SlideShare a Scribd company logo
1 of 16
Download to read offline
1
SMB Market Landscape Report 2010
Growth from knowledge
2
1.	 Executive Summary
2.	 Methodology
3.	 Market Overview: SMBs: a highly fragmented sector
4.	 Theme 1: SMBs ARE emerging successfully from the recent economic
downturn AND are positive about the future
5.	 Theme 2: TECHNOLOGY is critical to the business, but SMBs don’t have the
expertise to manage it
6.	 Theme 3: SMBs are ready to deploy new technologies and move into the
‘cloud’
7.	 Theme 4: SMBs are concerned about IT security but aren’t always aware of
or fully protected against the threats that exist
8.	 Theme 5: Peace of mind, performance and reassurance are top priorities
for SMBs when considering security solutions
9.	 Conclusions
Contents
1
Executive Summary
AVG recently partnered with GfK to undertake an international survey among SMBs. The results
identified that SMBs are optimistic for the future as they emerge from a difficult economic period. SMBs
are increasingly relying on technology to overcome the challenges of the recession and recognize the
importance of protecting this technology from outside threats. However many are unaware of the range
of IT security threats and require expertise to help them secure success.
Five main themes resulted from the research:
1.	 SMBs ARE emerging successfully from the recent economic downturn AND are
positive about the future
SMBs have responded to the challenge of economic recession through innovation, adopting
new technologies and working practices and ensuring their businesses are lean. More than 2 in 3
businesses are expecting to expand in the next 5 years.
2.	 TECHNOLOGY is critical to the business, but SMBs don’t have the expertise to
manage it
Over three quarters feel IT is critical to their business and more than 2 in 3 see it as key to driving
business success. However, only 39% have employees with a high level of IT competence and more
than half have no access to IT expertise.
3.	 SMBs are ready to deploy new technologies and move into the‘cloud’
Currently, 1 in 7 businesses are using hosted services, but there appears to a high potential for
further adoption, with 67% considering using cloud services in the future.
4.	 SMBs are concerned about IT security but aren’t always aware of or fully
protected against the threats that exist
77% recognise that a security breach could have a significant impact on their business and 83% feel
that having the right level of protection is critical to their business. Yet less than half have a clear
security policy in place and 1 in 7 businesses have no IT security protection.
5.	 Peace of mind, performance and reassurance are top priorities for SMBs when
considering security solutions
Universally SMBs want security solutions to deliver the right level of protection and not impact on
business performance. The vast majority of SMBs (88%) also want the reassurance of a trusted brand
to deliver this.
2
Methodology
GfK conducted a global survey of small and medium businesses (SMB), defined as companies with up to
100 employees who use at least one PC.
The Survey consisted of two phases:
Phase 1 – a detailed investigation of SMB security software purchasing attitudes and behaviours. Twenty
in-depth one-on-one interviews with SMBs in Brazil, China, Italy and US conducted end 2009.
Phase 2 – quantitative exploration of the SMB IT security software market landscape. 2000 online
interviews conducted in US and UK in spring 2010.
Individual respondents were senior business decision makers responsible for IT purchasing.
3
Market overview SMBs: A highly fragmented sector
The SMB sector is highly fragmented and dominated by single person (SOHO) and small (2-5 employee)
organisations. The SMB umbrella covers a broad spectrum of businesses with unique identities operating
in a wide range of industries.
IT spend in this sector is high, particularly in the UK where spend is higher than in the US.
Figure 1: UK and US SMB size of business (employees)
	
	
UK: Size of Business
42%
37%
13%
5%
2% 1%
1 2-5 6-10 11-25 26-50 51-100
US: Size of Business
33% 32%
19%
9%
4% 3%
1 2-5 6-10 11-25 26-50 51-100
4
The research among SMBs identified five main themes
1) SMBs ARE emerging successfully from the recent economic
downturn AND are positive about the future
SMBs have responded to the challenge of economic recession through innovation, adopting new
technologies and working practices and ensuring their businesses are lean. This includes improving
technology efficiency, migrating to digital technologies, developing e-commerce solutions and offering
new products and services to customers. Budgets are becoming more streamlined and there is a
heightened need to demonstrate greater value and a positive return on investment.
SMBs are embracing flexible working with a larger remote worker base and expansion of the role/job
function of remote employees. Employees are also increasing levels of mobility. In order to maximise
efficiencyandminimisecost,manySMBsareadoptingvirtualisationtechnologiessuchascloudcomputing
as well as investing in the latest hardware.
Those most confident of success are proud of their close working relationships with their customers which
they believe helps them to maintain a competitive advantage over larger companies.
“Anyonecansellbutnoteveryonehasthegoodwilltogotheextramile”(BrazilSMB)
“Someofourlargerclientskeepcomingbackbecausetheyliketheattentiontheyget. Theygetaverypersonalised
service”(USSMB)
Some view the recent downturn as“less of a threat”and“more of an opportunity to evaluate the direction
of the business”which typifies the positive attitude of the SMB decision maker.
“It’saslowperiodatthemoment[2009]butitgivesustimeouttothink6monthstoayearaheadandseehow
thingsaregoingtoaffectus”(USSMB)
5
As a result, the majority of SMBs now feel that they have emerged from the economic crisis in a stronger
position with more than two thirds predicting growth in the next five years. SMBs in the US are particularly
positive.
Figure 2: SMB expectations of future growth in the next five years
29% 36%
23%
67% 61%
74%
0%
20%
40%
60%
80%
100%
Total UK US
Achieved Growth
Remained a Similar Size
Downsized
6
2) IT is critical to the business, but SMBs don’t have the
expertise to manage it
Over three quarters of SMBs view IT as critical to the business and more than two thirds see it as key to
driving business success. Perhaps unsurprisingly, given their higher overall spend on IT, UK SMBs are more
likely to view technology as a strategic driver for their business than their US counterparts.
Figure 3: SMB Attitudes to technology (% agree)
Despite the importance of IT to SMBs a majority do not have employees with a high level of IT competence
or a clear IT strategy; in fact, only 13% have dedicated in-house resources and over half have no access to
IT resources whatsoever. This is consistent in both the US and UK and among all industry sectors.
Figure 4: SMB IT resources			
SMBs themselves recognise this gap in knowledge and admit
to needing expert help and support for IT decision making.
“Whenthereisnoproblemwedon’tthinkaboutit.It’sonlywhen
thereisaproblemthatpeoplewillthinkaboutit”(ChinaSMB)
“IhavelimitedexperiencesoItrustmyITconsultants,Ihavebeen
workingwiththemfor10years”(ItalianSMB)
61%
77%
0% 20% 40% 60% 80% 100%
I view IT as key to driving
business success
IT is critical to the day to day
functioning of my business
56%
13%
31%
Outsourced
In-house resources
No dedicated
resources
7
3) SMBs are ready to deploy new technologies and move into
the‘cloud’
As already noted, SMBs are generally innovative and open to change and as such, are keen to embrace and
deploy new technologies. SMBs are particularly open to using hosted services. Currently 1 in 7 are using
‘cloud’services but two thirds are considering using in the future.
A contributing factor to this demand for hosted services is that the vast majority of SMBs do not have
internal IT resources. They are therefore keen to embrace any offering which makes IT easier to manage
and use. Price is also a key consideration.
Figure 5: Hosted services
59%
53%
38%
34%
15%
Web Hosting
Email Hosting
Online Back Up
Free Services such as Google
Docs
Security Services
Type of Hosted Services Used
50%
47%
44%
36%
33%
Easier to Maintain
Price
Easier to Use
Better Support
Greater Memory Capacity
Reason for Choosing Hosted Services
8
4) SMBs are concerned about IT security but aren’t always aware
of or fully protected against the threats that exist
The vast majority of SMB decision makers want to protect their businesses effectively from security
breaches and believe that the right level of protection is critical to their business. Three quarters recognise
that a security breach could have a significant impact on their business. Despite this strong belief, less than
half have a clear security policy in place and many do not feel confident in making IT security decisions
themselves.
Figure 6: Attitudes to IT security software services
SMBs are aware of the many different ways security breaches can impact their businesses and their biggest
concern is losing access to files.
“It’snotsomuchconcernswithvirusesbutmoreaboutahackergettinginandretrievinginformationtheyweren’t
supposedtoknow”(USSMB)
83%
77%
55%
48%
Having the right level of IT
protection is critical for my
business
An IT security threat could have
a significant impact on my
business
We are confident in making IT
security services decisions in-
house without third party
influence
We have a clear IT security policy
(for our employees) within our
business
9
Figure 7: SMB security concerns
When it comes to the importance of security, many speak from experience:
“Wehadavirusbreachlastsummerthatwreakedhavoc. Itwascompletelyourfault”(ItalianSMB)
A quarter of SMBs have been subject to a security breach. Typically this is among larger organisations
with networks and dedicated IT support functions. Despite their high awareness of the potential damage
security breaches can cause, surprisingly 1 in 7 SMBs do not have any security software installed, leaving
their business open to potential attacks.
1 in 4 have experienced a security breach
		1 in 7 have no security software
63%64%
70%
77%
86%
Losing customer
information
Losing access to
software programs
Computer slowing
down
Having to replace
corrupted
hardware
computers etc.
Losing access to
files
saved on the hard
drive
10
Figure 8: Security threats SMBs are aware of
79%
70%
49%
12%
11%
Viruses
Spyware Adware / Advertising
Trojans
Internet Based Attacks
Social Engineering
Not aware of specific threats /
None
The main reasons for not using security software include it being too expensive and a lack of awareness of
the need to protect their business, which may be due to SMBs lack of IT expertise and access to resources .
SMBs are also lacking in knowledge and awareness when it comes to specific IT security threats;1 in 10
SMBs are unaware of any threat. For the remainder, awareness of threats other than Viruses and Spyware
is low.
Worryingly, only half of SMBs are concerned about internet based attacks. This is likely to have
consequences in the future as SMBs increase their reliance on the internet and cloud based services. This
lack of awareness is even more pronounced when it comes to more sophisticated forms of attack such as
Social Engineering (the manipulation of individuals into divulging confidential information).
11
5) Peace of mind, performance and reassurance are top
priorities for SMBs when considering IT security solutions
SMBs are remarkably consistent in terms of their requirements for Security solutions. They want IT
security solutions to:
99 Deliver the right level of protection
99 Not impact on business performance
99 Work in the background
“Securitymeanskeepingspamemailout,stoppingpeopledownloadingprogramsthathavevirusesinthem,
keepingournetworksafe”(USSMB)
“Securitymeansourdataisprotected”(ItalianSMB)
Figure 9: SMB priorities for security software performance (% essential/very important)
There is an expectation from almost all SMBs that a well known security software brand should be able to
meet their requirements. Consequently brand reputation carries considerable weight when it comes to
purchase decision making.
“Everybodywasrecommendingitsothat’swhyIdecidedtobuyit”(ItalianSMB)
77%
72%
70%
63%
55%
36%
Delivers a high level of
protection
Does not slow the
computer(s) down
Works in the background
Scans the computer quickly
Quick and easy to install
Is from a well known brand
12
Conclusions
ƒƒSMBs are generally very adept at adopting change into their businesses and the recent economic
difficulties have opened up opportunities for new innovation and improving business processes. Two
thirds of businesses are optimistic about experiencing growth in the next five years.
ƒƒSMBs view IT as essential but as these organisations tends to be small (with the vast majority having
less than 5 employees) many do not have clear IT strategies to help support the growth of the
organisation. The level of IT expertise is often limited so SMBs either actively seek external help or
tend to take a laissez faire attitude.
ƒƒCloud solutions therefore appear to be an attractive prospect for SMBs given that the vast majority do
not have internal IT resources and are frequently looking for IT solutions which are easier to manage
and offer high value for low cost.
ƒƒThe vast majority of SMB decision makers want to protect their businesses effectively from security
breaches. However most SMBs are unaware and consequently unprotected from the range of internet
based threats that exist. Furthermore, a small proportion of SMBs have no protection whatsoever.
ƒƒSMBs desire a trusted IT security solutions brand. This needs to protect their business and run in the
background and not slow business systems while preventing security breaches.
13
About GfK NOP
GfK NOP Ltd is part of the GfK Group and a leading market research agency in the UK and internationally.
It is a renowned supplier of market information and insight, offering sector specialists and best-in-field
research for qualitative, quantitative, ethnographic, omnibus and online research services.
About AVG
AVG Technologies is a global security software maker protecting more than 110 million consumers and
small businesses in 167 countries from the ever-growing incidence of Web threats, viruses, spam, cyber-
scams and hackers on the Internet. AVG has nearly two decades of experience in combating cyber crime
and one of the most advanced laboratories for detecting, pre-empting and combating Web-borne threats
fromaroundtheworld.AVGhasnearly6,000resellers,partnersanddistributorsgloballyincludingAmazon.
com, CNET, Cisco, Ingram Micro, Play.com, Wal-Mart, and Yahoo!
AVG Internet Security Business Edition 2011 is our most advanced small and medium business solution
to-date.
AVG recognizes that a small or medium sized business owner should not have to be an IT expert to protect
their business from online security threats and AVG 2011 Business edition is designed with ease of use and
maximum protection in mind.
With multiple layers of protection, smart scanning and a user-friendly management console, it’s the
ultimate solution for businesses that need peace of mind from security software that’s designed to be
high on protection, light on resources and easy-to-use.
14
Top 5 new features and benefits of AVG Internet security Business Edition 2011:
1.	 Secures your business automatically from the latest and toughest internet threatswith AVG
LinkScanner® - Shows safety ratings in search engine results and ensures every web page your staff
visits is safe – even before they go there.
2.	 Protectsyourbusiness’sidentityandensuressafeonlinebusinesstransactionswithAVGDataProtection
Identifies and blocks software that is behaving suspiciously in order to protect your business identity
and data
3.	 People powered protection means your business benefits from the global community with AVG
Community Protection Network - Provides the latest threat information from around the world so that
your business protection is up-to-date
4.	 Protects your business on popular Social Networking sites with AVG Social Networking Protection™
- Real-time, automatic checking of links exchanged within Facebook and MySpace, keeping your
business safe during the ever increasing use of social networking.
5.	 Saves your business valuable time with AVG’s Smart Scanning - Scans while you’re away and runs in
low-priority mode when you’re working. AVG 2011’s scans are faster too, saving your business time by
using our unique Smart Scanning technology.
Visit our website for full details of all the advantages of AVG Internet Security Business Edition 2011.
Keep in touch with AVG
For business security news, views and trends, follow the AVG Small Business blog at
http://small-business.blog.avg.com/
Join our Linked In community at:
http://www.linkedin.com/groups?mostPopular=&gid=2719797
For breaking news, follow AVG on Twitter at:
www.twitter.com/officialAVGnews
For more information, please contact:
Ranjiv.Dale@gfk.com 		
or
Robert.Gorby@avg.com

More Related Content

What's hot

Sharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesSharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesThe Economist Media Businesses
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesJoseph DeFever
 
Assessing and Managing IT Security Risks
Assessing and Managing IT Security RisksAssessing and Managing IT Security Risks
Assessing and Managing IT Security RisksChris Ross
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-StudyTam Nguyen
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalSelectedPresentations
 
The way forward. Insurance in an age of customer intimacy and Internet of Things
The way forward. Insurance in an age of customer intimacy and Internet of ThingsThe way forward. Insurance in an age of customer intimacy and Internet of Things
The way forward. Insurance in an age of customer intimacy and Internet of ThingsThe Economist Media Businesses
 
Cscg cryptographic-key-trends-survey
Cscg cryptographic-key-trends-surveyCscg cryptographic-key-trends-survey
Cscg cryptographic-key-trends-surveyGeorge Wainblat
 
New IT Survey: Brazil
New IT Survey: BrazilNew IT Survey: Brazil
New IT Survey: BrazilSolarWinds
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 - Mark - Fullbright
 
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014Edelman
 
Briefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionBriefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionThe Economist Media Businesses
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of SecurityKarina Elise
 

What's hot (18)

Sharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesSharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breaches
 
EMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-SecurityEMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-Security
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
Assessing and Managing IT Security Risks
Assessing and Managing IT Security RisksAssessing and Managing IT Security Risks
Assessing and Managing IT Security Risks
 
Finding a strategic voice
Finding a strategic voiceFinding a strategic voice
Finding a strategic voice
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - final
 
Security Feature Cover Story
Security Feature Cover StorySecurity Feature Cover Story
Security Feature Cover Story
 
How boards can lead the cyber-resilient organisation
How boards can lead the cyber-resilient organisation How boards can lead the cyber-resilient organisation
How boards can lead the cyber-resilient organisation
 
The way forward. Insurance in an age of customer intimacy and Internet of Things
The way forward. Insurance in an age of customer intimacy and Internet of ThingsThe way forward. Insurance in an age of customer intimacy and Internet of Things
The way forward. Insurance in an age of customer intimacy and Internet of Things
 
Cscg cryptographic-key-trends-survey
Cscg cryptographic-key-trends-surveyCscg cryptographic-key-trends-survey
Cscg cryptographic-key-trends-survey
 
New IT Survey: Brazil
New IT Survey: BrazilNew IT Survey: Brazil
New IT Survey: Brazil
 
Prevent & Protect
Prevent & ProtectPrevent & Protect
Prevent & Protect
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
 
infosec-it
infosec-itinfosec-it
infosec-it
 
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
 
Briefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimensionBriefing paper: Third-Party Risks: The cyber dimension
Briefing paper: Third-Party Risks: The cyber dimension
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of Security
 

Viewers also liked

Storyboard 'Have you fed the Fish'
Storyboard 'Have you fed the Fish'Storyboard 'Have you fed the Fish'
Storyboard 'Have you fed the Fish'guest6ecb63a
 
lecture diana krabbendam
lecture diana krabbendamlecture diana krabbendam
lecture diana krabbendamericreiman
 
AVGs LinkedIn Starter Guide
AVGs LinkedIn Starter GuideAVGs LinkedIn Starter Guide
AVGs LinkedIn Starter GuideAVG Technologies
 
Инвестиционный проект строительства в Турции
Инвестиционный проект строительства в ТурцииИнвестиционный проект строительства в Турции
Инвестиционный проект строительства в ТурцииAvalon
 
Feria a la bandera de iguala
Feria a la bandera de igualaFeria a la bandera de iguala
Feria a la bandera de igualaFrancisco
 
Avg Community Powered Threat Report Q3 2011
Avg Community Powered Threat Report   Q3 2011Avg Community Powered Threat Report   Q3 2011
Avg Community Powered Threat Report Q3 2011AVG Technologies
 
Their around me!
Their around me!Their around me!
Their around me!fazailpro
 
VSI Berlin - Company Profile
VSI Berlin - Company ProfileVSI Berlin - Company Profile
VSI Berlin - Company ProfileNinaWeinz
 
Sample Co Letter Ok
Sample Co  Letter    OkSample Co  Letter    Ok
Sample Co Letter OkPatrick Yeo
 
Презентация компании Avalon
Презентация компании AvalonПрезентация компании Avalon
Презентация компании AvalonAvalon
 
Tony Anscombe Seminar CIS 2014
Tony Anscombe Seminar CIS 2014Tony Anscombe Seminar CIS 2014
Tony Anscombe Seminar CIS 2014AVG Technologies
 
V8 league odg soft chalk webinar for open education week 2014
V8 league odg soft chalk webinar for open education week 2014V8 league odg soft chalk webinar for open education week 2014
V8 league odg soft chalk webinar for open education week 2014jackyhood86
 
Veronica's Comparison
Veronica's ComparisonVeronica's Comparison
Veronica's ComparisonVeronica
 
JC2 Be A Mastermind
JC2  Be A MastermindJC2  Be A Mastermind
JC2 Be A Mastermindmjc.chrystal
 

Viewers also liked (20)

Storyboard 'Have you fed the Fish'
Storyboard 'Have you fed the Fish'Storyboard 'Have you fed the Fish'
Storyboard 'Have you fed the Fish'
 
lecture diana krabbendam
lecture diana krabbendamlecture diana krabbendam
lecture diana krabbendam
 
AVGs LinkedIn Starter Guide
AVGs LinkedIn Starter GuideAVGs LinkedIn Starter Guide
AVGs LinkedIn Starter Guide
 
Инвестиционный проект строительства в Турции
Инвестиционный проект строительства в ТурцииИнвестиционный проект строительства в Турции
Инвестиционный проект строительства в Турции
 
Eccentricity of an Ellipse lab
Eccentricity of an Ellipse labEccentricity of an Ellipse lab
Eccentricity of an Ellipse lab
 
Feria a la bandera de iguala
Feria a la bandera de igualaFeria a la bandera de iguala
Feria a la bandera de iguala
 
Avg Community Powered Threat Report Q3 2011
Avg Community Powered Threat Report   Q3 2011Avg Community Powered Threat Report   Q3 2011
Avg Community Powered Threat Report Q3 2011
 
Avg digital-diaries
Avg digital-diariesAvg digital-diaries
Avg digital-diaries
 
Their around me!
Their around me!Their around me!
Their around me!
 
VSI Berlin - Company Profile
VSI Berlin - Company ProfileVSI Berlin - Company Profile
VSI Berlin - Company Profile
 
Sample Co Letter Ok
Sample Co  Letter    OkSample Co  Letter    Ok
Sample Co Letter Ok
 
Presentación
PresentaciónPresentación
Presentación
 
Презентация компании Avalon
Презентация компании AvalonПрезентация компании Avalon
Презентация компании Avalon
 
Telly Chakkar
Telly ChakkarTelly Chakkar
Telly Chakkar
 
Nos vamos a Irlanda
Nos vamos a IrlandaNos vamos a Irlanda
Nos vamos a Irlanda
 
Media Presentation1
Media Presentation1Media Presentation1
Media Presentation1
 
Tony Anscombe Seminar CIS 2014
Tony Anscombe Seminar CIS 2014Tony Anscombe Seminar CIS 2014
Tony Anscombe Seminar CIS 2014
 
V8 league odg soft chalk webinar for open education week 2014
V8 league odg soft chalk webinar for open education week 2014V8 league odg soft chalk webinar for open education week 2014
V8 league odg soft chalk webinar for open education week 2014
 
Veronica's Comparison
Veronica's ComparisonVeronica's Comparison
Veronica's Comparison
 
JC2 Be A Mastermind
JC2  Be A MastermindJC2  Be A Mastermind
JC2 Be A Mastermind
 

Similar to Avg White Paper (4)

Challenges and opportunities for European MSPs
Challenges and opportunities for European MSPsChallenges and opportunities for European MSPs
Challenges and opportunities for European MSPsKaspersky
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityRahul Tyagi
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
12 4-15-final-2016-top-10-12-8-15
12 4-15-final-2016-top-10-12-8-1512 4-15-final-2016-top-10-12-8-15
12 4-15-final-2016-top-10-12-8-15Tirrah Switzer
 
IT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsIT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsBrooke Bordelon
 
Microsoft2009SMBInsightsReport (1)
Microsoft2009SMBInsightsReport (1)Microsoft2009SMBInsightsReport (1)
Microsoft2009SMBInsightsReport (1)MidMarket Place
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudSymantec
 
McNair_Paper_Hill
McNair_Paper_HillMcNair_Paper_Hill
McNair_Paper_HillDennis Hill
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
F&S Presentation Whitepaper Cisco Services
F&S Presentation Whitepaper Cisco ServicesF&S Presentation Whitepaper Cisco Services
F&S Presentation Whitepaper Cisco ServicesFelipe Lamus
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?PECB
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991Jim Romeo
 
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondLydia Shepherd
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprisesTaranggg11
 

Similar to Avg White Paper (4) (20)

Challenges and opportunities for European MSPs
Challenges and opportunities for European MSPsChallenges and opportunities for European MSPs
Challenges and opportunities for European MSPs
 
White Paper: Mobile Security
White Paper: Mobile SecurityWhite Paper: Mobile Security
White Paper: Mobile Security
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Security and SMBs
Security and SMBsSecurity and SMBs
Security and SMBs
 
12 4-15-final-2016-top-10-12-8-15
12 4-15-final-2016-top-10-12-8-1512 4-15-final-2016-top-10-12-8-15
12 4-15-final-2016-top-10-12-8-15
 
IT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business ProblemsIT Solutions for 3 Common Small Business Problems
IT Solutions for 3 Common Small Business Problems
 
Microsoft2009SMBInsightsReport (1)
Microsoft2009SMBInsightsReport (1)Microsoft2009SMBInsightsReport (1)
Microsoft2009SMBInsightsReport (1)
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
 
McNair_Paper_Hill
McNair_Paper_HillMcNair_Paper_Hill
McNair_Paper_Hill
 
PPT-in-IT-GEE103.pptx
PPT-in-IT-GEE103.pptxPPT-in-IT-GEE103.pptx
PPT-in-IT-GEE103.pptx
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
F&S Presentation Whitepaper Cisco Services
F&S Presentation Whitepaper Cisco ServicesF&S Presentation Whitepaper Cisco Services
F&S Presentation Whitepaper Cisco Services
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991managed-security-for-a-not-so-secure-world-wp090991
managed-security-for-a-not-so-secure-world-wp090991
 
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respond
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
Top 3 security concerns for enterprises
Top 3 security concerns for enterprisesTop 3 security concerns for enterprises
Top 3 security concerns for enterprises
 

More from AVG Technologies

Android performance optimization_guide_h1 2016
Android performance optimization_guide_h1 2016Android performance optimization_guide_h1 2016
Android performance optimization_guide_h1 2016AVG Technologies
 
Avg technologies android app_performance__trends_report_h1 2016
Avg technologies android app_performance__trends_report_h1 2016Avg technologies android app_performance__trends_report_h1 2016
Avg technologies android app_performance__trends_report_h1 2016AVG Technologies
 
AVG Android App Report Q3 2015
AVG Android App Report Q3 2015AVG Android App Report Q3 2015
AVG Android App Report Q3 2015AVG Technologies
 
Weather Forecast for Today? Advert Flood Coming from East
Weather Forecast for Today? Advert Flood Coming from EastWeather Forecast for Today? Advert Flood Coming from East
Weather Forecast for Today? Advert Flood Coming from EastAVG Technologies
 
AVG Android App Performance Report Q1 2015
AVG Android App Performance Report Q1 2015AVG Android App Performance Report Q1 2015
AVG Android App Performance Report Q1 2015AVG Technologies
 
AVG Managed Workplace 9.1 Fact Sheet
AVG Managed Workplace 9.1 Fact SheetAVG Managed Workplace 9.1 Fact Sheet
AVG Managed Workplace 9.1 Fact SheetAVG Technologies
 
Avg Technologies Vawtrak Banking Trojan White Paper
Avg Technologies Vawtrak Banking Trojan White PaperAvg Technologies Vawtrak Banking Trojan White Paper
Avg Technologies Vawtrak Banking Trojan White PaperAVG Technologies
 
AVG Android App Performance Report Q4 2014
AVG Android App Performance Report Q4 2014AVG Android App Performance Report Q4 2014
AVG Android App Performance Report Q4 2014AVG Technologies
 
MEF Global Consumer Trust Report
MEF Global Consumer Trust ReportMEF Global Consumer Trust Report
MEF Global Consumer Trust ReportAVG Technologies
 
AVG Android App Performance Report by AVG Technologies
AVG Android App Performance Report by AVG TechnologiesAVG Android App Performance Report by AVG Technologies
AVG Android App Performance Report by AVG TechnologiesAVG Technologies
 
AVG Protection Reviewer's Guide 2015
AVG Protection Reviewer's Guide 2015AVG Protection Reviewer's Guide 2015
AVG Protection Reviewer's Guide 2015AVG Technologies
 
Tony Anscombe CIS Keynote 2014
Tony Anscombe CIS Keynote 2014Tony Anscombe CIS Keynote 2014
Tony Anscombe CIS Keynote 2014AVG Technologies
 
AVG CIS 2014 Resource Sheet
AVG CIS 2014 Resource SheetAVG CIS 2014 Resource Sheet
AVG CIS 2014 Resource SheetAVG Technologies
 
Yuval Ben-Itzhak Seminar CIS 2014
Yuval Ben-Itzhak Seminar CIS 2014Yuval Ben-Itzhak Seminar CIS 2014
Yuval Ben-Itzhak Seminar CIS 2014AVG Technologies
 
AVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact SheetAVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact SheetAVG Technologies
 
AVG Internet of Things Survey Oct 2014
AVG Internet of Things Survey Oct 2014AVG Internet of Things Survey Oct 2014
AVG Internet of Things Survey Oct 2014AVG Technologies
 
AVG PC TuneUp Whitepaper 2015
AVG PC TuneUp Whitepaper 2015AVG PC TuneUp Whitepaper 2015
AVG PC TuneUp Whitepaper 2015AVG Technologies
 
AVG Cleaner for Mac Whitepaper 2015
AVG Cleaner for Mac Whitepaper 2015AVG Cleaner for Mac Whitepaper 2015
AVG Cleaner for Mac Whitepaper 2015AVG Technologies
 
AVG Cleaner for iPhone and iPad Whitepaper 2015
AVG Cleaner for iPhone and iPad Whitepaper 2015AVG Cleaner for iPhone and iPad Whitepaper 2015
AVG Cleaner for iPhone and iPad Whitepaper 2015AVG Technologies
 
AVG Android Cleaner Whitepaper 2015
AVG Android Cleaner Whitepaper 2015AVG Android Cleaner Whitepaper 2015
AVG Android Cleaner Whitepaper 2015AVG Technologies
 

More from AVG Technologies (20)

Android performance optimization_guide_h1 2016
Android performance optimization_guide_h1 2016Android performance optimization_guide_h1 2016
Android performance optimization_guide_h1 2016
 
Avg technologies android app_performance__trends_report_h1 2016
Avg technologies android app_performance__trends_report_h1 2016Avg technologies android app_performance__trends_report_h1 2016
Avg technologies android app_performance__trends_report_h1 2016
 
AVG Android App Report Q3 2015
AVG Android App Report Q3 2015AVG Android App Report Q3 2015
AVG Android App Report Q3 2015
 
Weather Forecast for Today? Advert Flood Coming from East
Weather Forecast for Today? Advert Flood Coming from EastWeather Forecast for Today? Advert Flood Coming from East
Weather Forecast for Today? Advert Flood Coming from East
 
AVG Android App Performance Report Q1 2015
AVG Android App Performance Report Q1 2015AVG Android App Performance Report Q1 2015
AVG Android App Performance Report Q1 2015
 
AVG Managed Workplace 9.1 Fact Sheet
AVG Managed Workplace 9.1 Fact SheetAVG Managed Workplace 9.1 Fact Sheet
AVG Managed Workplace 9.1 Fact Sheet
 
Avg Technologies Vawtrak Banking Trojan White Paper
Avg Technologies Vawtrak Banking Trojan White PaperAvg Technologies Vawtrak Banking Trojan White Paper
Avg Technologies Vawtrak Banking Trojan White Paper
 
AVG Android App Performance Report Q4 2014
AVG Android App Performance Report Q4 2014AVG Android App Performance Report Q4 2014
AVG Android App Performance Report Q4 2014
 
MEF Global Consumer Trust Report
MEF Global Consumer Trust ReportMEF Global Consumer Trust Report
MEF Global Consumer Trust Report
 
AVG Android App Performance Report by AVG Technologies
AVG Android App Performance Report by AVG TechnologiesAVG Android App Performance Report by AVG Technologies
AVG Android App Performance Report by AVG Technologies
 
AVG Protection Reviewer's Guide 2015
AVG Protection Reviewer's Guide 2015AVG Protection Reviewer's Guide 2015
AVG Protection Reviewer's Guide 2015
 
Tony Anscombe CIS Keynote 2014
Tony Anscombe CIS Keynote 2014Tony Anscombe CIS Keynote 2014
Tony Anscombe CIS Keynote 2014
 
AVG CIS 2014 Resource Sheet
AVG CIS 2014 Resource SheetAVG CIS 2014 Resource Sheet
AVG CIS 2014 Resource Sheet
 
Yuval Ben-Itzhak Seminar CIS 2014
Yuval Ben-Itzhak Seminar CIS 2014Yuval Ben-Itzhak Seminar CIS 2014
Yuval Ben-Itzhak Seminar CIS 2014
 
AVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact SheetAVG CloudCare Content Filtering Fact Sheet
AVG CloudCare Content Filtering Fact Sheet
 
AVG Internet of Things Survey Oct 2014
AVG Internet of Things Survey Oct 2014AVG Internet of Things Survey Oct 2014
AVG Internet of Things Survey Oct 2014
 
AVG PC TuneUp Whitepaper 2015
AVG PC TuneUp Whitepaper 2015AVG PC TuneUp Whitepaper 2015
AVG PC TuneUp Whitepaper 2015
 
AVG Cleaner for Mac Whitepaper 2015
AVG Cleaner for Mac Whitepaper 2015AVG Cleaner for Mac Whitepaper 2015
AVG Cleaner for Mac Whitepaper 2015
 
AVG Cleaner for iPhone and iPad Whitepaper 2015
AVG Cleaner for iPhone and iPad Whitepaper 2015AVG Cleaner for iPhone and iPad Whitepaper 2015
AVG Cleaner for iPhone and iPad Whitepaper 2015
 
AVG Android Cleaner Whitepaper 2015
AVG Android Cleaner Whitepaper 2015AVG Android Cleaner Whitepaper 2015
AVG Android Cleaner Whitepaper 2015
 

Avg White Paper (4)

  • 1. 1 SMB Market Landscape Report 2010 Growth from knowledge
  • 2. 2 1. Executive Summary 2. Methodology 3. Market Overview: SMBs: a highly fragmented sector 4. Theme 1: SMBs ARE emerging successfully from the recent economic downturn AND are positive about the future 5. Theme 2: TECHNOLOGY is critical to the business, but SMBs don’t have the expertise to manage it 6. Theme 3: SMBs are ready to deploy new technologies and move into the ‘cloud’ 7. Theme 4: SMBs are concerned about IT security but aren’t always aware of or fully protected against the threats that exist 8. Theme 5: Peace of mind, performance and reassurance are top priorities for SMBs when considering security solutions 9. Conclusions Contents
  • 3. 1 Executive Summary AVG recently partnered with GfK to undertake an international survey among SMBs. The results identified that SMBs are optimistic for the future as they emerge from a difficult economic period. SMBs are increasingly relying on technology to overcome the challenges of the recession and recognize the importance of protecting this technology from outside threats. However many are unaware of the range of IT security threats and require expertise to help them secure success. Five main themes resulted from the research: 1. SMBs ARE emerging successfully from the recent economic downturn AND are positive about the future SMBs have responded to the challenge of economic recession through innovation, adopting new technologies and working practices and ensuring their businesses are lean. More than 2 in 3 businesses are expecting to expand in the next 5 years. 2. TECHNOLOGY is critical to the business, but SMBs don’t have the expertise to manage it Over three quarters feel IT is critical to their business and more than 2 in 3 see it as key to driving business success. However, only 39% have employees with a high level of IT competence and more than half have no access to IT expertise. 3. SMBs are ready to deploy new technologies and move into the‘cloud’ Currently, 1 in 7 businesses are using hosted services, but there appears to a high potential for further adoption, with 67% considering using cloud services in the future. 4. SMBs are concerned about IT security but aren’t always aware of or fully protected against the threats that exist 77% recognise that a security breach could have a significant impact on their business and 83% feel that having the right level of protection is critical to their business. Yet less than half have a clear security policy in place and 1 in 7 businesses have no IT security protection. 5. Peace of mind, performance and reassurance are top priorities for SMBs when considering security solutions Universally SMBs want security solutions to deliver the right level of protection and not impact on business performance. The vast majority of SMBs (88%) also want the reassurance of a trusted brand to deliver this.
  • 4. 2 Methodology GfK conducted a global survey of small and medium businesses (SMB), defined as companies with up to 100 employees who use at least one PC. The Survey consisted of two phases: Phase 1 – a detailed investigation of SMB security software purchasing attitudes and behaviours. Twenty in-depth one-on-one interviews with SMBs in Brazil, China, Italy and US conducted end 2009. Phase 2 – quantitative exploration of the SMB IT security software market landscape. 2000 online interviews conducted in US and UK in spring 2010. Individual respondents were senior business decision makers responsible for IT purchasing.
  • 5. 3 Market overview SMBs: A highly fragmented sector The SMB sector is highly fragmented and dominated by single person (SOHO) and small (2-5 employee) organisations. The SMB umbrella covers a broad spectrum of businesses with unique identities operating in a wide range of industries. IT spend in this sector is high, particularly in the UK where spend is higher than in the US. Figure 1: UK and US SMB size of business (employees) UK: Size of Business 42% 37% 13% 5% 2% 1% 1 2-5 6-10 11-25 26-50 51-100 US: Size of Business 33% 32% 19% 9% 4% 3% 1 2-5 6-10 11-25 26-50 51-100
  • 6. 4 The research among SMBs identified five main themes 1) SMBs ARE emerging successfully from the recent economic downturn AND are positive about the future SMBs have responded to the challenge of economic recession through innovation, adopting new technologies and working practices and ensuring their businesses are lean. This includes improving technology efficiency, migrating to digital technologies, developing e-commerce solutions and offering new products and services to customers. Budgets are becoming more streamlined and there is a heightened need to demonstrate greater value and a positive return on investment. SMBs are embracing flexible working with a larger remote worker base and expansion of the role/job function of remote employees. Employees are also increasing levels of mobility. In order to maximise efficiencyandminimisecost,manySMBsareadoptingvirtualisationtechnologiessuchascloudcomputing as well as investing in the latest hardware. Those most confident of success are proud of their close working relationships with their customers which they believe helps them to maintain a competitive advantage over larger companies. “Anyonecansellbutnoteveryonehasthegoodwilltogotheextramile”(BrazilSMB) “Someofourlargerclientskeepcomingbackbecausetheyliketheattentiontheyget. Theygetaverypersonalised service”(USSMB) Some view the recent downturn as“less of a threat”and“more of an opportunity to evaluate the direction of the business”which typifies the positive attitude of the SMB decision maker. “It’saslowperiodatthemoment[2009]butitgivesustimeouttothink6monthstoayearaheadandseehow thingsaregoingtoaffectus”(USSMB)
  • 7. 5 As a result, the majority of SMBs now feel that they have emerged from the economic crisis in a stronger position with more than two thirds predicting growth in the next five years. SMBs in the US are particularly positive. Figure 2: SMB expectations of future growth in the next five years 29% 36% 23% 67% 61% 74% 0% 20% 40% 60% 80% 100% Total UK US Achieved Growth Remained a Similar Size Downsized
  • 8. 6 2) IT is critical to the business, but SMBs don’t have the expertise to manage it Over three quarters of SMBs view IT as critical to the business and more than two thirds see it as key to driving business success. Perhaps unsurprisingly, given their higher overall spend on IT, UK SMBs are more likely to view technology as a strategic driver for their business than their US counterparts. Figure 3: SMB Attitudes to technology (% agree) Despite the importance of IT to SMBs a majority do not have employees with a high level of IT competence or a clear IT strategy; in fact, only 13% have dedicated in-house resources and over half have no access to IT resources whatsoever. This is consistent in both the US and UK and among all industry sectors. Figure 4: SMB IT resources SMBs themselves recognise this gap in knowledge and admit to needing expert help and support for IT decision making. “Whenthereisnoproblemwedon’tthinkaboutit.It’sonlywhen thereisaproblemthatpeoplewillthinkaboutit”(ChinaSMB) “IhavelimitedexperiencesoItrustmyITconsultants,Ihavebeen workingwiththemfor10years”(ItalianSMB) 61% 77% 0% 20% 40% 60% 80% 100% I view IT as key to driving business success IT is critical to the day to day functioning of my business 56% 13% 31% Outsourced In-house resources No dedicated resources
  • 9. 7 3) SMBs are ready to deploy new technologies and move into the‘cloud’ As already noted, SMBs are generally innovative and open to change and as such, are keen to embrace and deploy new technologies. SMBs are particularly open to using hosted services. Currently 1 in 7 are using ‘cloud’services but two thirds are considering using in the future. A contributing factor to this demand for hosted services is that the vast majority of SMBs do not have internal IT resources. They are therefore keen to embrace any offering which makes IT easier to manage and use. Price is also a key consideration. Figure 5: Hosted services 59% 53% 38% 34% 15% Web Hosting Email Hosting Online Back Up Free Services such as Google Docs Security Services Type of Hosted Services Used 50% 47% 44% 36% 33% Easier to Maintain Price Easier to Use Better Support Greater Memory Capacity Reason for Choosing Hosted Services
  • 10. 8 4) SMBs are concerned about IT security but aren’t always aware of or fully protected against the threats that exist The vast majority of SMB decision makers want to protect their businesses effectively from security breaches and believe that the right level of protection is critical to their business. Three quarters recognise that a security breach could have a significant impact on their business. Despite this strong belief, less than half have a clear security policy in place and many do not feel confident in making IT security decisions themselves. Figure 6: Attitudes to IT security software services SMBs are aware of the many different ways security breaches can impact their businesses and their biggest concern is losing access to files. “It’snotsomuchconcernswithvirusesbutmoreaboutahackergettinginandretrievinginformationtheyweren’t supposedtoknow”(USSMB) 83% 77% 55% 48% Having the right level of IT protection is critical for my business An IT security threat could have a significant impact on my business We are confident in making IT security services decisions in- house without third party influence We have a clear IT security policy (for our employees) within our business
  • 11. 9 Figure 7: SMB security concerns When it comes to the importance of security, many speak from experience: “Wehadavirusbreachlastsummerthatwreakedhavoc. Itwascompletelyourfault”(ItalianSMB) A quarter of SMBs have been subject to a security breach. Typically this is among larger organisations with networks and dedicated IT support functions. Despite their high awareness of the potential damage security breaches can cause, surprisingly 1 in 7 SMBs do not have any security software installed, leaving their business open to potential attacks. 1 in 4 have experienced a security breach 1 in 7 have no security software 63%64% 70% 77% 86% Losing customer information Losing access to software programs Computer slowing down Having to replace corrupted hardware computers etc. Losing access to files saved on the hard drive
  • 12. 10 Figure 8: Security threats SMBs are aware of 79% 70% 49% 12% 11% Viruses Spyware Adware / Advertising Trojans Internet Based Attacks Social Engineering Not aware of specific threats / None The main reasons for not using security software include it being too expensive and a lack of awareness of the need to protect their business, which may be due to SMBs lack of IT expertise and access to resources . SMBs are also lacking in knowledge and awareness when it comes to specific IT security threats;1 in 10 SMBs are unaware of any threat. For the remainder, awareness of threats other than Viruses and Spyware is low. Worryingly, only half of SMBs are concerned about internet based attacks. This is likely to have consequences in the future as SMBs increase their reliance on the internet and cloud based services. This lack of awareness is even more pronounced when it comes to more sophisticated forms of attack such as Social Engineering (the manipulation of individuals into divulging confidential information).
  • 13. 11 5) Peace of mind, performance and reassurance are top priorities for SMBs when considering IT security solutions SMBs are remarkably consistent in terms of their requirements for Security solutions. They want IT security solutions to: 99 Deliver the right level of protection 99 Not impact on business performance 99 Work in the background “Securitymeanskeepingspamemailout,stoppingpeopledownloadingprogramsthathavevirusesinthem, keepingournetworksafe”(USSMB) “Securitymeansourdataisprotected”(ItalianSMB) Figure 9: SMB priorities for security software performance (% essential/very important) There is an expectation from almost all SMBs that a well known security software brand should be able to meet their requirements. Consequently brand reputation carries considerable weight when it comes to purchase decision making. “Everybodywasrecommendingitsothat’swhyIdecidedtobuyit”(ItalianSMB) 77% 72% 70% 63% 55% 36% Delivers a high level of protection Does not slow the computer(s) down Works in the background Scans the computer quickly Quick and easy to install Is from a well known brand
  • 14. 12 Conclusions ƒƒSMBs are generally very adept at adopting change into their businesses and the recent economic difficulties have opened up opportunities for new innovation and improving business processes. Two thirds of businesses are optimistic about experiencing growth in the next five years. ƒƒSMBs view IT as essential but as these organisations tends to be small (with the vast majority having less than 5 employees) many do not have clear IT strategies to help support the growth of the organisation. The level of IT expertise is often limited so SMBs either actively seek external help or tend to take a laissez faire attitude. ƒƒCloud solutions therefore appear to be an attractive prospect for SMBs given that the vast majority do not have internal IT resources and are frequently looking for IT solutions which are easier to manage and offer high value for low cost. ƒƒThe vast majority of SMB decision makers want to protect their businesses effectively from security breaches. However most SMBs are unaware and consequently unprotected from the range of internet based threats that exist. Furthermore, a small proportion of SMBs have no protection whatsoever. ƒƒSMBs desire a trusted IT security solutions brand. This needs to protect their business and run in the background and not slow business systems while preventing security breaches.
  • 15. 13 About GfK NOP GfK NOP Ltd is part of the GfK Group and a leading market research agency in the UK and internationally. It is a renowned supplier of market information and insight, offering sector specialists and best-in-field research for qualitative, quantitative, ethnographic, omnibus and online research services. About AVG AVG Technologies is a global security software maker protecting more than 110 million consumers and small businesses in 167 countries from the ever-growing incidence of Web threats, viruses, spam, cyber- scams and hackers on the Internet. AVG has nearly two decades of experience in combating cyber crime and one of the most advanced laboratories for detecting, pre-empting and combating Web-borne threats fromaroundtheworld.AVGhasnearly6,000resellers,partnersanddistributorsgloballyincludingAmazon. com, CNET, Cisco, Ingram Micro, Play.com, Wal-Mart, and Yahoo! AVG Internet Security Business Edition 2011 is our most advanced small and medium business solution to-date. AVG recognizes that a small or medium sized business owner should not have to be an IT expert to protect their business from online security threats and AVG 2011 Business edition is designed with ease of use and maximum protection in mind. With multiple layers of protection, smart scanning and a user-friendly management console, it’s the ultimate solution for businesses that need peace of mind from security software that’s designed to be high on protection, light on resources and easy-to-use.
  • 16. 14 Top 5 new features and benefits of AVG Internet security Business Edition 2011: 1. Secures your business automatically from the latest and toughest internet threatswith AVG LinkScanner® - Shows safety ratings in search engine results and ensures every web page your staff visits is safe – even before they go there. 2. Protectsyourbusiness’sidentityandensuressafeonlinebusinesstransactionswithAVGDataProtection Identifies and blocks software that is behaving suspiciously in order to protect your business identity and data 3. People powered protection means your business benefits from the global community with AVG Community Protection Network - Provides the latest threat information from around the world so that your business protection is up-to-date 4. Protects your business on popular Social Networking sites with AVG Social Networking Protection™ - Real-time, automatic checking of links exchanged within Facebook and MySpace, keeping your business safe during the ever increasing use of social networking. 5. Saves your business valuable time with AVG’s Smart Scanning - Scans while you’re away and runs in low-priority mode when you’re working. AVG 2011’s scans are faster too, saving your business time by using our unique Smart Scanning technology. Visit our website for full details of all the advantages of AVG Internet Security Business Edition 2011. Keep in touch with AVG For business security news, views and trends, follow the AVG Small Business blog at http://small-business.blog.avg.com/ Join our Linked In community at: http://www.linkedin.com/groups?mostPopular=&gid=2719797 For breaking news, follow AVG on Twitter at: www.twitter.com/officialAVGnews For more information, please contact: Ranjiv.Dale@gfk.com or Robert.Gorby@avg.com