Survey Results: The consumerization of it from the end user’s perspective
Upcoming SlideShare
Loading in...5
×
 

Like this? Share it with your network

Share

Survey Results: The consumerization of it from the end user’s perspective

on

  • 1,893 views

More than ever, end users rely on smartphones to keep them connected both personally and professionally. As a result, enterprises now must support a wide variety of both enterprise- and ...

More than ever, end users rely on smartphones to keep them connected both personally and professionally. As a result, enterprises now must support a wide variety of both enterprise- and employee-liable devices. Symantec recently conducted a small survey to learn more about end users’ experiences with and perspectives on this rapidly growing trend.

Statistics

Views

Total Views
1,893
Views on SlideShare
1,863
Embed Views
30

Actions

Likes
1
Downloads
16
Comments
0

2 Embeds 30

http://paper.li 27
http://twitter.com 3

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Survey Results: The consumerization of it from the end user’s perspective Presentation Transcript

  • 1. Survey Results:The Consumerization of ITfrom the End User’s Perspective
  • 2. Methodology• Survey conducted via MarketTools, Inc.• 154 respondents• Respondents recruited through social media channels• Only respondents using a smartphone in connection with employment counted 2
  • 3. Key Findings• End users don’t comprehend the security risks• The consumerization of IT is already a reality for most organizations• Most organizations not effectively communicating policies and/or best practices• Policies and/or best practices primarily deal with the loss or theft of devices, with malware still taking a backseat 3
  • 4. Key Findings• Employees are using smartphones to access sensitive and confidential information• End users don’t fully realize the potentially sensitive nature of the information stored on smartphones• Smartphones rank high on end users’ must-have technology lists• Despite being tech savvy smartphone users, some people just shouldn’t be parents 4
  • 5. End users realize the productivity and satisfactionbenefits of allowing employees to use the smartphonesof their choice for work, but don’t fully comprehendthe extent of the security challenges this creates.40% 38% 60%35% 33% 48% 50%30% 37%25% 40%20% 18% 30%15% 20%10% 5% 6% 7% 10% 6% 5% 1% 0% 0% Significantly Somewhat No impact Somewhat Significantly Significantly Somewhat No impact Somewhat Significantly decreases decreases on increases increases decreases decreases on increases increases productivity productivity productivity productivity productivity satisfaction satisfaction satisfaction satisfaction satisfaction 60% 52% 50% 40% 30% 23% 20% 16% 10% 4% 5% 0% Significantly Somewhat No impact Somewhat Significantly decreases decreases on overall increases increases overall overall security overall overall security security security security 5
  • 6. The consumerization of IT has already become a realityfor most organizations. Does your company allow employees to use the smartphones of their choice for work-related activities? No 12% Yes, but only within a set list of smartphone options 25% Yes 63% How did you obtain your work-related smartphone? I purchased it with my own My employer provided it to funds me 43% 44% My employer provided me with a stipend and I purchased it 14% 6
  • 7. Despite most organizations allowing employees to usetheir work-related smartphones for personal use, theyare still struggling to effectively communicate mobiledevice policies and/or best practices. Does your company allow employees to use their work-related smartphones for personal use? No 9% Yes 91%Has your employer communicated any policies and/or best practices to you regarding the security of your work- related smartphone? No 49% Yes 51% 7
  • 8. The mobile device security policies and/or bestpractices that are being communicated primarily dealwith the loss or theft of devices, with malicious appsstill taking a backseat. Which of the following security-related policies and/or best practices has your employer communicated to you regarding your work-related smartphone? (Please select all that apply) 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Guidelines for password protecting access to my smartphone 88% Guidelines for downloading apps to my smartphone 42% Guidelines for using security software (i.e. antivirus, remote device lock, remote device wipe) on my smartphone 62% Guidelines for which smartphones are allowed to connect to company resources based on platform (i.e. BlackBerry, Android, iOS, 65% Windows) 8
  • 9. Employees are using smartphones to access sensitiveand confidential information, and while organizationsare improving in their efforts to ensure that thesedevices are secure and properly managed, more needsto be done. Do you use your work-related smartphone to access information that could be considered sensitive or confidential? No 27% Yes 73% Are you aware of any mobile device security and/or management software or tools your company uses in connection with your work-related smartphone? No 42% Yes 58% 9
  • 10. Employees are using smartphones to access sensitiveand confidential information, and while organizationsare improving in their efforts to ensure that thesedevices are secure and properly managed, more needsto be done. What types of information do you access on your phone that could be considered sensitive or confidential? (Please select all that apply) 0% 10% 20% 30% 40% 50% 60% 70% 80% Financial data 40% Employee records 22% Personally identifiable information 67% Competitive/proprietary information 73% 10
  • 11. End users don’t fully realize the potentially sensitive nature of the information stored on smartphones. Please rank the following items based on the emotional distress each one would cause you if lost or stolen, with 1 being the item that would cause the greatest emotional distress and 4 being the item that would cause the least emotional distress.100% 13% 11%90% 21%80% 20% 54%70% 35% 27%60% 17% 450% 3 240% 24% 18% 1 39%30% 52%20% 20% 27%10% 13% 8% 0% Laptop Smartphone Wallet Car keys 11
  • 12. Smartphones rank high on end users’ must-havetechnology lists. Which of the following would you give up before giving up of your smartphone? (Please select all that apply) 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% MP3 Player 82% TV 35% DVR 49% Laptop 24% Tablet computer 43% 12
  • 13. Despite being tech savvy smartphone users, somepeople just shouldn’t be parents. Which of the following would you give up before giving up of your smartphone? (Please select all that apply) 0% 5% 10% 15% 20% 25% 30% 35% Firstborn child 1% Favorite food for a year 29% 13
  • 14. SymantecRecommendations 14
  • 15. Recommendations• Encrypt the data on mobile devices• Use security software on your smartphone• Develop and enforce strong security policies for using mobile devices• Make sure all software is up-to-date• Avoid opening unexpected text messages from unknown senders• Click with caution when engaging in mobile social networking• Users should be aware of their surroundings when accessing sensitive information• Focus on protecting information as opposed to focusing on the devices• Know what to do if a device is lost or stolen• Mobile management is key 15
  • 16. Thank you!For more information, please visit http://bit.ly/jHvrgN.Copyright © 2010 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates inthe U.S. and other countries. Other names may be trademarks of their respective owners.This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied,are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 16