SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
T H E E F F E C T S O F
ON THE ENTERPRISE
more households will
become remote
workplaces for employees
will use the same devices
for both personal and
work activities
3 5out
of
In the U.S.
of the workforce
will be mobile
The average mobile
worker will carry
3.5devices
84%
workers say they no
longer need to be in an
1
2
9
of companies are focused
on supporting mobile
workers better 3
52%
32%
increase in mobile
malware families,
year-over-year 6
of all mobile malware
steals information from the
compromised device
Mobile devices are enticing to malware
developers because of the business-
information employees store on them
A study found that when
doctors’ use of
data breaches rose to
Violation of HIPAA regulations can
lead to hundreds of thousands in
7
On average a cell phone is
lost in the U.S. every
3.5seconds5
15%year-over-
year 4
Mobile security
vulnerabilities are rising
of information security
professionals rate lost devices
as their number one concern11
Majority of enterprises have reported at
least one mobile security incident within
the past 12 months 12
of executives expect to
support more devices in
the next 12 months 3
More devices means increased security
risks for businesses via lost phones and
tablets, user-error and software
vulnerabilities11
Enterprises Need to Ensure Mobile Security
Enterprises need to consider:
o Mobile Device Management
o Mobile App Management
o Mobile Content Management
This infographic is for informational purposes only. Some of the information is selected from public sources which we believe is reasonable in relation to subject matter and are believed to be accurate. Accellion makes no warranties, express or implied, as to the information in this infographic. Accellion
is either a registered trademark or trademark of Accellion, Inc. in the United States and/or other countries. Other trademarks and tradenames appearing in this presentation are the property of their respective owners. We do not intend our use or display of other companies’ tradenames, trademarks or
service marks to imply a relationship with, or endorsement or sponsorship of us by, these other companies. Microsoft and SharePoint are either registered trademarks or trademarks of Microsoft Corporation registered in the United States and/or other countries. Document published March 2013.
Visit www.accellion.com/solutions
choose Accellion to secure all of their mobile content.
References
1 http://network.cisco.com/the-future-of-workplace-mobility.html
2 http://mobile-workforce-project.ipass.com/cpwp/wp-content/uploads/2012/03/ipass_mobileworkforcereport_q1_2012.pdf
3 http://www.zdnet.com/mobile-security-top-enterprise-bogeyman-7000005560/
4 http://www.computerweekly.com/news/2240105733/Mobile-malware-is-on-the-rise-warns-IBM-report
5 http://blogs.smartmoney.com/paydirt/2012/03/23/lost-phones-cost-americans-30-billion-a-year/
6 http://www.symantec.com/security_response/publications/threatreport.jsp
7 http://www.amednews.com/article/20111219/business/312199967/2/
8 http://mobileenterprise.edgl.com/how-to/Mobile-Security-Risk-Correlates-with-Benefits86198
9 http://aa-download.avg.com/filedir/other/Smartphone.pdf
10 http://www.thesecurityblog.com/2011/06/how-businesses-and-users-can-improve-mobile-security/
11 http://www.emc.com/collateral/industry-overview/h11109-rsa-realizing-mobile-enterprise.pdf
12 http://www.fiercemobileit.com/story/symantec-majority-enterprises-report-least-one-mobile-security-incident-pas/2013-04-28
55% 32%
75%
In 2013
more than
84%
58%
2012 saw a
3
In 2013
million

Weitere ähnliche Inhalte

Was ist angesagt?

A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013
AntonioMaio2
 
DataEd Online: Building the Case for the Top Data Job
DataEd Online: Building the Case for the Top Data JobDataEd Online: Building the Case for the Top Data Job
DataEd Online: Building the Case for the Top Data Job
DATAVERSITY
 

Was ist angesagt? (20)

2016 Building Bridges - Need for a Data Management Strategy
2016 Building Bridges - Need for a Data Management Strategy2016 Building Bridges - Need for a Data Management Strategy
2016 Building Bridges - Need for a Data Management Strategy
 
Office 365 DLP Makes Data Protection Cool Again!
Office 365 DLP Makes Data Protection Cool Again!Office 365 DLP Makes Data Protection Cool Again!
Office 365 DLP Makes Data Protection Cool Again!
 
Evolution of Content Services
Evolution of Content ServicesEvolution of Content Services
Evolution of Content Services
 
Data Systems Integration & Business Value Pt. 1: Metadata
Data Systems Integration & Business Value Pt. 1: MetadataData Systems Integration & Business Value Pt. 1: Metadata
Data Systems Integration & Business Value Pt. 1: Metadata
 
A Data Integration Case Study - Avoid Creating a “Franken-Beast”
A Data Integration Case Study - Avoid  Creating a “Franken-Beast”A Data Integration Case Study - Avoid  Creating a “Franken-Beast”
A Data Integration Case Study - Avoid Creating a “Franken-Beast”
 
CollabDaysBenelux2020 - Building a remarkable onboarding experience for new e...
CollabDaysBenelux2020 - Building a remarkable onboarding experience for new e...CollabDaysBenelux2020 - Building a remarkable onboarding experience for new e...
CollabDaysBenelux2020 - Building a remarkable onboarding experience for new e...
 
A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013A Practical Guide Information Governance with Microsoft SharePoint 2013
A Practical Guide Information Governance with Microsoft SharePoint 2013
 
SharePoint Governance 101 - OKCSUG
SharePoint Governance 101 - OKCSUGSharePoint Governance 101 - OKCSUG
SharePoint Governance 101 - OKCSUG
 
TiE DC GovCon Panel on Emerging Technologies: AI/ML/Blockchain/Data Managemen...
TiE DC GovCon Panel on Emerging Technologies: AI/ML/Blockchain/Data Managemen...TiE DC GovCon Panel on Emerging Technologies: AI/ML/Blockchain/Data Managemen...
TiE DC GovCon Panel on Emerging Technologies: AI/ML/Blockchain/Data Managemen...
 
DataEd Online: Building the Case for the Top Data Job
DataEd Online: Building the Case for the Top Data JobDataEd Online: Building the Case for the Top Data Job
DataEd Online: Building the Case for the Top Data Job
 
SharePoint Governance 101 - Austin O365 & SharePoint User Group
SharePoint Governance 101  - Austin O365 & SharePoint User GroupSharePoint Governance 101  - Austin O365 & SharePoint User Group
SharePoint Governance 101 - Austin O365 & SharePoint User Group
 
Active Directory securing and auditing - Kees Vegter, Neo4j
Active Directory securing and auditing - Kees Vegter, Neo4jActive Directory securing and auditing - Kees Vegter, Neo4j
Active Directory securing and auditing - Kees Vegter, Neo4j
 
How to Create Controlled Vocabularies for Competitive Intelligence
How to Create Controlled Vocabularies for Competitive IntelligenceHow to Create Controlled Vocabularies for Competitive Intelligence
How to Create Controlled Vocabularies for Competitive Intelligence
 
Data breach presentation
Data breach presentationData breach presentation
Data breach presentation
 
Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...
 
Usama Fayyad talk in South Africa: From BigData to Data Science
Usama Fayyad talk in South Africa:  From BigData to Data ScienceUsama Fayyad talk in South Africa:  From BigData to Data Science
Usama Fayyad talk in South Africa: From BigData to Data Science
 
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulationsC01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
 
C24 Top 12 tips
C24 Top 12 tipsC24 Top 12 tips
C24 Top 12 tips
 
Metadata Matters
Metadata MattersMetadata Matters
Metadata Matters
 
Leave IT Alone – The Vast Value of Self-Service
Leave IT Alone – The Vast Value of Self-ServiceLeave IT Alone – The Vast Value of Self-Service
Leave IT Alone – The Vast Value of Self-Service
 

Andere mochten auch

Andere mochten auch (10)

Data Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint WebinarData Breaches and Security Rights in SharePoint Webinar
Data Breaches and Security Rights in SharePoint Webinar
 
Excelで作るGoogleマップ
Excelで作るGoogleマップExcelで作るGoogleマップ
Excelで作るGoogleマップ
 
【データ入力の技】重複したデータを削除する
【データ入力の技】重複したデータを削除する【データ入力の技】重複したデータを削除する
【データ入力の技】重複したデータを削除する
 
【データ編集の技】シートを移動・コピーする
 【データ編集の技】シートを移動・コピーする 【データ編集の技】シートを移動・コピーする
【データ編集の技】シートを移動・コピーする
 
【Excelデータ入力の技】入力値を選択方式にする
【Excelデータ入力の技】入力値を選択方式にする【Excelデータ入力の技】入力値を選択方式にする
【Excelデータ入力の技】入力値を選択方式にする
 
【データ編集の技】空のシートを簡単に追加する
【データ編集の技】空のシートを簡単に追加する【データ編集の技】空のシートを簡単に追加する
【データ編集の技】空のシートを簡単に追加する
 
Rec4LRW – Scientific Paper Recommender System for Literature Review and Writing
Rec4LRW – Scientific Paper Recommender System for Literature Review and WritingRec4LRW – Scientific Paper Recommender System for Literature Review and Writing
Rec4LRW – Scientific Paper Recommender System for Literature Review and Writing
 
Motivation
MotivationMotivation
Motivation
 
When To Use What In Office 365 (Enterprise User Guidance)
When To Use What In Office 365 (Enterprise User Guidance)When To Use What In Office 365 (Enterprise User Guidance)
When To Use What In Office 365 (Enterprise User Guidance)
 
Why Metadata Matters in SharePoint Search and Information Governance Webinar
Why Metadata Matters in SharePoint Search and Information Governance WebinarWhy Metadata Matters in SharePoint Search and Information Governance Webinar
Why Metadata Matters in SharePoint Search and Information Governance Webinar
 

Ähnlich wie Accellion Infographic: The Effects of Mobile on the Enterprise

It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
revaathey
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
revaathey
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
Cygnet Infotech
 

Ähnlich wie Accellion Infographic: The Effects of Mobile on the Enterprise (20)

Mobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceMobile Security Trends in the Workplace
Mobile Security Trends in the Workplace
 
Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity Insightful Research: The State of Mobile Application Insecurity
Insightful Research: The State of Mobile Application Insecurity
 
Ponemon Institute Research Report
Ponemon Institute Research ReportPonemon Institute Research Report
Ponemon Institute Research Report
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
VMware Emerging Strategies for Managing Mobility
VMware Emerging Strategies for Managing MobilityVMware Emerging Strategies for Managing Mobility
VMware Emerging Strategies for Managing Mobility
 
Putting Wearables to Work (via Salesforce.com)
Putting Wearables to Work (via Salesforce.com)Putting Wearables to Work (via Salesforce.com)
Putting Wearables to Work (via Salesforce.com)
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
 
Challenges in Testing Mobile App Security
Challenges in Testing Mobile App SecurityChallenges in Testing Mobile App Security
Challenges in Testing Mobile App Security
 
Infographic: Mobile At Work
Infographic: Mobile At WorkInfographic: Mobile At Work
Infographic: Mobile At Work
 
Guide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secureGuide Preview: Ensuring your enterprise image-viewer if fully secure
Guide Preview: Ensuring your enterprise image-viewer if fully secure
 
5 ways your business can stay safe - and take off
5 ways your business can stay safe - and take off5 ways your business can stay safe - and take off
5 ways your business can stay safe - and take off
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva inc
 
The CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the UnexpectedThe CISO in 2020: Prepare for the Unexpected
The CISO in 2020: Prepare for the Unexpected
 
Still Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research StudyStill Careless Users In The Cloud - Research Study
Still Careless Users In The Cloud - Research Study
 
Mobile Growing Pains in the Public Sector
Mobile Growing Pains in the Public SectorMobile Growing Pains in the Public Sector
Mobile Growing Pains in the Public Sector
 
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert CaliforniaBring Your Own Device 2014 TeamMate User Conference Palm Desert California
Bring Your Own Device 2014 TeamMate User Conference Palm Desert California
 
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
 
Symantec Mobility Suite -Workforce apps
 Symantec Mobility Suite -Workforce apps Symantec Mobility Suite -Workforce apps
Symantec Mobility Suite -Workforce apps
 
Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5Digital Trust - Tech Vision 2016 Trend 5
Digital Trust - Tech Vision 2016 Trend 5
 

Mehr von Proofpoint

The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure Reality
Proofpoint
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile Printing
Proofpoint
 

Mehr von Proofpoint (20)

You can wear it!
You can wear it!You can wear it!
You can wear it!
 
Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD? Is your enterprise ready for WYOD?
Is your enterprise ready for WYOD?
 
Accellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, LondonAccellion - The European Information Security Summit, London
Accellion - The European Information Security Summit, London
 
The Case for Mobilizing SharePoint
The Case for Mobilizing SharePointThe Case for Mobilizing SharePoint
The Case for Mobilizing SharePoint
 
Adventures in File Sharing
Adventures in File SharingAdventures in File Sharing
Adventures in File Sharing
 
Mobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations TeamsMobile Productivity for Field Operations Teams
Mobile Productivity for Field Operations Teams
 
Mobile Productivity for Marketing Teams
Mobile Productivity for Marketing TeamsMobile Productivity for Marketing Teams
Mobile Productivity for Marketing Teams
 
Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams Mobile Productivity for Healthcare Teams
Mobile Productivity for Healthcare Teams
 
Law Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile ProductivityLaw Firms: Making the Case for Secure Mobile Productivity
Law Firms: Making the Case for Secure Mobile Productivity
 
Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams Mobile Productivity for Legal Teams
Mobile Productivity for Legal Teams
 
Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams Mobile Productivity for Sales Teams
Mobile Productivity for Sales Teams
 
Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014Accellion SC Congress Chicago Presentation 2014
Accellion SC Congress Chicago Presentation 2014
 
Achieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government AgenciesAchieving Secure BYOD in Government Agencies
Achieving Secure BYOD in Government Agencies
 
The London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure RealityThe London Borough of Camden- Making BYOD a Secure Reality
The London Borough of Camden- Making BYOD a Secure Reality
 
Accellion Secure Mobile Printing
Accellion Secure Mobile PrintingAccellion Secure Mobile Printing
Accellion Secure Mobile Printing
 
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
(ISC)2 Secure Seattle 2013: Enable Secure and Mobile Cloud Collaboration
 
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
Do you Know Where Your Data Is? - Accellion InfoSec World 2013 Conference pre...
 
Enable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud CollaborationEnable Secure Mobile & Cloud Collaboration
Enable Secure Mobile & Cloud Collaboration
 
Accellion infographic-kitepoint
Accellion infographic-kitepointAccellion infographic-kitepoint
Accellion infographic-kitepoint
 
Executive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion PresentationExecutive Alliance Dallas - Accellion Presentation
Executive Alliance Dallas - Accellion Presentation
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Kürzlich hochgeladen (20)

Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 

Accellion Infographic: The Effects of Mobile on the Enterprise

  • 1. T H E E F F E C T S O F ON THE ENTERPRISE more households will become remote workplaces for employees will use the same devices for both personal and work activities 3 5out of In the U.S. of the workforce will be mobile The average mobile worker will carry 3.5devices 84% workers say they no longer need to be in an 1 2 9 of companies are focused on supporting mobile workers better 3 52% 32% increase in mobile malware families, year-over-year 6 of all mobile malware steals information from the compromised device Mobile devices are enticing to malware developers because of the business- information employees store on them A study found that when doctors’ use of data breaches rose to Violation of HIPAA regulations can lead to hundreds of thousands in 7 On average a cell phone is lost in the U.S. every 3.5seconds5 15%year-over- year 4 Mobile security vulnerabilities are rising of information security professionals rate lost devices as their number one concern11 Majority of enterprises have reported at least one mobile security incident within the past 12 months 12 of executives expect to support more devices in the next 12 months 3 More devices means increased security risks for businesses via lost phones and tablets, user-error and software vulnerabilities11 Enterprises Need to Ensure Mobile Security Enterprises need to consider: o Mobile Device Management o Mobile App Management o Mobile Content Management This infographic is for informational purposes only. Some of the information is selected from public sources which we believe is reasonable in relation to subject matter and are believed to be accurate. Accellion makes no warranties, express or implied, as to the information in this infographic. Accellion is either a registered trademark or trademark of Accellion, Inc. in the United States and/or other countries. Other trademarks and tradenames appearing in this presentation are the property of their respective owners. We do not intend our use or display of other companies’ tradenames, trademarks or service marks to imply a relationship with, or endorsement or sponsorship of us by, these other companies. Microsoft and SharePoint are either registered trademarks or trademarks of Microsoft Corporation registered in the United States and/or other countries. Document published March 2013. Visit www.accellion.com/solutions choose Accellion to secure all of their mobile content. References 1 http://network.cisco.com/the-future-of-workplace-mobility.html 2 http://mobile-workforce-project.ipass.com/cpwp/wp-content/uploads/2012/03/ipass_mobileworkforcereport_q1_2012.pdf 3 http://www.zdnet.com/mobile-security-top-enterprise-bogeyman-7000005560/ 4 http://www.computerweekly.com/news/2240105733/Mobile-malware-is-on-the-rise-warns-IBM-report 5 http://blogs.smartmoney.com/paydirt/2012/03/23/lost-phones-cost-americans-30-billion-a-year/ 6 http://www.symantec.com/security_response/publications/threatreport.jsp 7 http://www.amednews.com/article/20111219/business/312199967/2/ 8 http://mobileenterprise.edgl.com/how-to/Mobile-Security-Risk-Correlates-with-Benefits86198 9 http://aa-download.avg.com/filedir/other/Smartphone.pdf 10 http://www.thesecurityblog.com/2011/06/how-businesses-and-users-can-improve-mobile-security/ 11 http://www.emc.com/collateral/industry-overview/h11109-rsa-realizing-mobile-enterprise.pdf 12 http://www.fiercemobileit.com/story/symantec-majority-enterprises-report-least-one-mobile-security-incident-pas/2013-04-28 55% 32% 75% In 2013 more than 84% 58% 2012 saw a 3 In 2013 million