SlideShare a Scribd company logo
1 of 14
Mobile Madness
Secure Mobility Survey reveals a critical gap between the
enterprise mobility vision and real-world implementations
How does your organisation compare?

accelerate your ambition
+1,600
IT and security professionals surveyed
globally confirm mobility is a top
priority for most IT departments.
These are Dimension Data’s
insights, gathered from IT
professionals spanning the
Americas, Asia
Pacific, Europe, Middle
East, and Africa
demonstrate that organisations
from around the world share
many of the same
priorities, challenges and risks.
Survey Highlights
32% have conducted a security assessment of key
applications touched by mobile devices

27% have well-defined network
policies for mobility in place

90% say they have no way to prevent staff from using
their personal mobile devices to access enterprise systems

23% freely allow users to download non-corporate
approved applications to improve their productivity
A critical gap exists between the
enterprise mobility vision and
real-world implementations
An IT roadmap that integrates with a business’s operational goals
and the organisation’s existing IT infrastructure – one that provides
for necessary resources and budget and also highlights potential
challenges – makes the difference between a successful
implementation and being derailed by unforeseen problems. This is
especially true when it comes to mobility, which is particularly
complex and touches most parts of an organisation’s network
infrastructure. For this reason, it isn’t surprising that of the 79% of
IT leaders who classify mobility as a top priority, 69% already
have a roadmap in place.

Learn more
Concern

O utweighs
action

The vast majority of respondents (82%) indicated that
employees at their organisations are utilising personal
mobile devices for work purposes. Analysts advocate that
organisations must have a clear mobility strategy that
ensures mobile technology is an investment that works hard
to deliver business value and meet the demands of an
increasingly mobile workforce. To some
extent, organisations are starting to listen to the analyst
community because today, 55% of the all the
organisations surveyed have a mobility roadmap of
some kind.
Learn more
Kn wing
where to start
Given the security issues found on the vast majority of
devices within mature networks, IT leaders are correct
to be concerned about data security and access control
issues relating to mobility. The importance of
protecting company data is a top mobility priority
for 71% of respondents, while 65% identified
access control as their top priority.

Learn more
What is surprising, given the extent to which they recognise the
risk, is that the area where IT leaders have the greatest amount
of control – conducting security audits of applications
touched by mobile devices – has not been a priority. Only
32% of respondents have taken that step.

Learn more
Productivity,
the user experience and security
Real-world employee productivity improvements, user
experience and security are not meeting expectations.
Over 90% of respondents believe that employees will
use their personal mobile devices to access enterprise
systems on their own and that IT does not have the
capability necessary to stop this activity. IT leaders
believe clear policies are needed to increase control,
improve visibility and decrease risk.
However, 80% of respondents also seek to create a
positive mobility experience for employees to help
increase productivity. To a large extent, employee
experience is important to IT leaders because 79% of
them recognise that an increase in worker productivity
is the greatest benefit offered by mobility.
Learn more
&
Security
Mobility

from the top down

Perhaps because of the limited investment that
inhibits employees from accessing the businesscritical applications needed to perform their job
functions, 24% of respondents indicate that
their organisation allows them to download
non-corporate applications to increase
productivity. This is another example of where
the gap between the overall vision and the way
in which it’s typically executed makes it difficult
for organisations to achieve their goal – while at
the same time creating new and often
undetectable security vulnerabilities.
Learn more
“

“

A mobility policy should be
monitoring the use of
corporate data, while
maintaining a userfriendly
interface.
Project manager, Spain
Local insights
Local insights
The EMDM helps you to better understand
your organisation’s current state of
development, performance, operational
practices and strategic execution, and
enables you to develop an enterprise
mobility roadmap for your organisation’s
future aspirations.

Learn how

Development Model

Dimension Data’s
Enterprise Mobility
Development Model
can help

More Related Content

What's hot

International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryInternational Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryCompTIA
 
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryInternational Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryCompTIA
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
SolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity SurveySolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity SurveySolarWinds
 
The Impact of COVID-19 on Public Sector IT
The Impact of COVID-19 on Public Sector ITThe Impact of COVID-19 on Public Sector IT
The Impact of COVID-19 on Public Sector ITInsight
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 - Mark - Fullbright
 
International Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand SummaryInternational Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand SummaryCompTIA
 
The changing face of ICT decision making
The changing face of ICT decision makingThe changing face of ICT decision making
The changing face of ICT decision makingTalkTalk Business
 
Platforms for Growth: Technology Innovations in the Insurance Industry
Platforms for Growth:Technology Innovations in the Insurance IndustryPlatforms for Growth:Technology Innovations in the Insurance Industry
Platforms for Growth: Technology Innovations in the Insurance IndustryState Street
 
Accenture 2015 Global Risk Management Study: North American Banking infographic
Accenture 2015 Global Risk Management Study: North American Banking infographicAccenture 2015 Global Risk Management Study: North American Banking infographic
Accenture 2015 Global Risk Management Study: North American Banking infographicaccenture
 
Survey: Security Analytics and Intelligence
Survey: Security Analytics and IntelligenceSurvey: Security Analytics and Intelligence
Survey: Security Analytics and IntelligenceSolarWinds
 
Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Emily Brady
 
International Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryInternational Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryCompTIA
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalSelectedPresentations
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-StudyTam Nguyen
 
2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of CybercrimeIDG
 
International Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK SummaryInternational Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK SummaryCompTIA
 
2021 IDG Security Priorities Study
2021 IDG Security Priorities Study2021 IDG Security Priorities Study
2021 IDG Security Priorities StudyIDG
 

What's hot (20)

International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryInternational Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian Summary
 
Unlocking High Fidelity Security
Unlocking High Fidelity SecurityUnlocking High Fidelity Security
Unlocking High Fidelity Security
 
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryInternational Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian Summary
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
SolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity SurveySolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity Survey
 
The Impact of COVID-19 on Public Sector IT
The Impact of COVID-19 on Public Sector ITThe Impact of COVID-19 on Public Sector IT
The Impact of COVID-19 on Public Sector IT
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
 
International Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand SummaryInternational Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand Summary
 
The changing face of ICT decision making
The changing face of ICT decision makingThe changing face of ICT decision making
The changing face of ICT decision making
 
Platforms for Growth: Technology Innovations in the Insurance Industry
Platforms for Growth:Technology Innovations in the Insurance IndustryPlatforms for Growth:Technology Innovations in the Insurance Industry
Platforms for Growth: Technology Innovations in the Insurance Industry
 
Accenture 2015 Global Risk Management Study: North American Banking infographic
Accenture 2015 Global Risk Management Study: North American Banking infographicAccenture 2015 Global Risk Management Study: North American Banking infographic
Accenture 2015 Global Risk Management Study: North American Banking infographic
 
EMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-SecurityEMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-Security
 
Survey: Security Analytics and Intelligence
Survey: Security Analytics and IntelligenceSurvey: Security Analytics and Intelligence
Survey: Security Analytics and Intelligence
 
Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16
 
International Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryInternational Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India Summary
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - final
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study
 
2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of Cybercrime
 
International Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK SummaryInternational Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK Summary
 
2021 IDG Security Priorities Study
2021 IDG Security Priorities Study2021 IDG Security Priorities Study
2021 IDG Security Priorities Study
 

Similar to 2014 Secure Mobility Survey Report

Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee StudyHiten Sethi
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesJoseph DeFever
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowMapR Technologies
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersCisco Mobility
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudSymantec
 
Apperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility SurveyApperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility SurveyJennifer Walker
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016Accenture Operations
 
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...Thierry Labro
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentationrevaathey
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentationrevaathey
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissEnterprise Mobile
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseSelectedPresentations
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk ManagementDMIMarketing
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementDMIMarketing
 
The impact of mobile devices on information security
The impact of mobile devices on information securityThe impact of mobile devices on information security
The impact of mobile devices on information securityBee_Ware
 
Assessing and Managing IT Security Risks
Assessing and Managing IT Security RisksAssessing and Managing IT Security Risks
Assessing and Managing IT Security RisksChris Ross
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise ReportOkta-Inc
 
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docxvickeryr87
 

Similar to 2014 Secure Mobility Survey Report (20)

Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee Study
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
 
Apperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility SurveyApperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility Survey
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
The impact of mobile devices on information security
The impact of mobile devices on information securityThe impact of mobile devices on information security
The impact of mobile devices on information security
 
Assessing and Managing IT Security Risks
Assessing and Managing IT Security RisksAssessing and Managing IT Security Risks
Assessing and Managing IT Security Risks
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise Report
 
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
 

More from DImension Data

End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityDImension Data
 
Cisco spark - reinventing collaboration
Cisco spark - reinventing collaborationCisco spark - reinventing collaboration
Cisco spark - reinventing collaborationDImension Data
 
What's new at the Tour de France
What's new at the Tour de FranceWhat's new at the Tour de France
What's new at the Tour de FranceDImension Data
 
Digital technology revolutionised the viewing experience of the tour de france
Digital technology revolutionised the viewing experience of the tour de franceDigital technology revolutionised the viewing experience of the tour de france
Digital technology revolutionised the viewing experience of the tour de franceDImension Data
 
Creating workspaces for tomorrow at the greatest cycling event in the world
Creating workspaces for tomorrow at the greatest cycling event in the worldCreating workspaces for tomorrow at the greatest cycling event in the world
Creating workspaces for tomorrow at the greatest cycling event in the worldDImension Data
 
Cloud: the race to digitisation is on!
Cloud: the race to digitisation is on! Cloud: the race to digitisation is on!
Cloud: the race to digitisation is on! DImension Data
 
6 stages of smart data at the Tour de France
6 stages of smart data at the Tour de France6 stages of smart data at the Tour de France
6 stages of smart data at the Tour de FranceDImension Data
 
Mobility at the network’s edge
Mobility at the network’s edgeMobility at the network’s edge
Mobility at the network’s edgeDImension Data
 
Zurich case study how to move a data centre in 8 days
Zurich case study  how to move a data centre in 8 daysZurich case study  how to move a data centre in 8 days
Zurich case study how to move a data centre in 8 daysDImension Data
 
Zurich case study: Reducing risk for insurance customers
Zurich case study: Reducing risk for insurance customersZurich case study: Reducing risk for insurance customers
Zurich case study: Reducing risk for insurance customersDImension Data
 
Strengthening Cybersecurity at the tour de france
Strengthening Cybersecurity at the tour de franceStrengthening Cybersecurity at the tour de france
Strengthening Cybersecurity at the tour de franceDImension Data
 
High-performance solutions for an international university
High-performance solutions for an international universityHigh-performance solutions for an international university
High-performance solutions for an international universityDImension Data
 
What's inhibiting your business productivity
What's inhibiting your business productivityWhat's inhibiting your business productivity
What's inhibiting your business productivityDImension Data
 
Creating powerful connections
Creating powerful connectionsCreating powerful connections
Creating powerful connectionsDImension Data
 
Case study: how information saves lives
Case study: how information saves livesCase study: how information saves lives
Case study: how information saves livesDImension Data
 
2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report2015 Global Threat Intelligence Report
2015 Global Threat Intelligence ReportDImension Data
 
How we helped Fujifilm keep its customers' special memories safe
How we helped Fujifilm keep its customers' special memories safeHow we helped Fujifilm keep its customers' special memories safe
How we helped Fujifilm keep its customers' special memories safeDImension Data
 
World’s first Cloud-enabled G20 Leaders’ Summit
World’s first Cloud-enabled G20 Leaders’ SummitWorld’s first Cloud-enabled G20 Leaders’ Summit
World’s first Cloud-enabled G20 Leaders’ SummitDImension Data
 
2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trendsDImension Data
 
Dimension Data Department Prime Minister and cabinet G20 case study
Dimension Data Department Prime Minister and cabinet G20 case studyDimension Data Department Prime Minister and cabinet G20 case study
Dimension Data Department Prime Minister and cabinet G20 case studyDImension Data
 

More from DImension Data (20)

End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturity
 
Cisco spark - reinventing collaboration
Cisco spark - reinventing collaborationCisco spark - reinventing collaboration
Cisco spark - reinventing collaboration
 
What's new at the Tour de France
What's new at the Tour de FranceWhat's new at the Tour de France
What's new at the Tour de France
 
Digital technology revolutionised the viewing experience of the tour de france
Digital technology revolutionised the viewing experience of the tour de franceDigital technology revolutionised the viewing experience of the tour de france
Digital technology revolutionised the viewing experience of the tour de france
 
Creating workspaces for tomorrow at the greatest cycling event in the world
Creating workspaces for tomorrow at the greatest cycling event in the worldCreating workspaces for tomorrow at the greatest cycling event in the world
Creating workspaces for tomorrow at the greatest cycling event in the world
 
Cloud: the race to digitisation is on!
Cloud: the race to digitisation is on! Cloud: the race to digitisation is on!
Cloud: the race to digitisation is on!
 
6 stages of smart data at the Tour de France
6 stages of smart data at the Tour de France6 stages of smart data at the Tour de France
6 stages of smart data at the Tour de France
 
Mobility at the network’s edge
Mobility at the network’s edgeMobility at the network’s edge
Mobility at the network’s edge
 
Zurich case study how to move a data centre in 8 days
Zurich case study  how to move a data centre in 8 daysZurich case study  how to move a data centre in 8 days
Zurich case study how to move a data centre in 8 days
 
Zurich case study: Reducing risk for insurance customers
Zurich case study: Reducing risk for insurance customersZurich case study: Reducing risk for insurance customers
Zurich case study: Reducing risk for insurance customers
 
Strengthening Cybersecurity at the tour de france
Strengthening Cybersecurity at the tour de franceStrengthening Cybersecurity at the tour de france
Strengthening Cybersecurity at the tour de france
 
High-performance solutions for an international university
High-performance solutions for an international universityHigh-performance solutions for an international university
High-performance solutions for an international university
 
What's inhibiting your business productivity
What's inhibiting your business productivityWhat's inhibiting your business productivity
What's inhibiting your business productivity
 
Creating powerful connections
Creating powerful connectionsCreating powerful connections
Creating powerful connections
 
Case study: how information saves lives
Case study: how information saves livesCase study: how information saves lives
Case study: how information saves lives
 
2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report
 
How we helped Fujifilm keep its customers' special memories safe
How we helped Fujifilm keep its customers' special memories safeHow we helped Fujifilm keep its customers' special memories safe
How we helped Fujifilm keep its customers' special memories safe
 
World’s first Cloud-enabled G20 Leaders’ Summit
World’s first Cloud-enabled G20 Leaders’ SummitWorld’s first Cloud-enabled G20 Leaders’ Summit
World’s first Cloud-enabled G20 Leaders’ Summit
 
2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends
 
Dimension Data Department Prime Minister and cabinet G20 case study
Dimension Data Department Prime Minister and cabinet G20 case studyDimension Data Department Prime Minister and cabinet G20 case study
Dimension Data Department Prime Minister and cabinet G20 case study
 

Recently uploaded

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

2014 Secure Mobility Survey Report

  • 1. Mobile Madness Secure Mobility Survey reveals a critical gap between the enterprise mobility vision and real-world implementations How does your organisation compare? accelerate your ambition
  • 2. +1,600 IT and security professionals surveyed globally confirm mobility is a top priority for most IT departments.
  • 3. These are Dimension Data’s insights, gathered from IT professionals spanning the Americas, Asia Pacific, Europe, Middle East, and Africa demonstrate that organisations from around the world share many of the same priorities, challenges and risks.
  • 4. Survey Highlights 32% have conducted a security assessment of key applications touched by mobile devices 27% have well-defined network policies for mobility in place 90% say they have no way to prevent staff from using their personal mobile devices to access enterprise systems 23% freely allow users to download non-corporate approved applications to improve their productivity
  • 5. A critical gap exists between the enterprise mobility vision and real-world implementations An IT roadmap that integrates with a business’s operational goals and the organisation’s existing IT infrastructure – one that provides for necessary resources and budget and also highlights potential challenges – makes the difference between a successful implementation and being derailed by unforeseen problems. This is especially true when it comes to mobility, which is particularly complex and touches most parts of an organisation’s network infrastructure. For this reason, it isn’t surprising that of the 79% of IT leaders who classify mobility as a top priority, 69% already have a roadmap in place. Learn more
  • 6. Concern O utweighs action The vast majority of respondents (82%) indicated that employees at their organisations are utilising personal mobile devices for work purposes. Analysts advocate that organisations must have a clear mobility strategy that ensures mobile technology is an investment that works hard to deliver business value and meet the demands of an increasingly mobile workforce. To some extent, organisations are starting to listen to the analyst community because today, 55% of the all the organisations surveyed have a mobility roadmap of some kind. Learn more
  • 7. Kn wing where to start Given the security issues found on the vast majority of devices within mature networks, IT leaders are correct to be concerned about data security and access control issues relating to mobility. The importance of protecting company data is a top mobility priority for 71% of respondents, while 65% identified access control as their top priority. Learn more
  • 8. What is surprising, given the extent to which they recognise the risk, is that the area where IT leaders have the greatest amount of control – conducting security audits of applications touched by mobile devices – has not been a priority. Only 32% of respondents have taken that step. Learn more
  • 9. Productivity, the user experience and security Real-world employee productivity improvements, user experience and security are not meeting expectations. Over 90% of respondents believe that employees will use their personal mobile devices to access enterprise systems on their own and that IT does not have the capability necessary to stop this activity. IT leaders believe clear policies are needed to increase control, improve visibility and decrease risk. However, 80% of respondents also seek to create a positive mobility experience for employees to help increase productivity. To a large extent, employee experience is important to IT leaders because 79% of them recognise that an increase in worker productivity is the greatest benefit offered by mobility. Learn more
  • 10. & Security Mobility from the top down Perhaps because of the limited investment that inhibits employees from accessing the businesscritical applications needed to perform their job functions, 24% of respondents indicate that their organisation allows them to download non-corporate applications to increase productivity. This is another example of where the gap between the overall vision and the way in which it’s typically executed makes it difficult for organisations to achieve their goal – while at the same time creating new and often undetectable security vulnerabilities. Learn more
  • 11. “ “ A mobility policy should be monitoring the use of corporate data, while maintaining a userfriendly interface. Project manager, Spain
  • 14. The EMDM helps you to better understand your organisation’s current state of development, performance, operational practices and strategic execution, and enables you to develop an enterprise mobility roadmap for your organisation’s future aspirations. Learn how Development Model Dimension Data’s Enterprise Mobility Development Model can help