• +353-1-415-1241(GMT OFFICE HOURS)
  • 1-800-526-8630(US/CAN TOLL FREE)
  • 1-917-300-0470(EST OFFICE HOURS)
GI mSecurity 2011 Survey Report Premium Edition Product Image

GI mSecurity 2011 Survey Report Premium Edition

  • Published: April 2012
  • Region: Global
  • 95 Pages
  • Goode Intelligence

The mSecurity Survey 2011 Report premium edition includes all data from the past three years of Goode Intelligence mobile security surveys covering the years 2009-2011 in addition to the full Mobile Security survey report for 2011.

The GI mSecurity 2011 survey report premium edition provides a detailed picture of how organisations currently view mobile security (mSecurity) and collates responses from information security professionals and IT managers across the globe regarding key mobile security themes.

Question topics covered in the report include:

- How organisations are tackling the security problems posed by smart mobile devices (SMD)
- The impact of the BYOD trend
- How information security professionals rank the security of smartphones
- How prepared and equipped businesses are to deal with these unique challenges
- The impact of mobile device management (MDM) solutions with actual adoption rates
- The mSecurity incidents that have been reported within organisations, including malware, voice interception, data loss and theft with expert and independent analysis to determine if challenges like mobile malware is actually a real threat

Coverage

The READ MORE >

Methodology
Definition
Executive Summary
Who Took Part
Sector
Regions
Role
Organisation Size
mSecurity Policy, Regulation and Standards
Security Policy
Information Security Standards and Frameworks
mSecurity Regulation
Acceptable Use Policy (AUP)
Summary
mSecurity Awareness and Mobility Strategy
mSecurity Awareness
Mobility Strategy
Summary
mSecurity Education
mSecurity and mobility trends
Procurement – Who is responsible for purchasing smart mobile devices?
Management and Support
Smartphone Adoption
Tablet Adoption – The rise of the tablets
Security Ranking of Mobile Platforms
Consumerisation
Mobile Device Management (MDM) Adoption
Trends Summary
Smart Mobile Devices and Network Access
Local Network Access
Remote Network Access
Smartphone Virtual Private Network (VPN) Usage
Summary
Smart Mobile Devices and Data
Data Storage
Company-owned devices
Mobile BYOD - personally-owned devices
Data Encryption
Company-owned devices
Mobile BYOD - personally-owned devices
Security threats from unauthorised loss of information from smart mobile devices
Mobile Data Loss Threat Perception
Summary
Goode Intelligence threat rating – data loss
Current (2011) threat rating
Short-term future (2011-2013) threat rating
Smart Mobile Devices and Voice
Summary
The mobile phone as an authentication device
Summary
Mobile Malware (MM)
Mobile Anti-Malware Products and Services Adoption
Mobile Malware Incidents
Mobile Malware Threat Perception
Summary
Goode Intelligence threat rating
Current (2011) threat rating
Short-term future (2011-2013) threat rating
Mobile Device Anti-Theft Products and Services
Summary
Summary and Outlook
Policy, Awareness and Strategy
Trends
Mobile Platforms
Consumerisation of IT (CoIT) and Bring Your Own Device (BYOD)
Mobile Malware
mSecurity Products and Services
Mobile authentication products and services
Mobile voice protection
About Goode Intelligence
Appendix A: mSecurity Survey Data 2009-2011
Question 1: Does your organisation have a documented security policy?
Question 2: Does your organisation have a specific documented security policy for mobile devices?
Question 3: Does your organisation refer to mobile devices within an Acceptable User Policy (AUP)?
Question 4: In your opinion, do security standards and frameworks such as ISO 27001/2, COBIT and ISF standard of good practice, adequately cover mobile?
Question 5: Is your organisation governed by any specific industry regulation?
Question 6: At what level do you perceive your current awareness of msecurity to be?
Question 7: Do you feel that the current levels of general awareness for mSecurity is adequate?
Question 8: Which of the following do you use to find information regarding mSecurity threats?
Question 9: How concerned are you about mSecurity?
Question 10: How important is mSecurity in your overall information security strategy?
Question 11: who is responsible for purchasing mobile devices in your organisations?
Question 12: who is responsible for managing and supporting company-owned mobile devices in your organisation?
Question 13: what mobile platforms are being used within your organisation?
Question 14: has your organisation adopted tablet computers that run mobile platforms?
Question 15: Mobile BYOD: Does your organisation allow staff-owned/personal mobile devices to be used for company business?
Question 16: Does your information security function have any responsibility for the purchase of company mobile devices?
Question 17: Does your organisation have resource (staff) allocated to msecurity functions?
Question 18: How many people are allocated to msecurity functions?
Question 19: What department does the msecurity resource work in?
Question 20: Do you intend to recruit for an msecurity role?
Question 21: do you allow mobile devices to connect to your local network?
Question 22: if you do not allow mobile devices to connect to a local network then why is this?
Question 23: do you allow mobile devices to connect to network remotely?
Question 24: Do you use a VPN client on the mobile device?
Question 25: if you do not allow mobile devices to connect remotely then why is this?
Question 26: do you allow your users to store company data on their company-owned mobile devices?
Question 27: if you do not allow users to store company data on their company-owned mobile devices then why is this?
Question 28: do you encrypt data on company-owned mobile devices?
Question 29: do you allow your users to store company data on their personally-owned mobile devices?
Question 30: if you do not allow users to store company data on their personally-owned mobile devices then why is this?
Question 31: do you encrypt data on personally-owned mobile devices?
Question 32: do you manage company-owned mobile devices using a mobile device management (MDM) solution?
Question 33: if you are planning to deploy an mdm solution then when do you plan to do so?
Question 34: if you answered no to deploying mdm solutions then why is this?
Question 35: Do you percieve that mobile device management within the enterprise is a problem
Question 36: does your organisation currently use mobile devices as an authentication device?
Question 37: if you are planning to deploy mobile device-based authentication then when do you plan to do so?
Question 38: if you answered no to deploying mobile device-based authentication then why is this?
Question 39: does your organisation currently use mobile endpoint anti-malware solutions?
Question 40: if you are planning to deploy mobile device anti-malware solutions then when do you plan to do so?
Question 41: if you answered no to deploying mobile device anti-malware solutions then why is this?
Question 42: does your organisation currently use data encryption solutions on companyowned mobile devices to protect information?
Question 43: is the product part of the standard mobile platform or a third-party solution?
Question 44: why are you using standard mobile platform encryption rather then using a third-party product?
Question 45: if you answered no to deploying mobile device-based data encryption solutions then why is this?
Question 46: does your organisation currently use voice encryption solutions on companyowned mobile devices?
Question 47: if you answered no to deploying mobile device-based voice encryption solutions then why is this?
Question 48: does your organisation currently use mobile device-based anti-theft solutions?
Question 49: is the product part of the standard mobile platform or a third-party solution?
Question 50: why are you using standard mobile platform anti-theft rather then using a third-party solution?
Question 51: has your organisation experienced a mobile malware incident (mobile malware infection)
Question 52: in your opinion, what is the current threat from mobile malware?
Question 53: how do you feel that the threat from mobile malware will be within the next two years?
Question 54: has your organisation experienced unauthorised loss of information from a mobile device?
Question 55: in your opinion, what is the current threat from unauthorised loss of information from a mobile device?
Question 56: how do you feel that the threat from unauthorised loss of information from a mobile device? will be within the next two years?

Note: Product cover images may vary from those shown

RELATED PRODUCTS

Our Clients

Our clients' logos