SlideShare a Scribd company logo
1 of 14
Mobile Madness
Secure Mobility Survey reveals a critical gap between the
enterprise mobility vision and real-world implementations
How does your organisation compare?

accelerate your ambition
+1,600
IT and security professionals surveyed
globally confirm mobility is a top
priority for most IT departments.
These are Dimension Data’s
insights, gathered from IT
professionals spanning the
Americas, Asia
Pacific, Europe, Middle
East, and Africa
demonstrate that organisations
from around the world share
many of the same
priorities, challenges and risks.
Survey Highlights
32% have conducted a security assessment of key
applications touched by mobile devices

27% have well-defined network
policies for mobility in place

90% say they have no way to prevent staff from using
their personal mobile devices to access enterprise systems

23% freely allow users to download non-corporate
approved applications to improve their productivity
A critical gap exists between the
enterprise mobility vision and
real-world implementations
An IT roadmap that integrates with a business’s operational goals
and the organisation’s existing IT infrastructure – one that provides
for necessary resources and budget and also highlights potential
challenges – makes the difference between a successful
implementation and being derailed by unforeseen problems. This is
especially true when it comes to mobility, which is particularly
complex and touches most parts of an organisation’s network
infrastructure. For this reason, it isn’t surprising that of the 79% of
IT leaders who classify mobility as a top priority, 69% already
have a roadmap in place.

Learn more
Concern

O utweighs
action

The vast majority of respondents (82%) indicated that
employees at their organisations are utilising personal
mobile devices for work purposes. Analysts advocate that
organisations must have a clear mobility strategy that
ensures mobile technology is an investment that works hard
to deliver business value and meet the demands of an
increasingly mobile workforce. To some
extent, organisations are starting to listen to the analyst
community because today, 55% of the all the
organisations surveyed have a mobility roadmap of
some kind.
Learn more
Kn wing
where to start
Given the security issues found on the vast majority of
devices within mature networks, IT leaders are correct
to be concerned about data security and access control
issues relating to mobility. The importance of
protecting company data is a top mobility priority
for 71% of respondents, while 65% identified
access control as their top priority.

Learn more
What is surprising, given the extent to which they recognise the
risk, is that the area where IT leaders have the greatest amount
of control – conducting security audits of applications
touched by mobile devices – has not been a priority. Only
32% of respondents have taken that step.

Learn more
Productivity,
the user experience and security
Real-world employee productivity improvements, user
experience and security are not meeting expectations.
Over 90% of respondents believe that employees will
use their personal mobile devices to access enterprise
systems on their own and that IT does not have the
capability necessary to stop this activity. IT leaders
believe clear policies are needed to increase control,
improve visibility and decrease risk.
However, 80% of respondents also seek to create a
positive mobility experience for employees to help
increase productivity. To a large extent, employee
experience is important to IT leaders because 79% of
them recognise that an increase in worker productivity
is the greatest benefit offered by mobility.
Learn more
&
Security
Mobility

from the top down

Perhaps because of the limited investment that
inhibits employees from accessing the businesscritical applications needed to perform their job
functions, 24% of respondents indicate that
their organisation allows them to download
non-corporate applications to increase
productivity. This is another example of where
the gap between the overall vision and the way
in which it’s typically executed makes it difficult
for organisations to achieve their goal – while at
the same time creating new and often
undetectable security vulnerabilities.
Learn more
“

“

A mobility policy should be
monitoring the use of
corporate data, while
maintaining a userfriendly
interface.
Project manager, Spain
Local insights
Local insights
The EMDM helps you to better understand
your organisation’s current state of
development, performance, operational
practices and strategic execution, and
enables you to develop an enterprise
mobility roadmap for your organisation’s
future aspirations.

Learn how

Development Model

Dimension Data’s
Enterprise Mobility
Development Model
can help

More Related Content

What's hot

International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryInternational Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryCompTIA
 
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryInternational Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryCompTIA
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
SolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity SurveySolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity SurveySolarWinds
 
The Impact of COVID-19 on Public Sector IT
The Impact of COVID-19 on Public Sector ITThe Impact of COVID-19 on Public Sector IT
The Impact of COVID-19 on Public Sector ITInsight
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 - Mark - Fullbright
 
International Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand SummaryInternational Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand SummaryCompTIA
 
The changing face of ICT decision making
The changing face of ICT decision makingThe changing face of ICT decision making
The changing face of ICT decision makingTalkTalk Business
 
Platforms for Growth: Technology Innovations in the Insurance Industry
Platforms for Growth:Technology Innovations in the Insurance IndustryPlatforms for Growth:Technology Innovations in the Insurance Industry
Platforms for Growth: Technology Innovations in the Insurance IndustryState Street
 
Accenture 2015 Global Risk Management Study: North American Banking infographic
Accenture 2015 Global Risk Management Study: North American Banking infographicAccenture 2015 Global Risk Management Study: North American Banking infographic
Accenture 2015 Global Risk Management Study: North American Banking infographicaccenture
 
Survey: Security Analytics and Intelligence
Survey: Security Analytics and IntelligenceSurvey: Security Analytics and Intelligence
Survey: Security Analytics and IntelligenceSolarWinds
 
Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Emily Brady
 
International Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryInternational Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryCompTIA
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalSelectedPresentations
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-StudyTam Nguyen
 
2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of CybercrimeIDG
 
International Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK SummaryInternational Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK SummaryCompTIA
 
2021 IDG Security Priorities Study
2021 IDG Security Priorities Study2021 IDG Security Priorities Study
2021 IDG Security Priorities StudyIDG
 

What's hot (20)

International Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian SummaryInternational Technology Adoption & Workforce Issues Study - Canadian Summary
International Technology Adoption & Workforce Issues Study - Canadian Summary
 
Unlocking High Fidelity Security
Unlocking High Fidelity SecurityUnlocking High Fidelity Security
Unlocking High Fidelity Security
 
International Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian SummaryInternational Technology Adoption & Workforce Issues Study - Brazilian Summary
International Technology Adoption & Workforce Issues Study - Brazilian Summary
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
SolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity SurveySolarWinds Federal Cybersecurity Survey
SolarWinds Federal Cybersecurity Survey
 
The Impact of COVID-19 on Public Sector IT
The Impact of COVID-19 on Public Sector ITThe Impact of COVID-19 on Public Sector IT
The Impact of COVID-19 on Public Sector IT
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
 
International Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand SummaryInternational Technology Adoption & Workforce Issues Study - Thailand Summary
International Technology Adoption & Workforce Issues Study - Thailand Summary
 
The changing face of ICT decision making
The changing face of ICT decision makingThe changing face of ICT decision making
The changing face of ICT decision making
 
Platforms for Growth: Technology Innovations in the Insurance Industry
Platforms for Growth:Technology Innovations in the Insurance IndustryPlatforms for Growth:Technology Innovations in the Insurance Industry
Platforms for Growth: Technology Innovations in the Insurance Industry
 
Accenture 2015 Global Risk Management Study: North American Banking infographic
Accenture 2015 Global Risk Management Study: North American Banking infographicAccenture 2015 Global Risk Management Study: North American Banking infographic
Accenture 2015 Global Risk Management Study: North American Banking infographic
 
EMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-SecurityEMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-Security
 
Survey: Security Analytics and Intelligence
Survey: Security Analytics and IntelligenceSurvey: Security Analytics and Intelligence
Survey: Security Analytics and Intelligence
 
Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16Security results of_the_wqr_2015_16
Security results of_the_wqr_2015_16
 
International Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India SummaryInternational Technology Adoption & Workforce Issues Study - India Summary
International Technology Adoption & Workforce Issues Study - India Summary
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - final
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study
 
2018 U.S State of Cybercrime
2018 U.S State of Cybercrime2018 U.S State of Cybercrime
2018 U.S State of Cybercrime
 
International Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK SummaryInternational Technology Adoption & Workforce Issues Study - UK Summary
International Technology Adoption & Workforce Issues Study - UK Summary
 
2021 IDG Security Priorities Study
2021 IDG Security Priorities Study2021 IDG Security Priorities Study
2021 IDG Security Priorities Study
 

Similar to 2014 Secure Mobility Survey Report

Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee StudyHiten Sethi
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesJoseph DeFever
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowMapR Technologies
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersCisco Mobility
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudSymantec
 
Apperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility SurveyApperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility SurveyJennifer Walker
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education ConferanceTommy Riggins
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016Accenture Operations
 
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...Thierry Labro
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentationrevaathey
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentationrevaathey
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissEnterprise Mobile
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseSelectedPresentations
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk ManagementDMIMarketing
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementDMIMarketing
 
The impact of mobile devices on information security
The impact of mobile devices on information securityThe impact of mobile devices on information security
The impact of mobile devices on information securityBee_Ware
 
Assessing and Managing IT Security Risks
Assessing and Managing IT Security RisksAssessing and Managing IT Security Risks
Assessing and Managing IT Security RisksChris Ross
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise ReportOkta-Inc
 
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docxvickeryr87
 

Similar to 2014 Secure Mobility Survey Report (20)

Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
State of Security McAfee Study
State of Security McAfee StudyState of Security McAfee Study
State of Security McAfee Study
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
Security Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to KnowSecurity Analytics and Big Data: What You Need to Know
Security Analytics and Big Data: What You Need to Know
 
IT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leadersIT Guide for Mobility: Making the case for Security leaders
IT Guide for Mobility: Making the case for Security leaders
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
 
Apperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility SurveyApperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility Survey
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016The State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016
 
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to MissPreparing for the Future of Enterprise Mobility -- Insights Not to Miss
Preparing for the Future of Enterprise Mobility -- Insights Not to Miss
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
The impact of mobile devices on information security
The impact of mobile devices on information securityThe impact of mobile devices on information security
The impact of mobile devices on information security
 
Assessing and Managing IT Security Risks
Assessing and Managing IT Security RisksAssessing and Managing IT Security Risks
Assessing and Managing IT Security Risks
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise Report
 
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
 

More from DImension Data

End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityDImension Data
 
Cisco spark - reinventing collaboration
Cisco spark - reinventing collaborationCisco spark - reinventing collaboration
Cisco spark - reinventing collaborationDImension Data
 
What's new at the Tour de France
What's new at the Tour de FranceWhat's new at the Tour de France
What's new at the Tour de FranceDImension Data
 
Digital technology revolutionised the viewing experience of the tour de france
Digital technology revolutionised the viewing experience of the tour de franceDigital technology revolutionised the viewing experience of the tour de france
Digital technology revolutionised the viewing experience of the tour de franceDImension Data
 
Creating workspaces for tomorrow at the greatest cycling event in the world
Creating workspaces for tomorrow at the greatest cycling event in the worldCreating workspaces for tomorrow at the greatest cycling event in the world
Creating workspaces for tomorrow at the greatest cycling event in the worldDImension Data
 
Cloud: the race to digitisation is on!
Cloud: the race to digitisation is on! Cloud: the race to digitisation is on!
Cloud: the race to digitisation is on! DImension Data
 
6 stages of smart data at the Tour de France
6 stages of smart data at the Tour de France6 stages of smart data at the Tour de France
6 stages of smart data at the Tour de FranceDImension Data
 
Mobility at the network’s edge
Mobility at the network’s edgeMobility at the network’s edge
Mobility at the network’s edgeDImension Data
 
Zurich case study how to move a data centre in 8 days
Zurich case study  how to move a data centre in 8 daysZurich case study  how to move a data centre in 8 days
Zurich case study how to move a data centre in 8 daysDImension Data
 
Zurich case study: Reducing risk for insurance customers
Zurich case study: Reducing risk for insurance customersZurich case study: Reducing risk for insurance customers
Zurich case study: Reducing risk for insurance customersDImension Data
 
Strengthening Cybersecurity at the tour de france
Strengthening Cybersecurity at the tour de franceStrengthening Cybersecurity at the tour de france
Strengthening Cybersecurity at the tour de franceDImension Data
 
High-performance solutions for an international university
High-performance solutions for an international universityHigh-performance solutions for an international university
High-performance solutions for an international universityDImension Data
 
What's inhibiting your business productivity
What's inhibiting your business productivityWhat's inhibiting your business productivity
What's inhibiting your business productivityDImension Data
 
Creating powerful connections
Creating powerful connectionsCreating powerful connections
Creating powerful connectionsDImension Data
 
Case study: how information saves lives
Case study: how information saves livesCase study: how information saves lives
Case study: how information saves livesDImension Data
 
2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report2015 Global Threat Intelligence Report
2015 Global Threat Intelligence ReportDImension Data
 
How we helped Fujifilm keep its customers' special memories safe
How we helped Fujifilm keep its customers' special memories safeHow we helped Fujifilm keep its customers' special memories safe
How we helped Fujifilm keep its customers' special memories safeDImension Data
 
World’s first Cloud-enabled G20 Leaders’ Summit
World’s first Cloud-enabled G20 Leaders’ SummitWorld’s first Cloud-enabled G20 Leaders’ Summit
World’s first Cloud-enabled G20 Leaders’ SummitDImension Data
 
2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trendsDImension Data
 
Dimension Data Department Prime Minister and cabinet G20 case study
Dimension Data Department Prime Minister and cabinet G20 case studyDimension Data Department Prime Minister and cabinet G20 case study
Dimension Data Department Prime Minister and cabinet G20 case studyDImension Data
 

More from DImension Data (20)

End-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturityEnd-User Computing Insights: A study of digital maturity
End-User Computing Insights: A study of digital maturity
 
Cisco spark - reinventing collaboration
Cisco spark - reinventing collaborationCisco spark - reinventing collaboration
Cisco spark - reinventing collaboration
 
What's new at the Tour de France
What's new at the Tour de FranceWhat's new at the Tour de France
What's new at the Tour de France
 
Digital technology revolutionised the viewing experience of the tour de france
Digital technology revolutionised the viewing experience of the tour de franceDigital technology revolutionised the viewing experience of the tour de france
Digital technology revolutionised the viewing experience of the tour de france
 
Creating workspaces for tomorrow at the greatest cycling event in the world
Creating workspaces for tomorrow at the greatest cycling event in the worldCreating workspaces for tomorrow at the greatest cycling event in the world
Creating workspaces for tomorrow at the greatest cycling event in the world
 
Cloud: the race to digitisation is on!
Cloud: the race to digitisation is on! Cloud: the race to digitisation is on!
Cloud: the race to digitisation is on!
 
6 stages of smart data at the Tour de France
6 stages of smart data at the Tour de France6 stages of smart data at the Tour de France
6 stages of smart data at the Tour de France
 
Mobility at the network’s edge
Mobility at the network’s edgeMobility at the network’s edge
Mobility at the network’s edge
 
Zurich case study how to move a data centre in 8 days
Zurich case study  how to move a data centre in 8 daysZurich case study  how to move a data centre in 8 days
Zurich case study how to move a data centre in 8 days
 
Zurich case study: Reducing risk for insurance customers
Zurich case study: Reducing risk for insurance customersZurich case study: Reducing risk for insurance customers
Zurich case study: Reducing risk for insurance customers
 
Strengthening Cybersecurity at the tour de france
Strengthening Cybersecurity at the tour de franceStrengthening Cybersecurity at the tour de france
Strengthening Cybersecurity at the tour de france
 
High-performance solutions for an international university
High-performance solutions for an international universityHigh-performance solutions for an international university
High-performance solutions for an international university
 
What's inhibiting your business productivity
What's inhibiting your business productivityWhat's inhibiting your business productivity
What's inhibiting your business productivity
 
Creating powerful connections
Creating powerful connectionsCreating powerful connections
Creating powerful connections
 
Case study: how information saves lives
Case study: how information saves livesCase study: how information saves lives
Case study: how information saves lives
 
2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report
 
How we helped Fujifilm keep its customers' special memories safe
How we helped Fujifilm keep its customers' special memories safeHow we helped Fujifilm keep its customers' special memories safe
How we helped Fujifilm keep its customers' special memories safe
 
World’s first Cloud-enabled G20 Leaders’ Summit
World’s first Cloud-enabled G20 Leaders’ SummitWorld’s first Cloud-enabled G20 Leaders’ Summit
World’s first Cloud-enabled G20 Leaders’ Summit
 
2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report - an analysis of global security trends
 
Dimension Data Department Prime Minister and cabinet G20 case study
Dimension Data Department Prime Minister and cabinet G20 case studyDimension Data Department Prime Minister and cabinet G20 case study
Dimension Data Department Prime Minister and cabinet G20 case study
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

2014 Secure Mobility Survey Report

  • 1. Mobile Madness Secure Mobility Survey reveals a critical gap between the enterprise mobility vision and real-world implementations How does your organisation compare? accelerate your ambition
  • 2. +1,600 IT and security professionals surveyed globally confirm mobility is a top priority for most IT departments.
  • 3. These are Dimension Data’s insights, gathered from IT professionals spanning the Americas, Asia Pacific, Europe, Middle East, and Africa demonstrate that organisations from around the world share many of the same priorities, challenges and risks.
  • 4. Survey Highlights 32% have conducted a security assessment of key applications touched by mobile devices 27% have well-defined network policies for mobility in place 90% say they have no way to prevent staff from using their personal mobile devices to access enterprise systems 23% freely allow users to download non-corporate approved applications to improve their productivity
  • 5. A critical gap exists between the enterprise mobility vision and real-world implementations An IT roadmap that integrates with a business’s operational goals and the organisation’s existing IT infrastructure – one that provides for necessary resources and budget and also highlights potential challenges – makes the difference between a successful implementation and being derailed by unforeseen problems. This is especially true when it comes to mobility, which is particularly complex and touches most parts of an organisation’s network infrastructure. For this reason, it isn’t surprising that of the 79% of IT leaders who classify mobility as a top priority, 69% already have a roadmap in place. Learn more
  • 6. Concern O utweighs action The vast majority of respondents (82%) indicated that employees at their organisations are utilising personal mobile devices for work purposes. Analysts advocate that organisations must have a clear mobility strategy that ensures mobile technology is an investment that works hard to deliver business value and meet the demands of an increasingly mobile workforce. To some extent, organisations are starting to listen to the analyst community because today, 55% of the all the organisations surveyed have a mobility roadmap of some kind. Learn more
  • 7. Kn wing where to start Given the security issues found on the vast majority of devices within mature networks, IT leaders are correct to be concerned about data security and access control issues relating to mobility. The importance of protecting company data is a top mobility priority for 71% of respondents, while 65% identified access control as their top priority. Learn more
  • 8. What is surprising, given the extent to which they recognise the risk, is that the area where IT leaders have the greatest amount of control – conducting security audits of applications touched by mobile devices – has not been a priority. Only 32% of respondents have taken that step. Learn more
  • 9. Productivity, the user experience and security Real-world employee productivity improvements, user experience and security are not meeting expectations. Over 90% of respondents believe that employees will use their personal mobile devices to access enterprise systems on their own and that IT does not have the capability necessary to stop this activity. IT leaders believe clear policies are needed to increase control, improve visibility and decrease risk. However, 80% of respondents also seek to create a positive mobility experience for employees to help increase productivity. To a large extent, employee experience is important to IT leaders because 79% of them recognise that an increase in worker productivity is the greatest benefit offered by mobility. Learn more
  • 10. & Security Mobility from the top down Perhaps because of the limited investment that inhibits employees from accessing the businesscritical applications needed to perform their job functions, 24% of respondents indicate that their organisation allows them to download non-corporate applications to increase productivity. This is another example of where the gap between the overall vision and the way in which it’s typically executed makes it difficult for organisations to achieve their goal – while at the same time creating new and often undetectable security vulnerabilities. Learn more
  • 11. “ “ A mobility policy should be monitoring the use of corporate data, while maintaining a userfriendly interface. Project manager, Spain
  • 14. The EMDM helps you to better understand your organisation’s current state of development, performance, operational practices and strategic execution, and enables you to develop an enterprise mobility roadmap for your organisation’s future aspirations. Learn how Development Model Dimension Data’s Enterprise Mobility Development Model can help