UiPath Community: Communication Mining from Zero to Hero
Enterprise it consumerization survey
1. Enterprise IT Consumerization Survey
June 2011
Classification 03/28/13
Classification Copyright 2009 Trend Micro Inc. 1
2. Objectives and Methodology
Objectives:
• To obtain a better/deeper understanding of IT Consumerization
collaboration/social media in the workplace.
Methodology:
• An online survey was conducted in the US, Germany, and Japan among
IT personnel responsible for endpoint operational management (desktop,
laptop, smartphone, tablet, etc.) and/or messaging and collaboration
operations (email, IM, sharepoint, etc.).
• Respondents needed to be part of an organization with at least 500
employees worldwide .
• A total of 600 surveys were collected. Country breakdown as follows:
o United States: 200
o Germany: 200
o Japan: 200
Classification 03/28/13
Classification Copyright 2011 Trend Micro Inc. 2
3. Employee Use of Personal Devices
• A majority of companies in the US and Germany allowed their employees to use
personal devices for work-related activities.
• Significantly more companies in the US allowed their employees to use their personal
devices for work-related activities than companies in both Germany and Japan.
Question: Does your company allow employees to use their personal device(s) such as laptops, netbooks, smartphones, and tablets for work-related activities?
Classification 03/28/13
Classification Copyright 2011 Trend Micro Inc. 3
4. Corporate Applications/Databases
Accessible from Personal Devices
• The most common corporate applications/databases employees are allowed to access
with their personal devices are email, calendars, contacts and intranet web.
• US employees were given access to more applications or databases than employees in
Japan.
Question: What corporate applications or databases can employees access from their personal devices? Please select all that apply.
Classification 03/28/13
Classification Copyright 2011 Trend Micro Inc. 4
5. Reasons Companies Allow Employees to Use
Personal Devices for Work-Related Activities
• Of companies that allow their employees to use their personal device(s) for work-related
activities, most indicated they do so for productivity enablement.
• Another top reason is business IT capital cost savings, particularly in the US.
Question: Why does your company allow employees to use their personal devices(s) for work-related activities? Please select all that apply.
Classification 03/28/13
Classification Copyright 2011 Trend Micro Inc. 5
6. Mobile Devices Connected to Corporate
Network—Median Distribution
• In the US and Germany, the distribution of devices connected to the corporate network
was similar, with a majority of the devices being laptops/netbooks, followed by
smartphones and tablet computers.
• In Japan, laptops/netbooks composed 100% of the mobile devices connected to the
corporate network.
Question: About how many mobile devices (whether company-owned or employee-owned, whether they are used in the office or remotely) are connected to your corporate network?
Classification 03/28/13
Classification Copyright 2011 Trend Micro Inc. 6
7. Concerns with Employee Personal Devices
in the Workplace
• Most companies in the US, Germany, and Japan indicated concern with security issues
and data loss/theft regarding allowing employees to bring their personal devices in the
workplace.
• Compliance and legal implications was a greater concern in the US and Japan than in
Germany.
Question: What are your company's concerns, if any, regarding allowing employees to bring their personal devices in the workplace? Please select all that apply.
Classification 03/28/13
Classification Copyright 2011 Trend Micro Inc. 7
8. Corporate Network/Data Protection
from Mobile Devices—US
• Nearly all companies in the US indicated they currently have measures in place to
protect corporate networks and data from company-owned mobile devices as well as
personal devices; most often through installed security software.
Question: How do you protect corporate networks and data from the personal devices employees bring to the workplace?
Question: How do you protect corporate networks and data from the company-owned mobile devices?
Classification 03/28/13
Classification Copyright 2011 Trend Micro Inc. 8
9. Corporate Network/Data Protection
from Mobile Devices—Germany
• Nearly all companies in Germany indicated they currently have measures in place to protect
corporate networks and data from company-owned mobile devices as well as personal
devices; most often through security software and ability to lock down mobile devices.
Question: How do you protect corporate networks and data from the personal devices employees bring to the workplace?
Question: How do you protect corporate networks and data from the company-owned mobile devices?
Classification 03/28/13
Classification Copyright 2011 Trend Micro Inc. 9
10. Corporate Network/Data Protection
from Mobile Devices—Japan
• Similar to the US and Germany, most companies in Japan indicated they currently have
measures in place to protect corporate networks and data from company-owned mobile
devices as well as personal devices; most often through installed security software.
Question: How do you protect corporate networks and data from the personal devices employees bring to the workplace?
Question: How do you protect corporate networks and data from the company-owned mobile devices?
Classification 03/28/13
Classification Copyright 2011 Trend Micro Inc. 10
11. Viewpoints on Use of Mobile Devices—US
• US respondents agreed that they trust company-owned mobile devices more than
personal devices employees bring to the workplace and that devices are vulnerable as
long as any corporate data is stored on the mobile device.
We trust company-owned devices more than personal devices employees bring to the
workplace.
Devices are vulnerable as long as any corporate data is stored on the mobile device.
Employees should be required to install and use security software as a condition to
accessing corporate applications and data.
We will manage company-owned devices and personal devices employees bring to the
workplace the same way.
The use of mobile security AND mobile device management is most effective means of
managing and securing devices brought to work by employees.
The use of VDI for computers/smartphones/tablets and other mobile devices brought to
work by employees is the most effective security measure.
With allowing employees to bring their own computers to work, company will realize ROI
by not having to invest in laptops & other mobile devices.
Employees are bringing their own computers/smartphones/tablets, etc. to work and IT
needs to enable/empower employees using their devices.
If we had to choose one of the two following solutions, we'd prefer mobile device
management over anti-virus/anti-malware.
There are lost smartphones and an ever growing amount of our company's intellectual
property on these smartphones.
The growth of employees using their personal devices for work related activities was
rapid and unplanned.
We see the shift of IT role from a commander/controller to an advisor in support of
employees bringing their own devices to work.
Question: Please tell us how much you agree or disagree with the following statements.
Classification 03/28/13
Classification Copyright 2011 Trend Micro Inc. 11
12. Viewpoints on Use of Mobile Devices—Germany
• Similar to the US, most respondents in Germany agreed that they trust company-owned
mobile devices more than personal devices employees bring to the workplace.
We trust company-owned devices more than personal devices employees bring to the
workplace.
Employees should be required to install and use security software as a condition to
accessing corporate applications and data.
Devices are vulnerable as long as any corporate data is stored on the mobile device.
The use of mobile security AND mobile device management is most effective means of
managing and securing devices brought to work by employees.
We see the shift of IT role from a commander/controller to an advisor in support of
employees bringing their own devices to work.
There are lost smartphones and an ever growing amount of our company's intellectual
property on these smartphones.
Employees are bringing their own computers/smartphones/tablets, etc. to work and IT
needs to enable/empower employees using their devices.
If we had to choose one of the two following solutions, we'd prefer mobile device
management over anti-virus/anti-malware.
The use of VDI for computers/smartphones/tablets and other mobile devices brought to
work by employees is the most effective security measure.
We will manage company-owned devices and personal devices employees bring to the
workplace the same way.
With allowing employees to bring their own computers to work, company will realize ROI
by not having to invest in laptops & other mobile devices.
The growth of employees using their personal devices for work related activities was
rapid and unplanned.
Question: Please tell us how much you agree or disagree with the following statements.
Classification 03/28/13
Classification Copyright 2011 Trend Micro Inc. 12
13. Viewpoints on Use of Mobile Devices—Japan
• In Japan, most respondents trusted company-owned mobile devices more than personal
devices employees bring to the workplace and felt that devices are vulnerable as long
as any corporate data is stored on the mobile device.
We trust company-owned devices more than personal devices employees bring to the
workplace.
Devices are vulnerable as long as any corporate data is stored on the mobile device.
There are lost smartphones and an ever growing amount of our company's intellectual
property on these smartphones.
Employees should be required to install and use security software as a condition to
accessing corporate applications and data.
The use of mobile security AND mobile device management is most effective means of
managing and securing devices brought to work by employees.
If we had to choose one of the two following solutions, we'd prefer mobile device
management over anti-virus/anti-malware.
We will manage company-owned devices and personal devices employees bring to the
workplace the same way.
The use of VDI for computers/smartphones/tablets and other mobile devices brought to
work by employees is the most effective security measure.
With allowing employees to bring their own computers to work, company will realize ROI
by not having to invest in laptops & other mobile devices.
Employees are bringing their own computers/smartphones/tablets, etc. to work and IT
needs to enable/empower employees using their devices.
The growth of employees using their personal devices for work related activities was
rapid and unplanned.
We see the shift of IT role from a commander/controller to an advisor in support of
employees bringing their own devices to work.
Question: Please tell us how much you agree or disagree with the following statements.
Classification 03/28/13
Classification Copyright 2011 Trend Micro Inc. 13
14. Currently Supported Internal Collaboration/
Social Networking Initiatives
• The majority of respondents in the US and Germany, and two thirds in Japan reported their
company currently supported certain internal collaboration or social networking initiatives.
• Overall, the US supported more initiatives than Japan with instant messaging being the most
frequent US-supported initiative.
Question: What internal collaboration or social networking initiatives within your organization are you currently supporting? Please select all that apply.
Classification 03/28/13
Classification Copyright 2011 Trend Micro Inc. 14
15. Policies Regarding Usage of Collaboration
and Social Networking Tools
• For each country surveyed, companies were more likely to have policies regarding
internal collaboration or social networking tools than external tools.
• Companies in the US were significantly more likely to have policies in place (for either
internal or external tools) than in Germany or Japan.
Question: Does your company currently have policies regarding usage of collaboration and social networking tools?
Classification 03/28/13
Classification Copyright 2011 Trend Micro Inc. 15