Vanson Bourne Christmas Percents InfographicVanson Bourne Christmas Percents Infographic
Vanson Bourne Christmas Percents Infographic
 
Shadow IT 2014: Webcast Slides
Shadow IT 2014: Webcast SlidesShadow IT 2014: Webcast Slides
Shadow IT 2014: Webcast Slides
 
Vanson Bourne Data Summary: Shadow IT - IT Decision-Makers
Vanson Bourne Data Summary: Shadow IT - IT Decision-MakersVanson Bourne Data Summary: Shadow IT - IT Decision-Makers
Vanson Bourne Data Summary: Shadow IT - IT Decision-Makers
 
Vanson Bourne Case Study: IBM
Vanson Bourne Case Study: IBMVanson Bourne Case Study: IBM
Vanson Bourne Case Study: IBM
 
Vanson Bourne Case Study: Progress Software
Vanson Bourne Case Study: Progress SoftwareVanson Bourne Case Study: Progress Software
Vanson Bourne Case Study: Progress Software
 
Vanson Bourne Case Study: NTT
Vanson Bourne Case Study: NTTVanson Bourne Case Study: NTT
Vanson Bourne Case Study: NTT
 
Vanson Bourne Case Study: Porter Novelli
Vanson Bourne Case Study: Porter NovelliVanson Bourne Case Study: Porter Novelli
Vanson Bourne Case Study: Porter Novelli
 
Vanson Bourne Infographic: Mobile Strategy
Vanson Bourne Infographic: Mobile StrategyVanson Bourne Infographic: Mobile Strategy
Vanson Bourne Infographic: Mobile Strategy
 
Vanson Bourne White Paper: Market Research
Vanson Bourne White Paper: Market ResearchVanson Bourne White Paper: Market Research
Vanson Bourne White Paper: Market Research
 
Vanson Bourne Research Insight: Tech Marketing
Vanson Bourne Research Insight: Tech MarketingVanson Bourne Research Insight: Tech Marketing
Vanson Bourne Research Insight: Tech Marketing
 
Vanson Bourne Infographic: IT Security
Vanson Bourne Infographic: IT SecurityVanson Bourne Infographic: IT Security
Vanson Bourne Infographic: IT Security
 
Vanson Bourne Infographic: Social Media 2010 v 2013
Vanson Bourne Infographic: Social Media 2010 v 2013Vanson Bourne Infographic: Social Media 2010 v 2013
Vanson Bourne Infographic: Social Media 2010 v 2013
 
Vanson Bourne Infographic: Social Media
Vanson Bourne Infographic: Social MediaVanson Bourne Infographic: Social Media
Vanson Bourne Infographic: Social Media
 
Vanson Bourne Infographic: Technology Marketing
Vanson Bourne Infographic: Technology MarketingVanson Bourne Infographic: Technology Marketing
Vanson Bourne Infographic: Technology Marketing
 
Vanson Bourne Webcast: IT Security
Vanson Bourne Webcast: IT SecurityVanson Bourne Webcast: IT Security
Vanson Bourne Webcast: IT Security
 
At a glance - A corporate view of 4G
At a glance - A corporate view of 4GAt a glance - A corporate view of 4G
At a glance - A corporate view of 4G
 
Research snapshot – A corporate view of 4G
Research snapshot – A corporate view of 4GResearch snapshot – A corporate view of 4G
Research snapshot – A corporate view of 4G
 
Research snapshot – A corporate view of mobile strategy
Research snapshot – A corporate view of mobile strategyResearch snapshot – A corporate view of mobile strategy
Research snapshot – A corporate view of mobile strategy
 

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Research Snapshot - A corporate view of Reviewing IT Security

  • 1. Vanson Bourne, Summer 2013 Interviews with 100 IT decision-makers from organisations with more than 1,000 employees, across a range of commercial sectors in the UK Research snapshot – A corporate view of Reviewing IT Security
  • 2. How much are organisations spending on IT security? Source: Vanson BourneAmount organisations are spending on security, as a percentage of their overall IT budget On average organisations are spending just 8% of their overall IT budget on security 65% of organisations have increased their IT security spend compared to three years ago… … whilst IT spend has decreased for an average of 7% of organisations
  • 3. But how many organisations are reviewing their IT security? Source: Vanson Bourne of organisations have a formal process for reviewing their security protocols and security providers/partners of organisations do not have a formal process for reviewing either their security protocols or security providers/partners Organisations with a formal process for reviewing their security protocols and security providers/partners Does your IT organisation have a formal process for reviewing security protocols and security providers/partners? Security protocols and security providers/partners Neither Security providers/ partners only Security protocols only 8.3% 7.1% 7.3% 7.3% Organisations who have a formal process for reviewing their security protocols and security providers/partners are spending more of their IT budget on security
  • 4. Source: Vanson BourneFrequency of formal review process for reviewing security protocols and security providers/partners And how frequently is IT security being reviewed? On average organisations are reviewing their security protocols and security providers/partners every 7 months One quarter of organisations are carrying out the review on a quarterly basis or more frequently Three in ten organisations with increased spend on IT security review their security protocols and providers/partners on at least a quarterly basis. This compares to almost one in six organisations who have not increased their IT security spend 31% 14% IT security review Increased spend on IT security Not increased spend on IT security
  • 5. Source: Vanson BourneOrganisations who feel that their employees regard security as the top priority when it comes to use of IT Finally, to what extent is IT security a priority? When it comes to IT use, less than one quarter of organisations feel that security is regarded by employees as the top priority Security protocols and security providers/partners Neither Security providers/ partners only Security protocols only 31% 15% 20% 0% Although organisations who have a formal process for reviewing their security protocols and security providers/partners are most likely to prioritise IT security, only three in ten employees within this category regard it as a priority
  • 6. www.vansonbourne.com Email: enquiries@vansonbourne.com Tel: 01635 550449 Follow us on Twitter and LinkedIn If you’d like to know more…. About our global B2B and B2C technology research services
  • 7. Research snapshot – A corporate view of Reviewing IT Security Vanson Bourne, Summer 2013