SlideShare a Scribd company logo
1 of 7
Vanson Bourne, Summer 2013
Interviews with 100 IT decision-makers from organisations with more than
1,000 employees, across a range of commercial sectors in the UK
Research snapshot –
A corporate view of
Reviewing IT Security
How much are organisations spending on IT security?
Source: Vanson BourneAmount organisations are spending on security, as a percentage of their overall IT budget
On average
organisations
are spending
just 8% of
their overall IT
budget on
security
65% of
organisations
have
increased
their IT
security
spend
compared to
three years
ago…
… whilst IT
spend
has
decreased
for an
average of
7% of
organisations
But how many organisations are reviewing their IT security?
Source: Vanson Bourne
of organisations have a
formal process for reviewing
their security protocols and
security providers/partners
of organisations do not
have a formal process for
reviewing either their
security protocols or
security providers/partners
Organisations with a formal process for reviewing their security protocols and security providers/partners
Does your IT organisation have a formal process for reviewing security protocols
and security providers/partners?
Security protocols
and security
providers/partners
Neither
Security
providers/
partners only
Security
protocols only
8.3%
7.1% 7.3% 7.3%
Organisations who have a
formal process for reviewing
their security protocols and
security providers/partners
are spending more of their
IT budget on security
Source: Vanson BourneFrequency of formal review process for reviewing security protocols and security providers/partners
And how frequently is IT security being reviewed?
On average
organisations are
reviewing their security
protocols and security
providers/partners
every 7 months
One quarter of
organisations are
carrying out the review
on a quarterly basis or
more frequently
Three in ten organisations with
increased spend on IT security review
their security protocols and
providers/partners on at least a quarterly
basis. This compares to almost one in six
organisations who have not increased
their IT security spend
31%
14%
IT security
review
Increased spend on IT
security
Not increased spend on
IT security
Source: Vanson BourneOrganisations who feel that their employees regard security as the top priority when it comes to use of IT
Finally, to what extent is IT security a priority?
When it comes to IT use, less than one
quarter of organisations feel that
security is regarded by employees as the
top priority
Security protocols
and security
providers/partners
Neither
Security
providers/
partners only
Security
protocols only
31%
15% 20% 0%
Although organisations who have a
formal process for reviewing their
security protocols and security
providers/partners are most likely
to prioritise IT security, only three
in ten employees within this
category regard it as a priority
www.vansonbourne.com
Email: enquiries@vansonbourne.com
Tel: 01635 550449
Follow us on Twitter and LinkedIn
If you’d like to know more….
About our global B2B and B2C technology research services
Research snapshot –
A corporate view of
Reviewing IT Security
Vanson Bourne, Summer 2013

More Related Content

More from Vanson Bourne

Vanson Bourne Research Report: Wearable Tech
Vanson Bourne Research Report: Wearable TechVanson Bourne Research Report: Wearable Tech
Vanson Bourne Research Report: Wearable TechVanson Bourne
 
Vanson Bourne Infographic: Wearable Tech
Vanson Bourne Infographic: Wearable TechVanson Bourne Infographic: Wearable Tech
Vanson Bourne Infographic: Wearable TechVanson Bourne
 
Vanson Bourne Christmas Percents Infographic
Vanson Bourne Christmas Percents InfographicVanson Bourne Christmas Percents Infographic
Vanson Bourne Christmas Percents InfographicVanson Bourne
 
Shadow IT 2014: Webcast Slides
Shadow IT 2014: Webcast SlidesShadow IT 2014: Webcast Slides
Shadow IT 2014: Webcast SlidesVanson Bourne
 
Vanson Bourne Data Summary: Shadow IT - IT Decision-Makers
Vanson Bourne Data Summary: Shadow IT - IT Decision-MakersVanson Bourne Data Summary: Shadow IT - IT Decision-Makers
Vanson Bourne Data Summary: Shadow IT - IT Decision-MakersVanson Bourne
 
Vanson Bourne Case Study: IBM
Vanson Bourne Case Study: IBMVanson Bourne Case Study: IBM
Vanson Bourne Case Study: IBMVanson Bourne
 
Vanson Bourne Case Study: Progress Software
Vanson Bourne Case Study: Progress SoftwareVanson Bourne Case Study: Progress Software
Vanson Bourne Case Study: Progress SoftwareVanson Bourne
 
Vanson Bourne Case Study: NTT
Vanson Bourne Case Study: NTTVanson Bourne Case Study: NTT
Vanson Bourne Case Study: NTTVanson Bourne
 
Vanson Bourne Case Study: Porter Novelli
Vanson Bourne Case Study: Porter NovelliVanson Bourne Case Study: Porter Novelli
Vanson Bourne Case Study: Porter NovelliVanson Bourne
 
Vanson Bourne Infographic: Mobile Strategy
Vanson Bourne Infographic: Mobile StrategyVanson Bourne Infographic: Mobile Strategy
Vanson Bourne Infographic: Mobile StrategyVanson Bourne
 
Vanson Bourne White Paper: Market Research
Vanson Bourne White Paper: Market ResearchVanson Bourne White Paper: Market Research
Vanson Bourne White Paper: Market ResearchVanson Bourne
 
Vanson Bourne Research Insight: Tech Marketing
Vanson Bourne Research Insight: Tech MarketingVanson Bourne Research Insight: Tech Marketing
Vanson Bourne Research Insight: Tech MarketingVanson Bourne
 
Vanson Bourne Infographic: IT Security
Vanson Bourne Infographic: IT SecurityVanson Bourne Infographic: IT Security
Vanson Bourne Infographic: IT SecurityVanson Bourne
 
Vanson Bourne Infographic: Social Media 2010 v 2013
Vanson Bourne Infographic: Social Media 2010 v 2013Vanson Bourne Infographic: Social Media 2010 v 2013
Vanson Bourne Infographic: Social Media 2010 v 2013Vanson Bourne
 
Vanson Bourne Infographic: Social Media
Vanson Bourne Infographic: Social MediaVanson Bourne Infographic: Social Media
Vanson Bourne Infographic: Social MediaVanson Bourne
 
Vanson Bourne Infographic: Technology Marketing
Vanson Bourne Infographic: Technology MarketingVanson Bourne Infographic: Technology Marketing
Vanson Bourne Infographic: Technology MarketingVanson Bourne
 
Vanson Bourne Webcast: IT Security
Vanson Bourne Webcast: IT SecurityVanson Bourne Webcast: IT Security
Vanson Bourne Webcast: IT SecurityVanson Bourne
 
At a glance - A corporate view of 4G
At a glance - A corporate view of 4GAt a glance - A corporate view of 4G
At a glance - A corporate view of 4GVanson Bourne
 
Research snapshot – A corporate view of 4G
Research snapshot – A corporate view of 4GResearch snapshot – A corporate view of 4G
Research snapshot – A corporate view of 4GVanson Bourne
 
Research snapshot – A corporate view of mobile strategy
Research snapshot – A corporate view of mobile strategyResearch snapshot – A corporate view of mobile strategy
Research snapshot – A corporate view of mobile strategyVanson Bourne
 

More from Vanson Bourne (20)

Vanson Bourne Research Report: Wearable Tech
Vanson Bourne Research Report: Wearable TechVanson Bourne Research Report: Wearable Tech
Vanson Bourne Research Report: Wearable Tech
 
Vanson Bourne Infographic: Wearable Tech
Vanson Bourne Infographic: Wearable TechVanson Bourne Infographic: Wearable Tech
Vanson Bourne Infographic: Wearable Tech
 
Vanson Bourne Christmas Percents Infographic
Vanson Bourne Christmas Percents InfographicVanson Bourne Christmas Percents Infographic
Vanson Bourne Christmas Percents Infographic
 
Shadow IT 2014: Webcast Slides
Shadow IT 2014: Webcast SlidesShadow IT 2014: Webcast Slides
Shadow IT 2014: Webcast Slides
 
Vanson Bourne Data Summary: Shadow IT - IT Decision-Makers
Vanson Bourne Data Summary: Shadow IT - IT Decision-MakersVanson Bourne Data Summary: Shadow IT - IT Decision-Makers
Vanson Bourne Data Summary: Shadow IT - IT Decision-Makers
 
Vanson Bourne Case Study: IBM
Vanson Bourne Case Study: IBMVanson Bourne Case Study: IBM
Vanson Bourne Case Study: IBM
 
Vanson Bourne Case Study: Progress Software
Vanson Bourne Case Study: Progress SoftwareVanson Bourne Case Study: Progress Software
Vanson Bourne Case Study: Progress Software
 
Vanson Bourne Case Study: NTT
Vanson Bourne Case Study: NTTVanson Bourne Case Study: NTT
Vanson Bourne Case Study: NTT
 
Vanson Bourne Case Study: Porter Novelli
Vanson Bourne Case Study: Porter NovelliVanson Bourne Case Study: Porter Novelli
Vanson Bourne Case Study: Porter Novelli
 
Vanson Bourne Infographic: Mobile Strategy
Vanson Bourne Infographic: Mobile StrategyVanson Bourne Infographic: Mobile Strategy
Vanson Bourne Infographic: Mobile Strategy
 
Vanson Bourne White Paper: Market Research
Vanson Bourne White Paper: Market ResearchVanson Bourne White Paper: Market Research
Vanson Bourne White Paper: Market Research
 
Vanson Bourne Research Insight: Tech Marketing
Vanson Bourne Research Insight: Tech MarketingVanson Bourne Research Insight: Tech Marketing
Vanson Bourne Research Insight: Tech Marketing
 
Vanson Bourne Infographic: IT Security
Vanson Bourne Infographic: IT SecurityVanson Bourne Infographic: IT Security
Vanson Bourne Infographic: IT Security
 
Vanson Bourne Infographic: Social Media 2010 v 2013
Vanson Bourne Infographic: Social Media 2010 v 2013Vanson Bourne Infographic: Social Media 2010 v 2013
Vanson Bourne Infographic: Social Media 2010 v 2013
 
Vanson Bourne Infographic: Social Media
Vanson Bourne Infographic: Social MediaVanson Bourne Infographic: Social Media
Vanson Bourne Infographic: Social Media
 
Vanson Bourne Infographic: Technology Marketing
Vanson Bourne Infographic: Technology MarketingVanson Bourne Infographic: Technology Marketing
Vanson Bourne Infographic: Technology Marketing
 
Vanson Bourne Webcast: IT Security
Vanson Bourne Webcast: IT SecurityVanson Bourne Webcast: IT Security
Vanson Bourne Webcast: IT Security
 
At a glance - A corporate view of 4G
At a glance - A corporate view of 4GAt a glance - A corporate view of 4G
At a glance - A corporate view of 4G
 
Research snapshot – A corporate view of 4G
Research snapshot – A corporate view of 4GResearch snapshot – A corporate view of 4G
Research snapshot – A corporate view of 4G
 
Research snapshot – A corporate view of mobile strategy
Research snapshot – A corporate view of mobile strategyResearch snapshot – A corporate view of mobile strategy
Research snapshot – A corporate view of mobile strategy
 

Recently uploaded

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 

Recently uploaded (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 

Research Snapshot - A corporate view of Reviewing IT Security

  • 1. Vanson Bourne, Summer 2013 Interviews with 100 IT decision-makers from organisations with more than 1,000 employees, across a range of commercial sectors in the UK Research snapshot – A corporate view of Reviewing IT Security
  • 2. How much are organisations spending on IT security? Source: Vanson BourneAmount organisations are spending on security, as a percentage of their overall IT budget On average organisations are spending just 8% of their overall IT budget on security 65% of organisations have increased their IT security spend compared to three years ago… … whilst IT spend has decreased for an average of 7% of organisations
  • 3. But how many organisations are reviewing their IT security? Source: Vanson Bourne of organisations have a formal process for reviewing their security protocols and security providers/partners of organisations do not have a formal process for reviewing either their security protocols or security providers/partners Organisations with a formal process for reviewing their security protocols and security providers/partners Does your IT organisation have a formal process for reviewing security protocols and security providers/partners? Security protocols and security providers/partners Neither Security providers/ partners only Security protocols only 8.3% 7.1% 7.3% 7.3% Organisations who have a formal process for reviewing their security protocols and security providers/partners are spending more of their IT budget on security
  • 4. Source: Vanson BourneFrequency of formal review process for reviewing security protocols and security providers/partners And how frequently is IT security being reviewed? On average organisations are reviewing their security protocols and security providers/partners every 7 months One quarter of organisations are carrying out the review on a quarterly basis or more frequently Three in ten organisations with increased spend on IT security review their security protocols and providers/partners on at least a quarterly basis. This compares to almost one in six organisations who have not increased their IT security spend 31% 14% IT security review Increased spend on IT security Not increased spend on IT security
  • 5. Source: Vanson BourneOrganisations who feel that their employees regard security as the top priority when it comes to use of IT Finally, to what extent is IT security a priority? When it comes to IT use, less than one quarter of organisations feel that security is regarded by employees as the top priority Security protocols and security providers/partners Neither Security providers/ partners only Security protocols only 31% 15% 20% 0% Although organisations who have a formal process for reviewing their security protocols and security providers/partners are most likely to prioritise IT security, only three in ten employees within this category regard it as a priority
  • 6. www.vansonbourne.com Email: enquiries@vansonbourne.com Tel: 01635 550449 Follow us on Twitter and LinkedIn If you’d like to know more…. About our global B2B and B2C technology research services
  • 7. Research snapshot – A corporate view of Reviewing IT Security Vanson Bourne, Summer 2013