SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Downloaden Sie, um offline zu lesen
Enterprise IT Consumerization Survey
June 2011



                Classification 03/28/13
                         Classification   Copyright 2009 Trend Micro Inc.   1
Objectives and Methodology
Objectives:
• To obtain a better/deeper understanding of IT Consumerization
  collaboration/social media in the workplace.

Methodology:
• An online survey was conducted in the US, Germany, and Japan among
  IT personnel responsible for endpoint operational management (desktop,
  laptop, smartphone, tablet, etc.) and/or messaging and collaboration
  operations (email, IM, sharepoint, etc.).
• Respondents needed to be part of an organization with at least 500
  employees worldwide .
• A total of 600 surveys were collected. Country breakdown as follows:
    o United States: 200
    o Germany: 200
    o Japan: 200




                              Classification 03/28/13
                                       Classification   Copyright 2011 Trend Micro Inc.   2
Employee Use of Personal Devices

• A majority of companies in the US and Germany allowed their employees to use
  personal devices for work-related activities.
• Significantly more companies in the US allowed their employees to use their personal
  devices for work-related activities than companies in both Germany and Japan.




   Question: Does your company allow employees to use their personal device(s) such as laptops, netbooks, smartphones, and tablets for work-related activities?


                                                               Classification 03/28/13
                                                                        Classification   Copyright 2011 Trend Micro Inc.   3
Corporate Applications/Databases
Accessible from Personal Devices
• The most common corporate applications/databases employees are allowed to access
  with their personal devices are email, calendars, contacts and intranet web.
• US employees were given access to more applications or databases than employees in
  Japan.




         Question: What corporate applications or databases can employees access from their personal devices? Please select all that apply.


                                                         Classification 03/28/13
                                                                  Classification   Copyright 2011 Trend Micro Inc.   4
Reasons Companies Allow Employees to Use
Personal Devices for Work-Related Activities
• Of companies that allow their employees to use their personal device(s) for work-related
  activities, most indicated they do so for productivity enablement.
• Another top reason is business IT capital cost savings, particularly in the US.




        Question: Why does your company allow employees to use their personal devices(s) for work-related activities? Please select all that apply.

                                                            Classification 03/28/13
                                                                     Classification   Copyright 2011 Trend Micro Inc.   5
Mobile Devices Connected to Corporate
Network—Median Distribution
• In the US and Germany, the distribution of devices connected to the corporate network
  was similar, with a majority of the devices being laptops/netbooks, followed by
  smartphones and tablet computers.
• In Japan, laptops/netbooks composed 100% of the mobile devices connected to the
  corporate network.




 Question: About how many mobile devices (whether company-owned or employee-owned, whether they are used in the office or remotely) are connected to your corporate network?


                                                               Classification 03/28/13
                                                                        Classification   Copyright 2011 Trend Micro Inc.   6
Concerns with Employee Personal Devices
in the Workplace
• Most companies in the US, Germany, and Japan indicated concern with security issues
  and data loss/theft regarding allowing employees to bring their personal devices in the
  workplace.
• Compliance and legal implications was a greater concern in the US and Japan than in
  Germany.




   Question: What are your company's concerns, if any, regarding allowing employees to bring their personal devices in the workplace? Please select all that apply.


                                                                 Classification 03/28/13
                                                                          Classification   Copyright 2011 Trend Micro Inc.   7
Corporate Network/Data Protection
from Mobile Devices—US
• Nearly all companies in the US indicated they currently have measures in place to
  protect corporate networks and data from company-owned mobile devices as well as
  personal devices; most often through installed security software.




                 Question: How do you protect corporate networks and data from the personal devices employees bring to the workplace?
                 Question: How do you protect corporate networks and data from the company-owned mobile devices?
                                                 Classification 03/28/13
                                                          Classification   Copyright 2011 Trend Micro Inc.   8
Corporate Network/Data Protection
from Mobile Devices—Germany
• Nearly all companies in Germany indicated they currently have measures in place to protect
  corporate networks and data from company-owned mobile devices as well as personal
  devices; most often through security software and ability to lock down mobile devices.




                 Question: How do you protect corporate networks and data from the personal devices employees bring to the workplace?
                 Question: How do you protect corporate networks and data from the company-owned mobile devices?
                                                 Classification 03/28/13
                                                          Classification   Copyright 2011 Trend Micro Inc.   9
Corporate Network/Data Protection
from Mobile Devices—Japan
• Similar to the US and Germany, most companies in Japan indicated they currently have
  measures in place to protect corporate networks and data from company-owned mobile
  devices as well as personal devices; most often through installed security software.




                 Question: How do you protect corporate networks and data from the personal devices employees bring to the workplace?
                 Question: How do you protect corporate networks and data from the company-owned mobile devices?
                                                 Classification 03/28/13
                                                          Classification   Copyright 2011 Trend Micro Inc. 10
Viewpoints on Use of Mobile Devices—US
      • US respondents agreed that they trust company-owned mobile devices more than
        personal devices employees bring to the workplace and that devices are vulnerable as
        long as any corporate data is stored on the mobile device.
  We trust company-owned devices more than personal devices employees bring to the
                                                                      workplace.
   Devices are vulnerable as long as any corporate data is stored on the mobile device.


     Employees should be required to install and use security software as a condition to
                                             accessing corporate applications and data.
 We will manage company-owned devices and personal devices employees bring to the
                                                        workplace the same way.
 The use of mobile security AND mobile device management is most effective means of
                       managing and securing devices brought to work by employees.
The use of VDI for computers/smartphones/tablets and other mobile devices brought to
                           work by employees is the most effective security measure.
With allowing employees to bring their own computers to work, company will realize ROI
                              by not having to invest in laptops & other mobile devices.
  Employees are bringing their own computers/smartphones/tablets, etc. to work and IT
                             needs to enable/empower employees using their devices.
       If we had to choose one of the two following solutions, we'd prefer mobile device
                                              management over anti-virus/anti-malware.
  There are lost smartphones and an ever growing amount of our company's intellectual
                                                    property on these smartphones.
   The growth of employees using their personal devices for work related activities was
                                                                rapid and unplanned.
     We see the shift of IT role from a commander/controller to an advisor in support of
                                          employees bringing their own devices to work.




                                             Question: Please tell us how much you agree or disagree with the following statements.
                                                                      Classification 03/28/13
                                                                               Classification   Copyright 2011 Trend Micro Inc. 11
Viewpoints on Use of Mobile Devices—Germany
      • Similar to the US, most respondents in Germany agreed that they trust company-owned
        mobile devices more than personal devices employees bring to the workplace.
  We trust company-owned devices more than personal devices employees bring to the
                                                                      workplace.
     Employees should be required to install and use security software as a condition to
                                             accessing corporate applications and data.
   Devices are vulnerable as long as any corporate data is stored on the mobile device.


 The use of mobile security AND mobile device management is most effective means of
                       managing and securing devices brought to work by employees.
     We see the shift of IT role from a commander/controller to an advisor in support of
                                          employees bringing their own devices to work.

  There are lost smartphones and an ever growing amount of our company's intellectual
                                                    property on these smartphones.

  Employees are bringing their own computers/smartphones/tablets, etc. to work and IT
                             needs to enable/empower employees using their devices.

       If we had to choose one of the two following solutions, we'd prefer mobile device
                                              management over anti-virus/anti-malware.

The use of VDI for computers/smartphones/tablets and other mobile devices brought to
                           work by employees is the most effective security measure.

 We will manage company-owned devices and personal devices employees bring to the
                                                        workplace the same way.

With allowing employees to bring their own computers to work, company will realize ROI
                              by not having to invest in laptops & other mobile devices.

   The growth of employees using their personal devices for work related activities was
                                                                rapid and unplanned.




                                             Question: Please tell us how much you agree or disagree with the following statements.
                                                                      Classification 03/28/13
                                                                               Classification   Copyright 2011 Trend Micro Inc. 12
Viewpoints on Use of Mobile Devices—Japan
      • In Japan, most respondents trusted company-owned mobile devices more than personal
        devices employees bring to the workplace and felt that devices are vulnerable as long
        as any corporate data is stored on the mobile device.
  We trust company-owned devices more than personal devices employees bring to the
                                                                      workplace.
   Devices are vulnerable as long as any corporate data is stored on the mobile device.


  There are lost smartphones and an ever growing amount of our company's intellectual
                                                    property on these smartphones.
     Employees should be required to install and use security software as a condition to
                                             accessing corporate applications and data.
The use of mobile security AND mobile device management is most effective means of
                       managing and securing devices brought to work by employees.
       If we had to choose one of the two following solutions, we'd prefer mobile device
                                              management over anti-virus/anti-malware.
 We will manage company-owned devices and personal devices employees bring to the
                                                        workplace the same way.
The use of VDI for computers/smartphones/tablets and other mobile devices brought to
                           work by employees is the most effective security measure.
With allowing employees to bring their own computers to work, company will realize ROI
                              by not having to invest in laptops & other mobile devices.
  Employees are bringing their own computers/smartphones/tablets, etc. to work and IT
                             needs to enable/empower employees using their devices.
   The growth of employees using their personal devices for work related activities was
                                                                rapid and unplanned.
     We see the shift of IT role from a commander/controller to an advisor in support of
                                          employees bringing their own devices to work.




                                             Question: Please tell us how much you agree or disagree with the following statements.
                                                                      Classification 03/28/13
                                                                               Classification   Copyright 2011 Trend Micro Inc. 13
Currently Supported Internal Collaboration/
Social Networking Initiatives
• The majority of respondents in the US and Germany, and two thirds in Japan reported their
  company currently supported certain internal collaboration or social networking initiatives.
• Overall, the US supported more initiatives than Japan with instant messaging being the most
  frequent US-supported initiative.




      Question: What internal collaboration or social networking initiatives within your organization are you currently supporting? Please select all that apply.


                                                                 Classification 03/28/13
                                                                          Classification   Copyright 2011 Trend Micro Inc. 14
Policies Regarding Usage of Collaboration
and Social Networking Tools
• For each country surveyed, companies were more likely to have policies regarding
  internal collaboration or social networking tools than external tools.
• Companies in the US were significantly more likely to have policies in place (for either
  internal or external tools) than in Germany or Japan.




               Question: Does your company currently have policies regarding usage of collaboration and social networking tools?


                                                      Classification 03/28/13
                                                               Classification   Copyright 2011 Trend Micro Inc. 15

Weitere ähnliche Inhalte

Was ist angesagt?

IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2J M
 
Discovering Computers: Chapter 01
Discovering Computers: Chapter 01Discovering Computers: Chapter 01
Discovering Computers: Chapter 01Anna Stirling
 
IET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...
White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...
White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...AeroFS
 
BASIC COMPUTERS
BASIC COMPUTERSBASIC COMPUTERS
BASIC COMPUTERSArMags
 
Employee use of mobile devices
Employee use of mobile devicesEmployee use of mobile devices
Employee use of mobile devicesmkeane
 
Windows phone 8 enterprise and Mobile Device Managment by Andrej Radinger (mdm)
Windows phone 8 enterprise and Mobile Device Managment by Andrej Radinger (mdm)Windows phone 8 enterprise and Mobile Device Managment by Andrej Radinger (mdm)
Windows phone 8 enterprise and Mobile Device Managment by Andrej Radinger (mdm)mgligorovski
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud accessAGILLY
 
Apple Device Management
Apple Device ManagementApple Device Management
Apple Device ManagementHexnode
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD RightRapidScale
 
German IT Pros Survey: Network Complexity
German IT Pros Survey: Network ComplexityGerman IT Pros Survey: Network Complexity
German IT Pros Survey: Network ComplexitySolarWinds
 
Summit 2010 04 27 Which New Technologies Are Right For Your Enterprise Rev 1
Summit 2010 04 27 Which New Technologies Are Right For Your Enterprise   Rev 1Summit 2010 04 27 Which New Technologies Are Right For Your Enterprise   Rev 1
Summit 2010 04 27 Which New Technologies Are Right For Your Enterprise Rev 1Joe Alexander
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD HandbookBarcoding, Inc.
 
IBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile ApproachIBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile ApproachGraham Acres
 
2: Technology - The driving force behind E-Commerce:
2: Technology - The driving force behind E-Commerce:2: Technology - The driving force behind E-Commerce:
2: Technology - The driving force behind E-Commerce:Jitendra Tomar
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...AGILLY
 

Was ist angesagt? (20)

ICT in Society
ICT in SocietyICT in Society
ICT in Society
 
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2
 
Discovering Computers: Chapter 01
Discovering Computers: Chapter 01Discovering Computers: Chapter 01
Discovering Computers: Chapter 01
 
IET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote working
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...
White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...
White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...
 
BASIC COMPUTERS
BASIC COMPUTERSBASIC COMPUTERS
BASIC COMPUTERS
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Employee use of mobile devices
Employee use of mobile devicesEmployee use of mobile devices
Employee use of mobile devices
 
computers
computerscomputers
computers
 
Windows phone 8 enterprise and Mobile Device Managment by Andrej Radinger (mdm)
Windows phone 8 enterprise and Mobile Device Managment by Andrej Radinger (mdm)Windows phone 8 enterprise and Mobile Device Managment by Andrej Radinger (mdm)
Windows phone 8 enterprise and Mobile Device Managment by Andrej Radinger (mdm)
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud access
 
Apple Device Management
Apple Device ManagementApple Device Management
Apple Device Management
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
 
German IT Pros Survey: Network Complexity
German IT Pros Survey: Network ComplexityGerman IT Pros Survey: Network Complexity
German IT Pros Survey: Network Complexity
 
Summit 2010 04 27 Which New Technologies Are Right For Your Enterprise Rev 1
Summit 2010 04 27 Which New Technologies Are Right For Your Enterprise   Rev 1Summit 2010 04 27 Which New Technologies Are Right For Your Enterprise   Rev 1
Summit 2010 04 27 Which New Technologies Are Right For Your Enterprise Rev 1
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
 
IBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile ApproachIBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile Approach
 
2: Technology - The driving force behind E-Commerce:
2: Technology - The driving force behind E-Commerce:2: Technology - The driving force behind E-Commerce:
2: Technology - The driving force behind E-Commerce:
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 

Andere mochten auch

Presentación1 angieeeeeeee
Presentación1 angieeeeeeeePresentación1 angieeeeeeee
Presentación1 angieeeeeeeeangie1996
 
Tendencias 2014 el_desafio_de_la_privacidad_en_internet
Tendencias 2014 el_desafio_de_la_privacidad_en_internetTendencias 2014 el_desafio_de_la_privacidad_en_internet
Tendencias 2014 el_desafio_de_la_privacidad_en_internetGener Julca Carreño
 
EXCLAMA_ED26_104 PAGS_baja CORRECCIONES
EXCLAMA_ED26_104 PAGS_baja CORRECCIONESEXCLAMA_ED26_104 PAGS_baja CORRECCIONES
EXCLAMA_ED26_104 PAGS_baja CORRECCIONESsusana cheng
 
10 Comportamientos Digitales
10 Comportamientos Digitales10 Comportamientos Digitales
10 Comportamientos DigitalesDaryo R. Cuartas
 
Tus 10 comportamientos digitales
Tus 10 comportamientos digitalesTus 10 comportamientos digitales
Tus 10 comportamientos digitalesJessicaIzora
 
Los comportamiento digitales
Los comportamiento digitalesLos comportamiento digitales
Los comportamiento digitales1barrero
 

Andere mochten auch (8)

Presentación1 angieeeeeeee
Presentación1 angieeeeeeeePresentación1 angieeeeeeee
Presentación1 angieeeeeeee
 
Tendencias 2014 el_desafio_de_la_privacidad_en_internet
Tendencias 2014 el_desafio_de_la_privacidad_en_internetTendencias 2014 el_desafio_de_la_privacidad_en_internet
Tendencias 2014 el_desafio_de_la_privacidad_en_internet
 
EXCLAMA_ED26_104 PAGS_baja CORRECCIONES
EXCLAMA_ED26_104 PAGS_baja CORRECCIONESEXCLAMA_ED26_104 PAGS_baja CORRECCIONES
EXCLAMA_ED26_104 PAGS_baja CORRECCIONES
 
Costos calidad2
Costos calidad2Costos calidad2
Costos calidad2
 
10 Comportamientos Digitales
10 Comportamientos Digitales10 Comportamientos Digitales
10 Comportamientos Digitales
 
Tecnologia raquel
Tecnologia raquelTecnologia raquel
Tecnologia raquel
 
Tus 10 comportamientos digitales
Tus 10 comportamientos digitalesTus 10 comportamientos digitales
Tus 10 comportamientos digitales
 
Los comportamiento digitales
Los comportamiento digitalesLos comportamiento digitales
Los comportamiento digitales
 

Ähnlich wie Enterprise it consumerization survey

Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterpriseinfra-si
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
Current topic in it presentation
Current topic in it presentationCurrent topic in it presentation
Current topic in it presentationMihreteab F
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesIcomm Technologies
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devicesiSSAL
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxMarta Kusinska
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications Array Networks
 

Ähnlich wie Enterprise it consumerization survey (20)

Consumer tech invasion
Consumer tech invasionConsumer tech invasion
Consumer tech invasion
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Current topic in it presentation
Current topic in it presentationCurrent topic in it presentation
Current topic in it presentation
 
Embracing BYOD
Embracing BYODEmbracing BYOD
Embracing BYOD
 
Byod
ByodByod
Byod
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devices
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
Big Data for Security
Big Data for SecurityBig Data for Security
Big Data for Security
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 

Mehr von Andrew Wong

2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing ReportAndrew Wong
 
Red Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongRed Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongAndrew Wong
 
Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Andrew Wong
 
Big Data in Retail Industry
Big Data in Retail IndustryBig Data in Retail Industry
Big Data in Retail IndustryAndrew Wong
 
Cloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBCloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBAndrew Wong
 
Oracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapOracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapAndrew Wong
 
Introduction Google Script in Marketing
Introduction Google Script in MarketingIntroduction Google Script in Marketing
Introduction Google Script in MarketingAndrew Wong
 
B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13Andrew Wong
 
Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Andrew Wong
 
SolarWinds Network Solution Guide
SolarWinds Network Solution GuideSolarWinds Network Solution Guide
SolarWinds Network Solution GuideAndrew Wong
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentationAndrew Wong
 
Trend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyTrend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyAndrew Wong
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protectionAndrew Wong
 
2010 corporate end user study
2010 corporate end user study2010 corporate end user study
2010 corporate end user studyAndrew Wong
 
Trend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportTrend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportAndrew Wong
 
Android Security Essentials Presentation
Android Security Essentials PresentationAndroid Security Essentials Presentation
Android Security Essentials PresentationAndrew Wong
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssAndrew Wong
 
Amazon Web Services
Amazon Web ServicesAmazon Web Services
Amazon Web ServicesAndrew Wong
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection NetworkAndrew Wong
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious emailAndrew Wong
 

Mehr von Andrew Wong (20)

2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
 
Red Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongRed Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong Kong
 
Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Red Hat Training Catalog 2012
Red Hat Training Catalog 2012
 
Big Data in Retail Industry
Big Data in Retail IndustryBig Data in Retail Industry
Big Data in Retail Industry
 
Cloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBCloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMB
 
Oracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapOracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And Roadmap
 
Introduction Google Script in Marketing
Introduction Google Script in MarketingIntroduction Google Script in Marketing
Introduction Google Script in Marketing
 
B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13
 
Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8
 
SolarWinds Network Solution Guide
SolarWinds Network Solution GuideSolarWinds Network Solution Guide
SolarWinds Network Solution Guide
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
Trend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyTrend micro global consumer technology use & security study
Trend micro global consumer technology use & security study
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
2010 corporate end user study
2010 corporate end user study2010 corporate end user study
2010 corporate end user study
 
Trend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportTrend micro smartphone consumer market research report
Trend micro smartphone consumer market research report
 
Android Security Essentials Presentation
Android Security Essentials PresentationAndroid Security Essentials Presentation
Android Security Essentials Presentation
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
Amazon Web Services
Amazon Web ServicesAmazon Web Services
Amazon Web Services
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious email
 

Kürzlich hochgeladen

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 

Kürzlich hochgeladen (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 

Enterprise it consumerization survey

  • 1. Enterprise IT Consumerization Survey June 2011 Classification 03/28/13 Classification Copyright 2009 Trend Micro Inc. 1
  • 2. Objectives and Methodology Objectives: • To obtain a better/deeper understanding of IT Consumerization collaboration/social media in the workplace. Methodology: • An online survey was conducted in the US, Germany, and Japan among IT personnel responsible for endpoint operational management (desktop, laptop, smartphone, tablet, etc.) and/or messaging and collaboration operations (email, IM, sharepoint, etc.). • Respondents needed to be part of an organization with at least 500 employees worldwide . • A total of 600 surveys were collected. Country breakdown as follows: o United States: 200 o Germany: 200 o Japan: 200 Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 2
  • 3. Employee Use of Personal Devices • A majority of companies in the US and Germany allowed their employees to use personal devices for work-related activities. • Significantly more companies in the US allowed their employees to use their personal devices for work-related activities than companies in both Germany and Japan. Question: Does your company allow employees to use their personal device(s) such as laptops, netbooks, smartphones, and tablets for work-related activities? Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 3
  • 4. Corporate Applications/Databases Accessible from Personal Devices • The most common corporate applications/databases employees are allowed to access with their personal devices are email, calendars, contacts and intranet web. • US employees were given access to more applications or databases than employees in Japan. Question: What corporate applications or databases can employees access from their personal devices? Please select all that apply. Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 4
  • 5. Reasons Companies Allow Employees to Use Personal Devices for Work-Related Activities • Of companies that allow their employees to use their personal device(s) for work-related activities, most indicated they do so for productivity enablement. • Another top reason is business IT capital cost savings, particularly in the US. Question: Why does your company allow employees to use their personal devices(s) for work-related activities? Please select all that apply. Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 5
  • 6. Mobile Devices Connected to Corporate Network—Median Distribution • In the US and Germany, the distribution of devices connected to the corporate network was similar, with a majority of the devices being laptops/netbooks, followed by smartphones and tablet computers. • In Japan, laptops/netbooks composed 100% of the mobile devices connected to the corporate network. Question: About how many mobile devices (whether company-owned or employee-owned, whether they are used in the office or remotely) are connected to your corporate network? Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 6
  • 7. Concerns with Employee Personal Devices in the Workplace • Most companies in the US, Germany, and Japan indicated concern with security issues and data loss/theft regarding allowing employees to bring their personal devices in the workplace. • Compliance and legal implications was a greater concern in the US and Japan than in Germany. Question: What are your company's concerns, if any, regarding allowing employees to bring their personal devices in the workplace? Please select all that apply. Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 7
  • 8. Corporate Network/Data Protection from Mobile Devices—US • Nearly all companies in the US indicated they currently have measures in place to protect corporate networks and data from company-owned mobile devices as well as personal devices; most often through installed security software. Question: How do you protect corporate networks and data from the personal devices employees bring to the workplace? Question: How do you protect corporate networks and data from the company-owned mobile devices? Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 8
  • 9. Corporate Network/Data Protection from Mobile Devices—Germany • Nearly all companies in Germany indicated they currently have measures in place to protect corporate networks and data from company-owned mobile devices as well as personal devices; most often through security software and ability to lock down mobile devices. Question: How do you protect corporate networks and data from the personal devices employees bring to the workplace? Question: How do you protect corporate networks and data from the company-owned mobile devices? Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 9
  • 10. Corporate Network/Data Protection from Mobile Devices—Japan • Similar to the US and Germany, most companies in Japan indicated they currently have measures in place to protect corporate networks and data from company-owned mobile devices as well as personal devices; most often through installed security software. Question: How do you protect corporate networks and data from the personal devices employees bring to the workplace? Question: How do you protect corporate networks and data from the company-owned mobile devices? Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 10
  • 11. Viewpoints on Use of Mobile Devices—US • US respondents agreed that they trust company-owned mobile devices more than personal devices employees bring to the workplace and that devices are vulnerable as long as any corporate data is stored on the mobile device. We trust company-owned devices more than personal devices employees bring to the workplace. Devices are vulnerable as long as any corporate data is stored on the mobile device. Employees should be required to install and use security software as a condition to accessing corporate applications and data. We will manage company-owned devices and personal devices employees bring to the workplace the same way. The use of mobile security AND mobile device management is most effective means of managing and securing devices brought to work by employees. The use of VDI for computers/smartphones/tablets and other mobile devices brought to work by employees is the most effective security measure. With allowing employees to bring their own computers to work, company will realize ROI by not having to invest in laptops & other mobile devices. Employees are bringing their own computers/smartphones/tablets, etc. to work and IT needs to enable/empower employees using their devices. If we had to choose one of the two following solutions, we'd prefer mobile device management over anti-virus/anti-malware. There are lost smartphones and an ever growing amount of our company's intellectual property on these smartphones. The growth of employees using their personal devices for work related activities was rapid and unplanned. We see the shift of IT role from a commander/controller to an advisor in support of employees bringing their own devices to work. Question: Please tell us how much you agree or disagree with the following statements. Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 11
  • 12. Viewpoints on Use of Mobile Devices—Germany • Similar to the US, most respondents in Germany agreed that they trust company-owned mobile devices more than personal devices employees bring to the workplace. We trust company-owned devices more than personal devices employees bring to the workplace. Employees should be required to install and use security software as a condition to accessing corporate applications and data. Devices are vulnerable as long as any corporate data is stored on the mobile device. The use of mobile security AND mobile device management is most effective means of managing and securing devices brought to work by employees. We see the shift of IT role from a commander/controller to an advisor in support of employees bringing their own devices to work. There are lost smartphones and an ever growing amount of our company's intellectual property on these smartphones. Employees are bringing their own computers/smartphones/tablets, etc. to work and IT needs to enable/empower employees using their devices. If we had to choose one of the two following solutions, we'd prefer mobile device management over anti-virus/anti-malware. The use of VDI for computers/smartphones/tablets and other mobile devices brought to work by employees is the most effective security measure. We will manage company-owned devices and personal devices employees bring to the workplace the same way. With allowing employees to bring their own computers to work, company will realize ROI by not having to invest in laptops & other mobile devices. The growth of employees using their personal devices for work related activities was rapid and unplanned. Question: Please tell us how much you agree or disagree with the following statements. Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 12
  • 13. Viewpoints on Use of Mobile Devices—Japan • In Japan, most respondents trusted company-owned mobile devices more than personal devices employees bring to the workplace and felt that devices are vulnerable as long as any corporate data is stored on the mobile device. We trust company-owned devices more than personal devices employees bring to the workplace. Devices are vulnerable as long as any corporate data is stored on the mobile device. There are lost smartphones and an ever growing amount of our company's intellectual property on these smartphones. Employees should be required to install and use security software as a condition to accessing corporate applications and data. The use of mobile security AND mobile device management is most effective means of managing and securing devices brought to work by employees. If we had to choose one of the two following solutions, we'd prefer mobile device management over anti-virus/anti-malware. We will manage company-owned devices and personal devices employees bring to the workplace the same way. The use of VDI for computers/smartphones/tablets and other mobile devices brought to work by employees is the most effective security measure. With allowing employees to bring their own computers to work, company will realize ROI by not having to invest in laptops & other mobile devices. Employees are bringing their own computers/smartphones/tablets, etc. to work and IT needs to enable/empower employees using their devices. The growth of employees using their personal devices for work related activities was rapid and unplanned. We see the shift of IT role from a commander/controller to an advisor in support of employees bringing their own devices to work. Question: Please tell us how much you agree or disagree with the following statements. Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 13
  • 14. Currently Supported Internal Collaboration/ Social Networking Initiatives • The majority of respondents in the US and Germany, and two thirds in Japan reported their company currently supported certain internal collaboration or social networking initiatives. • Overall, the US supported more initiatives than Japan with instant messaging being the most frequent US-supported initiative. Question: What internal collaboration or social networking initiatives within your organization are you currently supporting? Please select all that apply. Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 14
  • 15. Policies Regarding Usage of Collaboration and Social Networking Tools • For each country surveyed, companies were more likely to have policies regarding internal collaboration or social networking tools than external tools. • Companies in the US were significantly more likely to have policies in place (for either internal or external tools) than in Germany or Japan. Question: Does your company currently have policies regarding usage of collaboration and social networking tools? Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 15