SlideShare a Scribd company logo
TRUSTED MOBILITY INDEX
Published May 2012
A GLOBAL STUDY INDEXING
CONSUMER CONFIDENCE
IN MOBILITY
The mobile ecosystem of devices, services and networks is at a critical inflection
point. While the mobile revolution is unleashing massive opportunities in both
emerging and mature economies, it is also increasing in complexity and confusion.
The reality is the lightning-fast adoption of powerful, smart devices is outpacing
society’s ability to secure them. Today, trust in mobility hangs in the balance.

In March 2012, Juniper Networks commissioned a global
survey of 4,037 mobile device users and IT decision-makers
in the United States, United Kingdom, Germany, China
and Japan to benchmark trust in mobile technologies and
determine how trends in mobile security and reliability
influence attitudes and behaviors 1.

The following findings from Juniper Networks’ first
Trusted Mobility Index reveal a need to create greater trust
and confidence in mobility for both individuals and businesses
in order for the technology to reach its full potential.




                                                                                 2
A Complex and Confusing Mobile Landscape
The following findings from Juniper Networks’ first Trusted Mobility Index reveal a need to create greater trust
and confidence in mobility for both individuals and businesses in order for the technology to reach its full potential.

The mobile landscape is multiplying. The rapid evolution of
mobile devices, applications and the networks that support
them has put computing power once exclusive to computers
into the pockets of 4.1 billion people worldwide2.

According to Juniper Networks’ survey, mobile users
worldwide own an average of three Internet-connected
devices – from smartphones and tablets to eReaders
and portable video game systems. Nearly one in five people
(18 percent) own five or more devices. And today, people
depend on these devices for everything from financial
transactions and business operations to personal connections.

People are using their mobile devices to access the most
sensitive personal information. Over three-quarters
(76 percent) of global respondents report they use these
mobile devices to access sensitive data, such as online
banking or personal medical information.

This trend is even more pronounced with those who also use
their personal mobile devices for business purposes. Nearly
nine in ten (89 percent) business users, often referred to as
prosumers, say they use their mobile device to access critical
work information.

The crossover of personal mobile devices in the workplace only
increases the complexity in the mobile landscape.




                                                                                                                          3
Mobility in the Enterprise Raises the Stakes
As personal mobile devices and services are used to access sensitive business information, they are also
driving the need for greater levels of trust in mobility – from both users and IT managers. Yet this study,
as well as recent first-hand research from Juniper Networks into mobile threats, shows that trust may
not yet be warranted.

The blurring of personal and professional technologies is
placing significant new pressures on the IT administrators
who are responsible for protecting company networks and
the information employees are accessing.

IT leaders are feeling pressure from both senior management
(33 percent) as well as rank and file employees (23 percent)
and often both (43 percent) to support a “bring your own
device” (BYOD) policy.

Meanwhile many employees circumvent their employers’
official mobile device policies, with nearly half of all
respondents who use their personal device for work (41
percent) doing so without permission from their company.
This stealth adoption of mobile devices in the enterprise
creates a complex management task for IT professionals.

IT leaders reported a variety of concerns with the prospect
of employee personal devices on their networks, including
security breaches due to lost or stolen devices (41 percent),
as well as the required knowledge to manage different
devices (40 percent), operating systems (38 percent) and
security protocols (37 percent), and the risk of employees
introducing malware to the network (32 percent).

Based on the report’s findings, these concerns are justified.
Already today, nearly one-third (30 percent) of all IT leaders
report their company has experienced a security threat as a
result of personal mobile devices accessing company data.
In China, that number doubles, with almost two-thirds
(69 percent) of IT leaders reporting they have experienced
a security threat.




                                                                                                              4
Mobile Security Threats Increasing
First-hand research from Juniper Networks Mobile Threat
Center found that malware targeting mobile devices increased
155 percent in 2011 with threats continuing to grow in 2012.

In the first three months of 2012, Juniper Networks Mobile
Threat Center identified 8,608 new mobile malware samples,
which represents a 30 percent increase of all known malware.
Most concerning is the rapid growth in spyware designed to
steal sensitive personal, financial and work information from
mobile devices. The total number of spyware samples more
than doubled in just the first quarter of 2012 alone.

While the threats to mobile devices continue to increase,
actions that consumers take to protect themselves have not
kept pace.

When asked about precautions they are taking to protect their
mobile lives, less than half of global respondents said they:
•	 Read terms and conditions before initiating a download to
   their mobile device
•	 Manually set data security features and settings for
   applications they install on their device
•	 Research applications to ensure they are trustworthy

Further, 72 percent of consumer respondents report they
connect to unsecure Wi-Fi networks or do not even know
the difference between a secure and unsecure network.




                                                                5
Trust in Mobility at a Crossroads
Rapidly increasing use of mobile technology at home and work, combined with security threats targeting
mobile devices, has put mobility at a crossroads in trust. Most people simply do not know if they should
trust the mobile services they use for critical personal and business purposes.

According to Juniper Networks’ survey, mobile device                As the mobile ecosystem continues to increase in complexity
and service adoption is outpacing the level of trust and            over the next few years, the confidence of this huge population
confidence in those devices and services.                           of undecided mobile users could either rise or fall. The key to
                                                                    building trust in mobility hinges on the industry’s ability
Today, just 15 percent of people have a great deal of
                                                                    to address mobile security issues.
confidence in the security of their mobile devices while
an equally small minority (18 percent) has little to no             This begs the question, what and who will be key to building
confidence. In some markets, mobile device users are even           trust and confidence in mobility for both individuals and
less trusting. For example, in Japan, just 4 percent of mobile      businesses?
users have a great deal of confidence, while in Germany
25 percent of respondents say they have no confidence.

Still, the vast majority of people globally (63 percent) have yet
to make up their minds about their trust in mobility, indicating
only some confidence in the security of their devices.

Further, when looking across the services accessed on those
devices, most indicate moderate or no confidence in security
even in those services where trust is paramount:
•	 Online banking: 51 percent have moderate confidence; 	
   16 percent have little to no confidence
•	 Healthcare services: 44 percent have moderate confidence; 	
   20 percent have little to no confidence
•	 Online shopping: 60 percent have moderate confidence; 	
   18 percent have little to no confidence
•	 Business email: 45 percent have moderate confidence; 	
   13 percent have little to no confidence
•	 Social networking: 36 percent have moderate confidence; 	
   39 percent have little to no confidence

Projecting these findings on the general population of mobile
users, millions of people are using mobile technologies and
services today that they do not necessarily trust.

Juniper Networks’ research also found the majority of people
(71 percent) would alter their mobile behavior or abandon
mobile services altogether if they experience a real or
percieved security or privacy incident. Of that group:
•	 78 percent would stop using online banking
•	 57 percent would no longer send private communications
•	 54 percent would no longer view medical information
•	 52 percent would no longer view work-related information




                                                                                                                                   6
Key Factors in Trust
Juniper Networks’ research found mobile service providers, device manufacturers, software developers,
networking companies and security experts must work together to establish greater trust in mobility.
And importantly, the rise of BYOD means employers play a role unlike any mobile vendor in building trust.

This research shows a trusted mobile experience starts with
the network. When asked what has the greatest impact on
their trust in mobile devices, respondents ranked network
security (69 percent) and network reliability (45 percent) as
the top two drivers, followed by device security (43 percent).

When asked whom they hold most responsible for protecting
their sensitive data, 63 percent of mobile users hold those they
often have the most direct relationship with accountable –
service providers. Service providers were followed by device
manufacturers (38 percent) and software security providers
(34 percent).

Businesses also bear a significant amount of the burden. Nine
out of ten people using personal devices for work say that
employers should provide the security necessary to protect
their personal devices.

Equally important to critical networks and those responsible
for protecting data are the trusted resources that consumers
seek out for advice on mobile security issues.

The survey found that today, there is no single resource that
mobile users turn to for advice. People look to industry security
experts (20 percent), service providers (14 percent), software
security providers (13 percent) and device manufacturers (10
percent).

It is important that all of these groups work together to establish
more secure and trusted mobile experiences. With 82 percent
of respondents agreeing that there will be more mobile security
challenges in the next five years, the time for action is now.




                                                                                                            7
Building Trust in Mobility
A single security event can erode trust at once. But creating a safer and more trusted mobile experience
requires a sustained, collective effort. Building trust in mobility is just as important as building great
networks and powerful applications.

While stopping every attack is impossible, establishing                                               •	 Working across competitive lines to collectively combat 	
a higher level of trust before it occurs will help inoculate                                             threats and preserve consumer safety
against the fallout.                                                                                  •	 Creating public-private partnerships
                                                                                                      •	 Embracing new ways of working and helping IT leaders 	
Juniper Networks’ vision for trusted mobility goes well beyond
                                                                                                         protect the increasingly mobile workforce
creating solutions. It is an effort to engage all that have a
stake in the mobile Internet. This means:


For more information on Juniper Networks’ Trusted Mobility Index, visit www.juniper.net/trustedmobility.




  1
      Juniper Networks Trusted Mobility Index Methodology:
The first Trusted Mobility Index survey was conducted by StrategyOne, an independent research firm, on behalf of Juniper Networks, from March 9 to March 26, 2012.
The 4,037 respondents include consumers, prosumers and IT decision-makers (ITDMs) in the United States, United Kingdom, Germany, Japan and China.
For the purposes of this study, consumers are a representative sample of adults (aged 18+) who own at least one mobile device. Prosumers are adults who use at least one mobile device
for business purposes. ITDMs are those currently employed as an IT professional in a role where they make decisions about which products and services their company uses.

  2
      Ericsson, “Traffic and Market Data Report,” February 2012, http://www.ericsson.com/res/docs/2012/tmd_report_feb_web.pdf




                                                                                                                                                                                         8
Corporate and Sales Headquarters                           APAC Headquarters                                      EMEA Headquarters
Juniper Networks, Inc.                                     Juniper Networks (Hong Kong)                           Juniper Networks Ireland
1194 North Mathilda Avenue                                 26/F, Cityplaza One                                    Airside Business Park
Sunnyvale, CA 94089 USA                                    1111 King’s Road                                       Swords, County Dublin, Ireland
Phone: 888.JUNIPER (888.586.4737)                          Taikoo Shing, Hong Kong                                Phone: 35.31.8903.600
or 408.745.2000                                            Phone: 852.2332.3636                                   EMEA Sales: 00800.4586.4737
Fax: 408.745.2100                                          Fax: 852.2574.7803                                     Fax: 35.31.8903.601
www.juniper.net

Copyright 2012 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos, NetScreen, and ScreenOS are
registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks,
or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies
in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice.


7100155-001-EN        April 2012                        Printed on recycled paper

More Related Content

What's hot

Economist Intelligence Unit_mobile_data_120928
Economist Intelligence Unit_mobile_data_120928Economist Intelligence Unit_mobile_data_120928
Economist Intelligence Unit_mobile_data_120928
Datafield
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0
Javier Gonzalez
 
Mobile Technology - Tablets and Workplace Integration (Whitepaper)
Mobile Technology - Tablets and Workplace Integration (Whitepaper)Mobile Technology - Tablets and Workplace Integration (Whitepaper)
Mobile Technology - Tablets and Workplace Integration (Whitepaper)
Fuji Xerox Australia
 
Siliconslides
SiliconslidesSiliconslides
Siliconslides
Dawn Yankeelov
 
Survey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate Environments
Osterman Research, Inc.
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle east
team-abr
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentationrevaathey
 
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...
KKess
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Jim Kaplan CIA CFE
 
Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014
Spiceworks Ziff Davis
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective
Omlis
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
Symantec
 
Getting Going with Mobile (What Your Users Really Want!)
Getting Going with Mobile (What Your Users Really Want!)Getting Going with Mobile (What Your Users Really Want!)
Getting Going with Mobile (What Your Users Really Want!)
Forum One
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShowAdam Heller
 

What's hot (14)

Economist Intelligence Unit_mobile_data_120928
Economist Intelligence Unit_mobile_data_120928Economist Intelligence Unit_mobile_data_120928
Economist Intelligence Unit_mobile_data_120928
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0
 
Mobile Technology - Tablets and Workplace Integration (Whitepaper)
Mobile Technology - Tablets and Workplace Integration (Whitepaper)Mobile Technology - Tablets and Workplace Integration (Whitepaper)
Mobile Technology - Tablets and Workplace Integration (Whitepaper)
 
Siliconslides
SiliconslidesSiliconslides
Siliconslides
 
Survey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate EnvironmentsSurvey Report: Managing BYOD in Corporate Environments
Survey Report: Managing BYOD in Corporate Environments
 
Byod in the middle east
Byod in the middle eastByod in the middle east
Byod in the middle east
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...
2010 Shopping on the Job: ISACA's Online Holiday Shopping and Workplace Inten...
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014Weathering mobile-storm-report-october-2014
Weathering mobile-storm-report-october-2014
 
Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective Omlis Data Breaches Report - An Inside Perspective
Omlis Data Breaches Report - An Inside Perspective
 
Top Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your businessTop Seven Risks of Enterprise Mobility - How to protect your business
Top Seven Risks of Enterprise Mobility - How to protect your business
 
Getting Going with Mobile (What Your Users Really Want!)
Getting Going with Mobile (What Your Users Really Want!)Getting Going with Mobile (What Your Users Really Want!)
Getting Going with Mobile (What Your Users Really Want!)
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
 

Viewers also liked

Introdução ao Volante do SolidEdge ST
Introdução ao Volante do SolidEdge STIntrodução ao Volante do SolidEdge ST
Introdução ao Volante do SolidEdge ST
PLMX -Soluções para Negocios
 
Universal Edge Service: Innovation for the Next Decade
Universal Edge Service: Innovation for the Next DecadeUniversal Edge Service: Innovation for the Next Decade
Universal Edge Service: Innovation for the Next Decade
Juniper Networks
 
Solid edge dicas detalhamento grandes montagens
Solid edge dicas detalhamento grandes montagensSolid edge dicas detalhamento grandes montagens
Solid edge dicas detalhamento grandes montagensfixplmandre
 
Solid Edge Projete Melhor
Solid Edge Projete MelhorSolid Edge Projete Melhor
Solid Edge Projete Melhor
PLMX -Soluções para Negocios
 
Solid edge st9_presentation_es_mx
Solid edge st9_presentation_es_mxSolid edge st9_presentation_es_mx
Solid edge st9_presentation_es_mx
Natali Fosado
 
LASIK: COMPLICATIONS AND THEIR MANAGEMENT
LASIK: COMPLICATIONS AND THEIR MANAGEMENTLASIK: COMPLICATIONS AND THEIR MANAGEMENT
LASIK: COMPLICATIONS AND THEIR MANAGEMENT
Laxmi Eye Institute
 
Apostila solid edge
Apostila solid edgeApostila solid edge
Apostila solid edge
Victor Hugo Tavares
 

Viewers also liked (8)

Introdução ao Volante do SolidEdge ST
Introdução ao Volante do SolidEdge STIntrodução ao Volante do SolidEdge ST
Introdução ao Volante do SolidEdge ST
 
Universal Edge Service: Innovation for the Next Decade
Universal Edge Service: Innovation for the Next DecadeUniversal Edge Service: Innovation for the Next Decade
Universal Edge Service: Innovation for the Next Decade
 
Solid edge dicas detalhamento grandes montagens
Solid edge dicas detalhamento grandes montagensSolid edge dicas detalhamento grandes montagens
Solid edge dicas detalhamento grandes montagens
 
Solid Edge Projete Melhor
Solid Edge Projete MelhorSolid Edge Projete Melhor
Solid Edge Projete Melhor
 
Solid edge st9_presentation_es_mx
Solid edge st9_presentation_es_mxSolid edge st9_presentation_es_mx
Solid edge st9_presentation_es_mx
 
Modulo 1
Modulo 1Modulo 1
Modulo 1
 
LASIK: COMPLICATIONS AND THEIR MANAGEMENT
LASIK: COMPLICATIONS AND THEIR MANAGEMENTLASIK: COMPLICATIONS AND THEIR MANAGEMENT
LASIK: COMPLICATIONS AND THEIR MANAGEMENT
 
Apostila solid edge
Apostila solid edgeApostila solid edge
Apostila solid edge
 

Similar to Juniper Trusted Mobility Index 2012

Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
Ericsson
 
MEF Global Consumer Trust Report
MEF Global Consumer Trust ReportMEF Global Consumer Trust Report
MEF Global Consumer Trust Report
AVG Technologies
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
Booz Allen Hamilton
 
Accenture four keys digital trust
Accenture four keys digital trustAccenture four keys digital trust
Accenture four keys digital trust
OptimediaSpain
 
The future of digital trust
The future of digital trust The future of digital trust
The future of digital trust
Dario Caliendo
 
CIO Mobility Playbook
CIO Mobility PlaybookCIO Mobility Playbook
CIO Mobility Playbook
Juniper Networks
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docx
lorainedeserre
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerce
Alexander Decker
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerceAlexander Decker
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerceAlexander Decker
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOJim Romeo
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOJim Romeo
 
Consumer_Perception_Of_Electronic-commerce.pdf
Consumer_Perception_Of_Electronic-commerce.pdfConsumer_Perception_Of_Electronic-commerce.pdf
Consumer_Perception_Of_Electronic-commerce.pdf
RidhwanMG
 
Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015
Cellebrite
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
Echoworx
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & Thieves
Lorena Magee
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape
mercatoradvisory
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3Lumension
 

Similar to Juniper Trusted Mobility Index 2012 (20)

Ericsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety onlineEricsson ConsumerLab: Privacy, security and safety online
Ericsson ConsumerLab: Privacy, security and safety online
 
MEF Global Consumer Trust Report
MEF Global Consumer Trust ReportMEF Global Consumer Trust Report
MEF Global Consumer Trust Report
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
Accenture four keys digital trust
Accenture four keys digital trustAccenture four keys digital trust
Accenture four keys digital trust
 
The future of digital trust
The future of digital trust The future of digital trust
The future of digital trust
 
CIO Mobility Playbook
CIO Mobility PlaybookCIO Mobility Playbook
CIO Mobility Playbook
 
271 Information Governance for Mobile Devices .docx
271 Information Governance for Mobile Devices    .docx271 Information Governance for Mobile Devices    .docx
271 Information Governance for Mobile Devices .docx
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerce
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerce
 
An empirical study on factors influencing consumers’ trust in e commerce
 An empirical study on factors influencing consumers’ trust in e commerce An empirical study on factors influencing consumers’ trust in e commerce
An empirical study on factors influencing consumers’ trust in e commerce
 
2010 GISS EY
2010 GISS EY2010 GISS EY
2010 GISS EY
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
AST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIOAST-0002415_MobileSecurity-CIO
AST-0002415_MobileSecurity-CIO
 
Consumer_Perception_Of_Electronic-commerce.pdf
Consumer_Perception_Of_Electronic-commerce.pdfConsumer_Perception_Of_Electronic-commerce.pdf
Consumer_Perception_Of_Electronic-commerce.pdf
 
Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015Cellebrite Predictions Survey 2015
Cellebrite Predictions Survey 2015
 
Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!Fraudsters Hackers & Thieves!
Fraudsters Hackers & Thieves!
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & Thieves
 
Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape Biometrics: A New Wrinkle Changes the Authentication Landscape
Biometrics: A New Wrinkle Changes the Authentication Landscape
 
State of endpoint risk v3
State of endpoint risk v3State of endpoint risk v3
State of endpoint risk v3
 

More from Juniper Networks

Why Juniper, Driven by Mist AI, Leads the Market
 Why Juniper, Driven by Mist AI, Leads the Market Why Juniper, Driven by Mist AI, Leads the Market
Why Juniper, Driven by Mist AI, Leads the Market
Juniper Networks
 
Experience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseExperience the AI-Driven Enterprise
Experience the AI-Driven Enterprise
Juniper Networks
 
How AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANHow AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WAN
Juniper Networks
 
Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.
Juniper Networks
 
SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.
Juniper Networks
 
Are you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesAre you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devices
Juniper Networks
 
Stop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WANStop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WAN
Juniper Networks
 
Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachSecuring IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic Approach
Juniper Networks
 
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Juniper Networks
 
What's Your IT Alter Ego?
What's Your IT Alter Ego?What's Your IT Alter Ego?
What's Your IT Alter Ego?
Juniper Networks
 
Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?
Juniper Networks
 
Juniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCO
Juniper Networks
 
SDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider OrganizationSDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider Organization
Juniper Networks
 
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveNavigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
Juniper Networks
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks
Juniper Networks
 
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud
Juniper Networks
 
Juniper SRX5800 Infographic
Juniper SRX5800 InfographicJuniper SRX5800 Infographic
Juniper SRX5800 Infographic
Juniper Networks
 
Infographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionInfographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer Satisfaction
Juniper Networks
 
Infographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastInfographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning Fast
Juniper Networks
 
High performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingHigh performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computing
Juniper Networks
 

More from Juniper Networks (20)

Why Juniper, Driven by Mist AI, Leads the Market
 Why Juniper, Driven by Mist AI, Leads the Market Why Juniper, Driven by Mist AI, Leads the Market
Why Juniper, Driven by Mist AI, Leads the Market
 
Experience the AI-Driven Enterprise
Experience the AI-Driven EnterpriseExperience the AI-Driven Enterprise
Experience the AI-Driven Enterprise
 
How AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WANHow AI Simplifies Troubleshooting Your WAN
How AI Simplifies Troubleshooting Your WAN
 
Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.Real AI. Real Results. Mist AI Customer Testimonials.
Real AI. Real Results. Mist AI Customer Testimonials.
 
SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.SD-WAN, Meet MARVIS.
SD-WAN, Meet MARVIS.
 
Are you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devicesAre you able to deliver reliable experiences for connected devices
Are you able to deliver reliable experiences for connected devices
 
Stop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WANStop Doing These 5 Things with Your SD-WAN
Stop Doing These 5 Things with Your SD-WAN
 
Securing IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic ApproachSecuring IoT at Scale Requires a Holistic Approach
Securing IoT at Scale Requires a Holistic Approach
 
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?Smart Solutions for Smart Communities: What's Next & Who's Responsible?
Smart Solutions for Smart Communities: What's Next & Who's Responsible?
 
What's Your IT Alter Ego?
What's Your IT Alter Ego?What's Your IT Alter Ego?
What's Your IT Alter Ego?
 
Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?Are You Ready for Digital Cohesion?
Are You Ready for Digital Cohesion?
 
Juniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCOJuniper vSRX - Fast Performance, Low TCO
Juniper vSRX - Fast Performance, Low TCO
 
SDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider OrganizationSDN and NFV: Transforming the Service Provider Organization
SDN and NFV: Transforming the Service Provider Organization
 
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's PerspectiveNavigating the Uncertain World Facing Service Providers - Juniper's Perspective
Navigating the Uncertain World Facing Service Providers - Juniper's Perspective
 
vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks vSRX Buyer’s Guide infographic - Juniper Networks
vSRX Buyer’s Guide infographic - Juniper Networks
 
NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud NFV Solutions for the Telco Cloud
NFV Solutions for the Telco Cloud
 
Juniper SRX5800 Infographic
Juniper SRX5800 InfographicJuniper SRX5800 Infographic
Juniper SRX5800 Infographic
 
Infographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer SatisfactionInfographic: 90% MetaFabric Customer Satisfaction
Infographic: 90% MetaFabric Customer Satisfaction
 
Infographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning FastInfographic: Whack Hackers Lightning Fast
Infographic: Whack Hackers Lightning Fast
 
High performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computingHigh performance data center computing using manageable distributed computing
High performance data center computing using manageable distributed computing
 

Recently uploaded

ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 

Recently uploaded (20)

ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 

Juniper Trusted Mobility Index 2012

  • 2. A GLOBAL STUDY INDEXING CONSUMER CONFIDENCE IN MOBILITY The mobile ecosystem of devices, services and networks is at a critical inflection point. While the mobile revolution is unleashing massive opportunities in both emerging and mature economies, it is also increasing in complexity and confusion. The reality is the lightning-fast adoption of powerful, smart devices is outpacing society’s ability to secure them. Today, trust in mobility hangs in the balance. In March 2012, Juniper Networks commissioned a global survey of 4,037 mobile device users and IT decision-makers in the United States, United Kingdom, Germany, China and Japan to benchmark trust in mobile technologies and determine how trends in mobile security and reliability influence attitudes and behaviors 1. The following findings from Juniper Networks’ first Trusted Mobility Index reveal a need to create greater trust and confidence in mobility for both individuals and businesses in order for the technology to reach its full potential. 2
  • 3. A Complex and Confusing Mobile Landscape The following findings from Juniper Networks’ first Trusted Mobility Index reveal a need to create greater trust and confidence in mobility for both individuals and businesses in order for the technology to reach its full potential. The mobile landscape is multiplying. The rapid evolution of mobile devices, applications and the networks that support them has put computing power once exclusive to computers into the pockets of 4.1 billion people worldwide2. According to Juniper Networks’ survey, mobile users worldwide own an average of three Internet-connected devices – from smartphones and tablets to eReaders and portable video game systems. Nearly one in five people (18 percent) own five or more devices. And today, people depend on these devices for everything from financial transactions and business operations to personal connections. People are using their mobile devices to access the most sensitive personal information. Over three-quarters (76 percent) of global respondents report they use these mobile devices to access sensitive data, such as online banking or personal medical information. This trend is even more pronounced with those who also use their personal mobile devices for business purposes. Nearly nine in ten (89 percent) business users, often referred to as prosumers, say they use their mobile device to access critical work information. The crossover of personal mobile devices in the workplace only increases the complexity in the mobile landscape. 3
  • 4. Mobility in the Enterprise Raises the Stakes As personal mobile devices and services are used to access sensitive business information, they are also driving the need for greater levels of trust in mobility – from both users and IT managers. Yet this study, as well as recent first-hand research from Juniper Networks into mobile threats, shows that trust may not yet be warranted. The blurring of personal and professional technologies is placing significant new pressures on the IT administrators who are responsible for protecting company networks and the information employees are accessing. IT leaders are feeling pressure from both senior management (33 percent) as well as rank and file employees (23 percent) and often both (43 percent) to support a “bring your own device” (BYOD) policy. Meanwhile many employees circumvent their employers’ official mobile device policies, with nearly half of all respondents who use their personal device for work (41 percent) doing so without permission from their company. This stealth adoption of mobile devices in the enterprise creates a complex management task for IT professionals. IT leaders reported a variety of concerns with the prospect of employee personal devices on their networks, including security breaches due to lost or stolen devices (41 percent), as well as the required knowledge to manage different devices (40 percent), operating systems (38 percent) and security protocols (37 percent), and the risk of employees introducing malware to the network (32 percent). Based on the report’s findings, these concerns are justified. Already today, nearly one-third (30 percent) of all IT leaders report their company has experienced a security threat as a result of personal mobile devices accessing company data. In China, that number doubles, with almost two-thirds (69 percent) of IT leaders reporting they have experienced a security threat. 4
  • 5. Mobile Security Threats Increasing First-hand research from Juniper Networks Mobile Threat Center found that malware targeting mobile devices increased 155 percent in 2011 with threats continuing to grow in 2012. In the first three months of 2012, Juniper Networks Mobile Threat Center identified 8,608 new mobile malware samples, which represents a 30 percent increase of all known malware. Most concerning is the rapid growth in spyware designed to steal sensitive personal, financial and work information from mobile devices. The total number of spyware samples more than doubled in just the first quarter of 2012 alone. While the threats to mobile devices continue to increase, actions that consumers take to protect themselves have not kept pace. When asked about precautions they are taking to protect their mobile lives, less than half of global respondents said they: • Read terms and conditions before initiating a download to their mobile device • Manually set data security features and settings for applications they install on their device • Research applications to ensure they are trustworthy Further, 72 percent of consumer respondents report they connect to unsecure Wi-Fi networks or do not even know the difference between a secure and unsecure network. 5
  • 6. Trust in Mobility at a Crossroads Rapidly increasing use of mobile technology at home and work, combined with security threats targeting mobile devices, has put mobility at a crossroads in trust. Most people simply do not know if they should trust the mobile services they use for critical personal and business purposes. According to Juniper Networks’ survey, mobile device As the mobile ecosystem continues to increase in complexity and service adoption is outpacing the level of trust and over the next few years, the confidence of this huge population confidence in those devices and services. of undecided mobile users could either rise or fall. The key to building trust in mobility hinges on the industry’s ability Today, just 15 percent of people have a great deal of to address mobile security issues. confidence in the security of their mobile devices while an equally small minority (18 percent) has little to no This begs the question, what and who will be key to building confidence. In some markets, mobile device users are even trust and confidence in mobility for both individuals and less trusting. For example, in Japan, just 4 percent of mobile businesses? users have a great deal of confidence, while in Germany 25 percent of respondents say they have no confidence. Still, the vast majority of people globally (63 percent) have yet to make up their minds about their trust in mobility, indicating only some confidence in the security of their devices. Further, when looking across the services accessed on those devices, most indicate moderate or no confidence in security even in those services where trust is paramount: • Online banking: 51 percent have moderate confidence; 16 percent have little to no confidence • Healthcare services: 44 percent have moderate confidence; 20 percent have little to no confidence • Online shopping: 60 percent have moderate confidence; 18 percent have little to no confidence • Business email: 45 percent have moderate confidence; 13 percent have little to no confidence • Social networking: 36 percent have moderate confidence; 39 percent have little to no confidence Projecting these findings on the general population of mobile users, millions of people are using mobile technologies and services today that they do not necessarily trust. Juniper Networks’ research also found the majority of people (71 percent) would alter their mobile behavior or abandon mobile services altogether if they experience a real or percieved security or privacy incident. Of that group: • 78 percent would stop using online banking • 57 percent would no longer send private communications • 54 percent would no longer view medical information • 52 percent would no longer view work-related information 6
  • 7. Key Factors in Trust Juniper Networks’ research found mobile service providers, device manufacturers, software developers, networking companies and security experts must work together to establish greater trust in mobility. And importantly, the rise of BYOD means employers play a role unlike any mobile vendor in building trust. This research shows a trusted mobile experience starts with the network. When asked what has the greatest impact on their trust in mobile devices, respondents ranked network security (69 percent) and network reliability (45 percent) as the top two drivers, followed by device security (43 percent). When asked whom they hold most responsible for protecting their sensitive data, 63 percent of mobile users hold those they often have the most direct relationship with accountable – service providers. Service providers were followed by device manufacturers (38 percent) and software security providers (34 percent). Businesses also bear a significant amount of the burden. Nine out of ten people using personal devices for work say that employers should provide the security necessary to protect their personal devices. Equally important to critical networks and those responsible for protecting data are the trusted resources that consumers seek out for advice on mobile security issues. The survey found that today, there is no single resource that mobile users turn to for advice. People look to industry security experts (20 percent), service providers (14 percent), software security providers (13 percent) and device manufacturers (10 percent). It is important that all of these groups work together to establish more secure and trusted mobile experiences. With 82 percent of respondents agreeing that there will be more mobile security challenges in the next five years, the time for action is now. 7
  • 8. Building Trust in Mobility A single security event can erode trust at once. But creating a safer and more trusted mobile experience requires a sustained, collective effort. Building trust in mobility is just as important as building great networks and powerful applications. While stopping every attack is impossible, establishing • Working across competitive lines to collectively combat a higher level of trust before it occurs will help inoculate threats and preserve consumer safety against the fallout. • Creating public-private partnerships • Embracing new ways of working and helping IT leaders Juniper Networks’ vision for trusted mobility goes well beyond protect the increasingly mobile workforce creating solutions. It is an effort to engage all that have a stake in the mobile Internet. This means: For more information on Juniper Networks’ Trusted Mobility Index, visit www.juniper.net/trustedmobility. 1 Juniper Networks Trusted Mobility Index Methodology: The first Trusted Mobility Index survey was conducted by StrategyOne, an independent research firm, on behalf of Juniper Networks, from March 9 to March 26, 2012. The 4,037 respondents include consumers, prosumers and IT decision-makers (ITDMs) in the United States, United Kingdom, Germany, Japan and China. For the purposes of this study, consumers are a representative sample of adults (aged 18+) who own at least one mobile device. Prosumers are adults who use at least one mobile device for business purposes. ITDMs are those currently employed as an IT professional in a role where they make decisions about which products and services their company uses. 2 Ericsson, “Traffic and Market Data Report,” February 2012, http://www.ericsson.com/res/docs/2012/tmd_report_feb_web.pdf 8
  • 9. Corporate and Sales Headquarters APAC Headquarters EMEA Headquarters Juniper Networks, Inc. Juniper Networks (Hong Kong) Juniper Networks Ireland 1194 North Mathilda Avenue 26/F, Cityplaza One Airside Business Park Sunnyvale, CA 94089 USA 1111 King’s Road Swords, County Dublin, Ireland Phone: 888.JUNIPER (888.586.4737) Taikoo Shing, Hong Kong Phone: 35.31.8903.600 or 408.745.2000 Phone: 852.2332.3636 EMEA Sales: 00800.4586.4737 Fax: 408.745.2100 Fax: 852.2574.7803 Fax: 35.31.8903.601 www.juniper.net Copyright 2012 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice. 7100155-001-EN April 2012 Printed on recycled paper