The document summarizes the findings of a global study on consumer confidence and trust in mobile technologies. It found that while mobile device usage is widespread, many users lack confidence in the security of their devices and the networks and services they access. The rapid growth of mobile threats has not been matched with adequate security precautions by users. Building greater trust will require coordinated efforts across the entire mobile industry to address security and reliability issues.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Many applications on smart Phones can use various sensors embedded in the mobiles to provide users’ private information. This can result in a variety of privacy issues that may lessening level of mobile apps usage. To understand this issue better the researcher identified the root causes of privacy concerns. The study proposed a model identifies the root causes of privacy concerns and perceived benefits based on our interpretation for information boundary theory. The proposed model also addresses the usage behavior and behavioral intention toward using mobile apps by using the Theory of Planned Behavior. The result shows that “Cultural values” alone explains 70% of “Perceived privacy concerns” followed by “Self-defense” which explains around 23% of “Perceived privacy concerns”, and then “Context of the situation” with 5%. Whereas, the findings show that “Perceived effectiveness of privacy policy” and “Perceived effectiveness of industry self-regulation” both are factors which have the ability to reduce individuals “Perceived privacy concerns” by 9% and 8% respectively.
All product and company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Many applications on smart Phones can use various sensors embedded in the mobiles to provide users’ private information. This can result in a variety of privacy issues that may lessening level of mobile apps usage. To understand this issue better the researcher identified the root causes of privacy concerns. The study proposed a model identifies the root causes of privacy concerns and perceived benefits based on our interpretation for information boundary theory. The proposed model also addresses the usage behavior and behavioral intention toward using mobile apps by using the Theory of Planned Behavior. The result shows that “Cultural values” alone explains 70% of “Perceived privacy concerns” followed by “Self-defense” which explains around 23% of “Perceived privacy concerns”, and then “Context of the situation” with 5%. Whereas, the findings show that “Perceived effectiveness of privacy policy” and “Perceived effectiveness of industry self-regulation” both are factors which have the ability to reduce individuals “Perceived privacy concerns” by 9% and 8% respectively.
Mobile Technology - Tablets and Workplace Integration (Whitepaper)Fuji Xerox Australia
Smart phones keep getting smarter. Applications for tablet computers are emerging at dizzying speeds. And the cloud that links them all is limitless in scope. Mobile computing is no longer a technology trend, but rather, an integral component of our business and social lives.
As a result, businesses need to be aware of the benefits this might bring, how these technologies are being used, and who is using them. It is important to deliver solutions that make the process of using documentation on these platforms as streamlined as possible.
For more information on improving business process with better document management, visit www.fujixerox.com.au/mobileprint or call us at 13 14 12.
Osterman Research conducted two surveys in February and March 2013 focused on Bring Your Own Device (BYOD) issues in small, mid-sized and large organizations, primarily in North America.
The rise in IT spending is fueling the increased adoption of the bring-your-own-device (BYOD) culture in the region, and given its inherent advantages for employees and employers, BYOD adoption is bound to grow further in the coming years.
However, BYOD adoption is accompanied by IT security risks arising out of lack of awareness about device security among employees. The situation is compounded by insufficient network resources and the lack of formal BYOD policies at organizations to manage security risks emanating from use of personal devices on official servers and networks.
CIOs in the region need to respond by preparing IT networks and formulating a BYOD policies, which are designed to manage this increased demand for BYOD and mobile diversity in the region.
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...KKess
A new survey conducted by global IT association ISACA reveals how many employees will be shopping online at work this holiday season, and provides tips to help shoppers and IT departments minimize the risks.
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaJim Kaplan CIA CFE
A presentation for the 2014 TeamMate User Conference as a guide for auditors on bring your own device and mobile device management – an important and timely topic for auditors in all organizations.
Omlis Data Breaches Report - An Inside Perspective Omlis
The rise in digital and mobile financial services has introduced an onset of increased data breaches over the last few years. The digital revolution has undermined the traditional framework used to regulate financial institutions, which has led to areas of vulnerability within their security systems.
In the report, Data Breaches: An Inside Perspective, Omlis conducted in-depth interviews with experienced cyber security professionals to understand why TFIs (traditional financial institutions) aren't adequately addressing security weaknesses.
In our research, the discussions centered on the types of security systems employed by TFIs, personal and industry-wide attitudes to security, and the types of security measures used to prevent breaches.
The findings indicate that TFIs current preference towards technology creates an increasingly complex system with associated vulnerabilities and ultimately it requires greater manual input for maintenance and updates.
There are also issues related to the attitudes of employees and difficulties implementing comprehensive and in-depth incident strategies.
Taking this into account, the report suggests a new direction for TFI's security systems to provide secure, innovative solutions.
Top Seven Risks of Enterprise Mobility - How to protect your businessSymantec
Learn about the top risks associated with mobile devices in the enterprise environment and the steps you can take to mitigate these risks and protect your business
O Volante é umas das principais ferramentas para o trabalho no SolidEdge, aprenda nessa apresentação como fazer uso de todas as suas funcionalidades e domine o Solid Edge.
Universal Edge Service: Innovation for the Next DecadeJuniper Networks
This presentation demonstrates how Juniper’s breakthrough products are enabling both the monetization and optimization of new services at the edge as well as providing business agility. Read on for insight into a video caching case study and a look at the drivers of ROI of the next decade.
Veja o que o Solid Edge traz na sua nova versão e como isso apoia o seu desenvolvimento para impulsionar a inovação e possibilita que você Projete Melhor.
Mobile Technology - Tablets and Workplace Integration (Whitepaper)Fuji Xerox Australia
Smart phones keep getting smarter. Applications for tablet computers are emerging at dizzying speeds. And the cloud that links them all is limitless in scope. Mobile computing is no longer a technology trend, but rather, an integral component of our business and social lives.
As a result, businesses need to be aware of the benefits this might bring, how these technologies are being used, and who is using them. It is important to deliver solutions that make the process of using documentation on these platforms as streamlined as possible.
For more information on improving business process with better document management, visit www.fujixerox.com.au/mobileprint or call us at 13 14 12.
Osterman Research conducted two surveys in February and March 2013 focused on Bring Your Own Device (BYOD) issues in small, mid-sized and large organizations, primarily in North America.
The rise in IT spending is fueling the increased adoption of the bring-your-own-device (BYOD) culture in the region, and given its inherent advantages for employees and employers, BYOD adoption is bound to grow further in the coming years.
However, BYOD adoption is accompanied by IT security risks arising out of lack of awareness about device security among employees. The situation is compounded by insufficient network resources and the lack of formal BYOD policies at organizations to manage security risks emanating from use of personal devices on official servers and networks.
CIOs in the region need to respond by preparing IT networks and formulating a BYOD policies, which are designed to manage this increased demand for BYOD and mobile diversity in the region.
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...KKess
A new survey conducted by global IT association ISACA reveals how many employees will be shopping online at work this holiday season, and provides tips to help shoppers and IT departments minimize the risks.
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaJim Kaplan CIA CFE
A presentation for the 2014 TeamMate User Conference as a guide for auditors on bring your own device and mobile device management – an important and timely topic for auditors in all organizations.
Omlis Data Breaches Report - An Inside Perspective Omlis
The rise in digital and mobile financial services has introduced an onset of increased data breaches over the last few years. The digital revolution has undermined the traditional framework used to regulate financial institutions, which has led to areas of vulnerability within their security systems.
In the report, Data Breaches: An Inside Perspective, Omlis conducted in-depth interviews with experienced cyber security professionals to understand why TFIs (traditional financial institutions) aren't adequately addressing security weaknesses.
In our research, the discussions centered on the types of security systems employed by TFIs, personal and industry-wide attitudes to security, and the types of security measures used to prevent breaches.
The findings indicate that TFIs current preference towards technology creates an increasingly complex system with associated vulnerabilities and ultimately it requires greater manual input for maintenance and updates.
There are also issues related to the attitudes of employees and difficulties implementing comprehensive and in-depth incident strategies.
Taking this into account, the report suggests a new direction for TFI's security systems to provide secure, innovative solutions.
Top Seven Risks of Enterprise Mobility - How to protect your businessSymantec
Learn about the top risks associated with mobile devices in the enterprise environment and the steps you can take to mitigate these risks and protect your business
O Volante é umas das principais ferramentas para o trabalho no SolidEdge, aprenda nessa apresentação como fazer uso de todas as suas funcionalidades e domine o Solid Edge.
Universal Edge Service: Innovation for the Next DecadeJuniper Networks
This presentation demonstrates how Juniper’s breakthrough products are enabling both the monetization and optimization of new services at the edge as well as providing business agility. Read on for insight into a video caching case study and a look at the drivers of ROI of the next decade.
Veja o que o Solid Edge traz na sua nova versão e como isso apoia o seu desenvolvimento para impulsionar a inovação e possibilita que você Projete Melhor.
MEF Global Consumer Trust Report.
The study explores the key areas of trust, privacy, transparency and security to identify their impact on mobile consumers globally from purchasing a new device to downloading apps or paying for goods and services.
Building the Anytime, Anywhere Network -
Mobile technologies are opening enormous new
business opportunities. Capitalizing on them takes
a new approach to networking. To learn more, visit Juniper Networks at: http://juni.pr/CMlpCMPss
Learn about key trends facing the mobile forensics industry this year, including growing device and data backlogs, cloud-based data, and how to manage large quantities of data from multiple disparate sources.
How can we better protect our customers?
It’s official: consumers do not feel their private data is being kept private. Looking around at the headlines, where high profile breach after high-profile breach is documented, the lack of trust in data security is no surprise.
In this graphical report, we delve into the fears surrounding online security and the economic impact of losing your customers’ trust.
It’s official: your customers do not feel their private data is being kept private. In this graphical report, we delve into the fears surrounding online security and the economic impact of losing your customers’ trust.
Biometrics: A New Wrinkle Changes the Authentication Landscape mercatoradvisory
Criminal theft of passwords has made passwords obsolete, and so a new factor is required for authentication. Biometrics will be that new factor. It increases security and will prove more convenient for the consumer than passwords as it transitions into a persistent identity over the next 5 to 8 years. Increasingly smartphones are shipping with trusted execution environments that can displace traditional hardware security fobs. These new smartphones are critical to this fundamental shift in biometrics.
A new research report from Mercator Advisory Group titled Biometrics: A New Wrinkle Changes the Authentication Landscape explains the need for multimodal biometric authentication and describes many types of biometrics available from various technology providers. The report shows how biometrics technology has shifted from a primarily hardware-based solution to a software-and cloud-based solution enabled by smartphones that have become much more secure. With voice and face recognition, and now the addition of behavioral biometrics, this shift will drive rapid new innovation and will tip the market in favor of the mobile architecture.
Why Juniper, Driven by Mist AI, Leads the MarketJuniper Networks
While the rest of the industry has started to copy our AIOps Client to Cloud message recently, we understand that others are nowhere close to delivering on the promise of the AI-Driven Enterprise, both in terms of depth of features and breadth of portfolio. Take a look at this SlideShare to truly understand why Juniper, driven by Mist AI, leads the market.
Experiences are everything and Juniper knows this. From when a user engages with an app on their smartphone to when a workload is generated in the cloud to pick up the request, we know that every point of contact along the way impacts the user’s experience, from client to cloud. Learn more about what Juniper has recently announced in this SlideShare!
As much the workforce continues to work remotely, The COVID-19 Pandemic has taught us that the WAN is more important than ever, and troubleshooting it couldn’t be more difficult. Learn how MARVIS & Mist AI simplify the burdensome process of troubleshooting the WAN.
Real AI. Real Results. Mist AI Customer Testimonials.Juniper Networks
See what Juniper customers have to say about how Mist AI has statistically improved the way they run their business. For more information on how Mist AI can improve your network, join us for Transformation Thursdays at: https://www.juniper.net/us/en/forms/ai-driven-demo/
Juniper Networks is introducing the fourth expansion of the AI-driven enterprise to bring artificial intelligence to the LAN, WLAN and now WAN for end-to-end optimization of user experiences and proactive troubleshooting driven by Mist AI.
With the new Juniper Mist WAN Assurance service, customers will receive even better automation and insight in branch locations with AI-driven service level expectations, client-to-cloud event correlation for rapid fault resolution, anomaly detection, and proactive support.
Are you able to deliver reliable experiences for connected devicesJuniper Networks
Here are 5 things you can do with Mist Wired Assurance. With Wired Assurance, you can leverage Juniper EX switch telemetry to enable simpler operations, shorter mean time to repair, and better visibility into end-user experiences for your connected devices, including access points, servers, and IoT endpoints.
It's time to scale way back on those support tickets from your branch users. Security shouldn’t come at the cost of performance. Register now to attend a live demo. You may be eligible to receive a free SRX!
https://www.juniper.net/sdwan-thursdays
Securing IoT at Scale Requires a Holistic ApproachJuniper Networks
Enterprises are moving from small IoT pilots to large-scale
implementations. What are the biggest security
concerns, and how can you overcome them?
Juniper partnered with the IoT Institute to find out. We surveyed 176 technology decision makers and
influencers who have been personally involved in their IoT security strategy and implementations. Here's what the survey found:
We recently conducted a 16-country survey to gauge the appetite for Digital Cohesion. The results suggest business and consumer users see Digital Cohesion as an inevitable, positive societal development.
SDN and NFV: Transforming the Service Provider OrganizationJuniper Networks
As competition increases, service providers must be able to respond quickly to competitive pressures and rapidly evolving customer demands. Learn how NFV and SDN allows service providers to embrace a holistic approach to their business transformation and maximize existing capabilities: http://juni.pr/1JQZYOl
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveJuniper Networks
Service providers are facing more and more pressure as customers demand immediacy. Learn how adopting a carrier-grade, open network platform closes the innovation gap to create value for your network. http://juni.pr/1JQZYOl
Network service providers—those with access networks like DSL, cable, or mobile—continue
to face a dual threat: rising operating expenses associated with explosive bandwidth growth
and declining revenues driven by commoditization. A true Telco cloud, featuring automation
and dynamic scalability, becomes a comprehensive delivery platform enabling network service
providers to offer differentiated services that solve their customer’s business demands.
With mobile subscriptions expected to reach 8.5 billion users by the end of 2016, mobile attack surfaces are growing at an alarming rate. Juniper’s SRX5800 is primed for this increase - with speeds up to 2 Tbps the SRX5800 enables customers to inspect more traffic faster. Mobile has met its match. http://juni.pr/1MKBQDu
High performance data center computing using manageable distributed computingJuniper Networks
Terrapin Trading Show Chicago, Thursday, June 4
Andy Bach, FSI Architect, Juniper Networks
Distributed computing concepts (QFX5100-AA)
Scale and performance enhancements (QFX10000 Series)
Automation capabilities (tie in QFX-PFA)
Larry Van Deusen, Director of the Network Integration Business Unit, Dimension Data
Automation
Value Added Partner Services
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
2. A GLOBAL STUDY INDEXING
CONSUMER CONFIDENCE
IN MOBILITY
The mobile ecosystem of devices, services and networks is at a critical inflection
point. While the mobile revolution is unleashing massive opportunities in both
emerging and mature economies, it is also increasing in complexity and confusion.
The reality is the lightning-fast adoption of powerful, smart devices is outpacing
society’s ability to secure them. Today, trust in mobility hangs in the balance.
In March 2012, Juniper Networks commissioned a global
survey of 4,037 mobile device users and IT decision-makers
in the United States, United Kingdom, Germany, China
and Japan to benchmark trust in mobile technologies and
determine how trends in mobile security and reliability
influence attitudes and behaviors 1.
The following findings from Juniper Networks’ first
Trusted Mobility Index reveal a need to create greater trust
and confidence in mobility for both individuals and businesses
in order for the technology to reach its full potential.
2
3. A Complex and Confusing Mobile Landscape
The following findings from Juniper Networks’ first Trusted Mobility Index reveal a need to create greater trust
and confidence in mobility for both individuals and businesses in order for the technology to reach its full potential.
The mobile landscape is multiplying. The rapid evolution of
mobile devices, applications and the networks that support
them has put computing power once exclusive to computers
into the pockets of 4.1 billion people worldwide2.
According to Juniper Networks’ survey, mobile users
worldwide own an average of three Internet-connected
devices – from smartphones and tablets to eReaders
and portable video game systems. Nearly one in five people
(18 percent) own five or more devices. And today, people
depend on these devices for everything from financial
transactions and business operations to personal connections.
People are using their mobile devices to access the most
sensitive personal information. Over three-quarters
(76 percent) of global respondents report they use these
mobile devices to access sensitive data, such as online
banking or personal medical information.
This trend is even more pronounced with those who also use
their personal mobile devices for business purposes. Nearly
nine in ten (89 percent) business users, often referred to as
prosumers, say they use their mobile device to access critical
work information.
The crossover of personal mobile devices in the workplace only
increases the complexity in the mobile landscape.
3
4. Mobility in the Enterprise Raises the Stakes
As personal mobile devices and services are used to access sensitive business information, they are also
driving the need for greater levels of trust in mobility – from both users and IT managers. Yet this study,
as well as recent first-hand research from Juniper Networks into mobile threats, shows that trust may
not yet be warranted.
The blurring of personal and professional technologies is
placing significant new pressures on the IT administrators
who are responsible for protecting company networks and
the information employees are accessing.
IT leaders are feeling pressure from both senior management
(33 percent) as well as rank and file employees (23 percent)
and often both (43 percent) to support a “bring your own
device” (BYOD) policy.
Meanwhile many employees circumvent their employers’
official mobile device policies, with nearly half of all
respondents who use their personal device for work (41
percent) doing so without permission from their company.
This stealth adoption of mobile devices in the enterprise
creates a complex management task for IT professionals.
IT leaders reported a variety of concerns with the prospect
of employee personal devices on their networks, including
security breaches due to lost or stolen devices (41 percent),
as well as the required knowledge to manage different
devices (40 percent), operating systems (38 percent) and
security protocols (37 percent), and the risk of employees
introducing malware to the network (32 percent).
Based on the report’s findings, these concerns are justified.
Already today, nearly one-third (30 percent) of all IT leaders
report their company has experienced a security threat as a
result of personal mobile devices accessing company data.
In China, that number doubles, with almost two-thirds
(69 percent) of IT leaders reporting they have experienced
a security threat.
4
5. Mobile Security Threats Increasing
First-hand research from Juniper Networks Mobile Threat
Center found that malware targeting mobile devices increased
155 percent in 2011 with threats continuing to grow in 2012.
In the first three months of 2012, Juniper Networks Mobile
Threat Center identified 8,608 new mobile malware samples,
which represents a 30 percent increase of all known malware.
Most concerning is the rapid growth in spyware designed to
steal sensitive personal, financial and work information from
mobile devices. The total number of spyware samples more
than doubled in just the first quarter of 2012 alone.
While the threats to mobile devices continue to increase,
actions that consumers take to protect themselves have not
kept pace.
When asked about precautions they are taking to protect their
mobile lives, less than half of global respondents said they:
• Read terms and conditions before initiating a download to
their mobile device
• Manually set data security features and settings for
applications they install on their device
• Research applications to ensure they are trustworthy
Further, 72 percent of consumer respondents report they
connect to unsecure Wi-Fi networks or do not even know
the difference between a secure and unsecure network.
5
6. Trust in Mobility at a Crossroads
Rapidly increasing use of mobile technology at home and work, combined with security threats targeting
mobile devices, has put mobility at a crossroads in trust. Most people simply do not know if they should
trust the mobile services they use for critical personal and business purposes.
According to Juniper Networks’ survey, mobile device As the mobile ecosystem continues to increase in complexity
and service adoption is outpacing the level of trust and over the next few years, the confidence of this huge population
confidence in those devices and services. of undecided mobile users could either rise or fall. The key to
building trust in mobility hinges on the industry’s ability
Today, just 15 percent of people have a great deal of
to address mobile security issues.
confidence in the security of their mobile devices while
an equally small minority (18 percent) has little to no This begs the question, what and who will be key to building
confidence. In some markets, mobile device users are even trust and confidence in mobility for both individuals and
less trusting. For example, in Japan, just 4 percent of mobile businesses?
users have a great deal of confidence, while in Germany
25 percent of respondents say they have no confidence.
Still, the vast majority of people globally (63 percent) have yet
to make up their minds about their trust in mobility, indicating
only some confidence in the security of their devices.
Further, when looking across the services accessed on those
devices, most indicate moderate or no confidence in security
even in those services where trust is paramount:
• Online banking: 51 percent have moderate confidence;
16 percent have little to no confidence
• Healthcare services: 44 percent have moderate confidence;
20 percent have little to no confidence
• Online shopping: 60 percent have moderate confidence;
18 percent have little to no confidence
• Business email: 45 percent have moderate confidence;
13 percent have little to no confidence
• Social networking: 36 percent have moderate confidence;
39 percent have little to no confidence
Projecting these findings on the general population of mobile
users, millions of people are using mobile technologies and
services today that they do not necessarily trust.
Juniper Networks’ research also found the majority of people
(71 percent) would alter their mobile behavior or abandon
mobile services altogether if they experience a real or
percieved security or privacy incident. Of that group:
• 78 percent would stop using online banking
• 57 percent would no longer send private communications
• 54 percent would no longer view medical information
• 52 percent would no longer view work-related information
6
7. Key Factors in Trust
Juniper Networks’ research found mobile service providers, device manufacturers, software developers,
networking companies and security experts must work together to establish greater trust in mobility.
And importantly, the rise of BYOD means employers play a role unlike any mobile vendor in building trust.
This research shows a trusted mobile experience starts with
the network. When asked what has the greatest impact on
their trust in mobile devices, respondents ranked network
security (69 percent) and network reliability (45 percent) as
the top two drivers, followed by device security (43 percent).
When asked whom they hold most responsible for protecting
their sensitive data, 63 percent of mobile users hold those they
often have the most direct relationship with accountable –
service providers. Service providers were followed by device
manufacturers (38 percent) and software security providers
(34 percent).
Businesses also bear a significant amount of the burden. Nine
out of ten people using personal devices for work say that
employers should provide the security necessary to protect
their personal devices.
Equally important to critical networks and those responsible
for protecting data are the trusted resources that consumers
seek out for advice on mobile security issues.
The survey found that today, there is no single resource that
mobile users turn to for advice. People look to industry security
experts (20 percent), service providers (14 percent), software
security providers (13 percent) and device manufacturers (10
percent).
It is important that all of these groups work together to establish
more secure and trusted mobile experiences. With 82 percent
of respondents agreeing that there will be more mobile security
challenges in the next five years, the time for action is now.
7
8. Building Trust in Mobility
A single security event can erode trust at once. But creating a safer and more trusted mobile experience
requires a sustained, collective effort. Building trust in mobility is just as important as building great
networks and powerful applications.
While stopping every attack is impossible, establishing • Working across competitive lines to collectively combat
a higher level of trust before it occurs will help inoculate threats and preserve consumer safety
against the fallout. • Creating public-private partnerships
• Embracing new ways of working and helping IT leaders
Juniper Networks’ vision for trusted mobility goes well beyond
protect the increasingly mobile workforce
creating solutions. It is an effort to engage all that have a
stake in the mobile Internet. This means:
For more information on Juniper Networks’ Trusted Mobility Index, visit www.juniper.net/trustedmobility.
1
Juniper Networks Trusted Mobility Index Methodology:
The first Trusted Mobility Index survey was conducted by StrategyOne, an independent research firm, on behalf of Juniper Networks, from March 9 to March 26, 2012.
The 4,037 respondents include consumers, prosumers and IT decision-makers (ITDMs) in the United States, United Kingdom, Germany, Japan and China.
For the purposes of this study, consumers are a representative sample of adults (aged 18+) who own at least one mobile device. Prosumers are adults who use at least one mobile device
for business purposes. ITDMs are those currently employed as an IT professional in a role where they make decisions about which products and services their company uses.
2
Ericsson, “Traffic and Market Data Report,” February 2012, http://www.ericsson.com/res/docs/2012/tmd_report_feb_web.pdf
8
9. Corporate and Sales Headquarters APAC Headquarters EMEA Headquarters
Juniper Networks, Inc. Juniper Networks (Hong Kong) Juniper Networks Ireland
1194 North Mathilda Avenue 26/F, Cityplaza One Airside Business Park
Sunnyvale, CA 94089 USA 1111 King’s Road Swords, County Dublin, Ireland
Phone: 888.JUNIPER (888.586.4737) Taikoo Shing, Hong Kong Phone: 35.31.8903.600
or 408.745.2000 Phone: 852.2332.3636 EMEA Sales: 00800.4586.4737
Fax: 408.745.2100 Fax: 852.2574.7803 Fax: 35.31.8903.601
www.juniper.net
Copyright 2012 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos, NetScreen, and ScreenOS are
registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks,
or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies
in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.
7100155-001-EN April 2012 Printed on recycled paper