SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
HOW MANY PEOPLE WORK REMOTELY?
WHAT MOBILE DEVICES DO THEY USE?
50
Million
125
Million
About 125 million U.S. consumers own
smartphones, 50 million own tablets.
DO YOU BRING YOUR OWN DEVICE (BYOD)?
1out of 3people would gladly
break any anti-BYOD rules and
“contravene a company’s security
policy that forbids them to use their
personal devices at work or for work
purposes.” Young “20-something”
workers view BYOD policies as more
of a right than a privilege.
2012
2017
HOW BIG IS MOBILE DATA TRAFFIC?
342 MB
820 MB
In 2012: 342 MB per month per smartphone and 820 MB per tablet.
In 2017: Monthly global data traffic will surpass 10 exabytes.
ARE THERE ANY LOCAL DIFFERENCES?
RESULTS SO FAR
HOW CAN YOU MAKE YOUR
MOBILE STRATEGY MORE SECURE?
Have a well-understood mobile security policy1
2
3
Use an on-premise Mobile Information Management
solution that provides mobile data access via a mobile
app acting as a secure container
Add encryption and secure communication protocols
NetApp®
Connect is an on-premise solution from NetApp that helps connect people, devices
and corporate data without compromising your IT security. For more information go to:
http://www.netapp.com/us/products/software/connect/
HOW SECURE IS YOUR CORPORATE DATA
IN A MOBILE WORLD?
Most common security incidents
WHAT ARE THE DATA MOST AT RISK?
Personal and corporate-owned devices often store and access a variety
of sensitive information including:
79% email
(internal database or business applications)
WHAT IS THE AVERAGE COST OF
A SECURITY INCIDENT?
(includes data loss, damage to the brand, productivity loss, and loss of customer trust)
72%
say that careless employees are a greater security threat than
hackers. This is followed by:
- In 2008: 32,544 mobile phones
were left in taxis in New York alone in
a 6-month period
- There is an 83% chance that the
person who found a lost
corporate-connected device will
attempt to access corporate data or
the corporate network
Insecure Wi-Fi
Connectivity
59%
The average remote worker spends
About 80%of
companies in the U.S. offer
some form of telecommuting
US$429,000 for enterprises US$126,000 for small businesses
Malicious Mobile
Application Download
57%
Mobile Web Browsing
61%
Lost or Stolen Devices
58%
By 2015, the world’s mobile worker
population will reach 1.3 billion, or
37.2% of the total workforce.
The number of mobile-connected
devices will exceed the world’s
population in 2013.
25hrs = 40hrs
87%of managers report
increased productivity of between 5-25%
spent working
at home
spent in the office
11%more hours working than an office-based worker.
47% customer data
38% login credentials
!
Corporate Data
Goes Mobile
How to increase productivity and employee satisfaction at the same
time? Mobile data access seems to be the magic key. The pressure is high
on IT to provide solutions that don't put corporate data at risk. Let's see
what the latest trends are and how the right Mobile Information
Management solution can keep both IT and users smiling.
10 EB
1. According to a survey conducted by Chicago outplacement firm Challenger, Gray & Christmas Inc.
http://www.newsadvance.com/work_it_lynchburg/news/article_f6d82800-900c-11e2-b88d-001a4bcf6878.html
2. IDC press release 1/5/2012 http://www.idc.com/getdoc.jsp?containerId=prUS23251912
3. http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.html
4. ComScore's "2013 Mobile Future in Focus" report, http://www.comscore.com/Insights/Presentations_and_Whitepapers/2013/2013_Mobile_Future_in_Focus
5. http://www.cio.com/article/708718/Young_Employees_Say_BYOD_a_Right_Not_Privilege_
6. http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.html
7. http://www.rediff.com/business/slide-show/slide-show-1-india-moving-towards-a-mobile-workforce/20121004.html
8. http://finance.yahoo.com/news/mobile-workforce-productivity-rise-60-040100531.html
9. http://www.slideshare.net/jackies/presentation-remote-workforce-v2
10. http://www.checkpoint.com/press/2012/011812-check-point-businesses-admit-increase-security.html
11. The Smart Phone Honey Stick project survey conducted by Symantec conducted in 2012 http://discover.profitstars.com/strategicallyspeaking/?Tag=BYOD%20workforce
12. http://www.checkpoint.com/press/2012/011812-check-point-businesses-admit-increase-security.html
13. http://www.cfoinnovation.com/content/mobile-security-incidents-cost-enterprises-usd429000-year
© 2013 NetApp, Inc.
9
6
5
4
3
2
1
10
11
11
12
13
Percentage of mobile workers who sometime or obsessively wake up during the
night to check their smartphone:
83% of Indian organizations can technically support mobile work styles
compared to the global average of 57%.
8
31%
21%
56%
7

Weitere ähnliche Inhalte

Was ist angesagt?

Deathofthetraditionalenterpriserebirthofitdepartmentzuzannapasierbinska Wilso...
Deathofthetraditionalenterpriserebirthofitdepartmentzuzannapasierbinska Wilso...Deathofthetraditionalenterpriserebirthofitdepartmentzuzannapasierbinska Wilso...
Deathofthetraditionalenterpriserebirthofitdepartmentzuzannapasierbinska Wilso...
DCWhite
 

Was ist angesagt? (20)

Make data simple in the cognitive era
Make data simple in the cognitive eraMake data simple in the cognitive era
Make data simple in the cognitive era
 
Product Relationship Management (PRM): What Every Connected Business Needs
Product Relationship Management (PRM): What Every Connected Business NeedsProduct Relationship Management (PRM): What Every Connected Business Needs
Product Relationship Management (PRM): What Every Connected Business Needs
 
Big Data LDN 2017: Creating ROI from Big Data Investments - Monetizing your B...
Big Data LDN 2017: Creating ROI from Big Data Investments - Monetizing your B...Big Data LDN 2017: Creating ROI from Big Data Investments - Monetizing your B...
Big Data LDN 2017: Creating ROI from Big Data Investments - Monetizing your B...
 
Blair christie global editors conf 12.9.14 final
Blair christie global editors conf 12.9.14 finalBlair christie global editors conf 12.9.14 final
Blair christie global editors conf 12.9.14 final
 
Big Data LDN 2017: The Logical Data Warehouse – A Modern Analytical Architect...
Big Data LDN 2017: The Logical Data Warehouse – A Modern Analytical Architect...Big Data LDN 2017: The Logical Data Warehouse – A Modern Analytical Architect...
Big Data LDN 2017: The Logical Data Warehouse – A Modern Analytical Architect...
 
Terminology guide for digital health in 2021
Terminology guide for digital health in 2021Terminology guide for digital health in 2021
Terminology guide for digital health in 2021
 
Big Data LDN 2017: Big Impact with Big Data
Big Data LDN 2017: Big Impact with Big DataBig Data LDN 2017: Big Impact with Big Data
Big Data LDN 2017: Big Impact with Big Data
 
Data Analytics - The Insight
Data Analytics - The InsightData Analytics - The Insight
Data Analytics - The Insight
 
Data center trends in 2017
Data center trends in 2017Data center trends in 2017
Data center trends in 2017
 
Deathofthetraditionalenterpriserebirthofitdepartmentzuzannapasierbinska Wilso...
Deathofthetraditionalenterpriserebirthofitdepartmentzuzannapasierbinska Wilso...Deathofthetraditionalenterpriserebirthofitdepartmentzuzannapasierbinska Wilso...
Deathofthetraditionalenterpriserebirthofitdepartmentzuzannapasierbinska Wilso...
 
Html5 workshop part 1
Html5 workshop part 1Html5 workshop part 1
Html5 workshop part 1
 
Predictive Enterprise Strategic Overview
Predictive Enterprise Strategic OverviewPredictive Enterprise Strategic Overview
Predictive Enterprise Strategic Overview
 
Big Data and Artificial Intelligence in Indonesia
Big Data and Artificial Intelligence in IndonesiaBig Data and Artificial Intelligence in Indonesia
Big Data and Artificial Intelligence in Indonesia
 
90% of Enterprises are Using DataOps. Why Aren’t You?
90% of Enterprises are Using DataOps. Why Aren’t You?90% of Enterprises are Using DataOps. Why Aren’t You?
90% of Enterprises are Using DataOps. Why Aren’t You?
 
What is the Social Graph?
What is the Social Graph?What is the Social Graph?
What is the Social Graph?
 
Cisco niels vd berg
Cisco niels vd bergCisco niels vd berg
Cisco niels vd berg
 
Company presentation Servicenoew
Company presentation ServicenoewCompany presentation Servicenoew
Company presentation Servicenoew
 
Palvelut ja uusi teknologia tuomassa tasapainoa työhön ja vapaa-aikaan
Palvelut ja uusi teknologia tuomassa tasapainoa työhön ja vapaa-aikaanPalvelut ja uusi teknologia tuomassa tasapainoa työhön ja vapaa-aikaan
Palvelut ja uusi teknologia tuomassa tasapainoa työhön ja vapaa-aikaan
 
Taming Your Hybrid Cloud - Doug Bourgeois
Taming Your Hybrid Cloud - Doug BourgeoisTaming Your Hybrid Cloud - Doug Bourgeois
Taming Your Hybrid Cloud - Doug Bourgeois
 
5 Steps to Gov IT Modernization
5 Steps to Gov IT Modernization5 Steps to Gov IT Modernization
5 Steps to Gov IT Modernization
 

Ähnlich wie Corporate Data Goes Mobile

Security that works
Security that worksSecurity that works
Security that works
James1280
 
Is your data safe Infographic by Symantec
Is your data safe Infographic by SymantecIs your data safe Infographic by Symantec
Is your data safe Infographic by Symantec
Cheapest SSLs
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
Tommy Riggins
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
SelectedPresentations
 

Ähnlich wie Corporate Data Goes Mobile (20)

Security that works
Security that worksSecurity that works
Security that works
 
Surviving the mobile invasion - They're spreading fast and they're vulnerable
Surviving the mobile invasion - They're spreading fast and they're vulnerableSurviving the mobile invasion - They're spreading fast and they're vulnerable
Surviving the mobile invasion - They're spreading fast and they're vulnerable
 
E magazine march issue 2021
E magazine march issue 2021E magazine march issue 2021
E magazine march issue 2021
 
5 Ways BYOD Can Grow Your Business
5 Ways BYOD Can Grow Your Business5 Ways BYOD Can Grow Your Business
5 Ways BYOD Can Grow Your Business
 
Building a Smarter Workplace
Building a Smarter WorkplaceBuilding a Smarter Workplace
Building a Smarter Workplace
 
BYOD
BYODBYOD
BYOD
 
Is your data safe Infographic by Symantec
Is your data safe Infographic by SymantecIs your data safe Infographic by Symantec
Is your data safe Infographic by Symantec
 
10 Incredible BYOD Facts
10 Incredible BYOD Facts10 Incredible BYOD Facts
10 Incredible BYOD Facts
 
Melbourne ICT Scorecard
Melbourne ICT ScorecardMelbourne ICT Scorecard
Melbourne ICT Scorecard
 
MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
 MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
MODERNIZING YOUR WORKPLACE WITH THE NEW OFFICE
 
Continuing Education Conferance
Continuing Education ConferanceContinuing Education Conferance
Continuing Education Conferance
 
The impact of mobile devices on information security
The impact of mobile devices on information securityThe impact of mobile devices on information security
The impact of mobile devices on information security
 
Navigating the Flood of BYOD
Navigating the Flood of BYODNavigating the Flood of BYOD
Navigating the Flood of BYOD
 
Large-Scale Remote Access & Mobility
Large-Scale Remote Access & MobilityLarge-Scale Remote Access & Mobility
Large-Scale Remote Access & Mobility
 
The Future of BYOD, BYOA and Consumerization
The Future of BYOD, BYOA and ConsumerizationThe Future of BYOD, BYOA and Consumerization
The Future of BYOD, BYOA and Consumerization
 
Protect Your Workplace e book
Protect Your Workplace e bookProtect Your Workplace e book
Protect Your Workplace e book
 
50 Powerful Statistics About Tech Megatrends Affecting Every Business
50 Powerful Statistics About Tech Megatrends Affecting Every Business50 Powerful Statistics About Tech Megatrends Affecting Every Business
50 Powerful Statistics About Tech Megatrends Affecting Every Business
 
Mobile Security Trends in the Workplace
Mobile Security Trends in the WorkplaceMobile Security Trends in the Workplace
Mobile Security Trends in the Workplace
 
Consumer tech invasion
Consumer tech invasionConsumer tech invasion
Consumer tech invasion
 
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterpriseMbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
 

Mehr von NetApp

Mehr von NetApp (20)

DevOps the NetApp Way: 10 Rules for Forming a DevOps Team
DevOps the NetApp Way: 10 Rules for Forming a DevOps TeamDevOps the NetApp Way: 10 Rules for Forming a DevOps Team
DevOps the NetApp Way: 10 Rules for Forming a DevOps Team
 
10 Reasons to Choose NetApp for EUC/VDI
10 Reasons to Choose NetApp for EUC/VDI10 Reasons to Choose NetApp for EUC/VDI
10 Reasons to Choose NetApp for EUC/VDI
 
Spot Lets NetApp Get the Most Out of the Cloud
Spot Lets NetApp Get the Most Out of the CloudSpot Lets NetApp Get the Most Out of the Cloud
Spot Lets NetApp Get the Most Out of the Cloud
 
NetApp #WFH: COVID-19 Impact Report
NetApp #WFH: COVID-19 Impact ReportNetApp #WFH: COVID-19 Impact Report
NetApp #WFH: COVID-19 Impact Report
 
4 Ways FlexPod Forms the Foundation for Cisco and NetApp Success
4 Ways FlexPod Forms the Foundation for Cisco and NetApp Success4 Ways FlexPod Forms the Foundation for Cisco and NetApp Success
4 Ways FlexPod Forms the Foundation for Cisco and NetApp Success
 
NetApp 2020 Predictions
NetApp 2020 Predictions NetApp 2020 Predictions
NetApp 2020 Predictions
 
NetApp 2020 Predictions
NetApp 2020 Predictions NetApp 2020 Predictions
NetApp 2020 Predictions
 
NetApp 2020 Predictions in Tech
NetApp 2020 Predictions in TechNetApp 2020 Predictions in Tech
NetApp 2020 Predictions in Tech
 
Corporate IT at NetApp
Corporate IT at NetAppCorporate IT at NetApp
Corporate IT at NetApp
 
Modernize small and mid-sized enterprise data management with the AFF C190
Modernize small and mid-sized enterprise data management with the AFF C190Modernize small and mid-sized enterprise data management with the AFF C190
Modernize small and mid-sized enterprise data management with the AFF C190
 
Achieving Target State Architecture in NetApp IT
Achieving Target State Architecture in NetApp ITAchieving Target State Architecture in NetApp IT
Achieving Target State Architecture in NetApp IT
 
10 Reasons Why Your SAP Applications Belong on NetApp
10 Reasons Why Your SAP Applications Belong on NetApp10 Reasons Why Your SAP Applications Belong on NetApp
10 Reasons Why Your SAP Applications Belong on NetApp
 
Turbocharge Your Data with Intel Optane Technology and MAX Data
Turbocharge Your Data with Intel Optane Technology and MAX DataTurbocharge Your Data with Intel Optane Technology and MAX Data
Turbocharge Your Data with Intel Optane Technology and MAX Data
 
Redefining HCI: How to Go from Hyper Converged to Hybrid Cloud Infrastructure
Redefining HCI: How to Go from Hyper Converged to Hybrid Cloud InfrastructureRedefining HCI: How to Go from Hyper Converged to Hybrid Cloud Infrastructure
Redefining HCI: How to Go from Hyper Converged to Hybrid Cloud Infrastructure
 
Webinar: NetApp SaaS Backup
Webinar: NetApp SaaS BackupWebinar: NetApp SaaS Backup
Webinar: NetApp SaaS Backup
 
NetApp 2019 Perspectives
NetApp 2019 PerspectivesNetApp 2019 Perspectives
NetApp 2019 Perspectives
 
Künstliche Intelligenz ist in deutschen Unter- nehmen Chefsache
Künstliche Intelligenz ist in deutschen Unter- nehmen ChefsacheKünstliche Intelligenz ist in deutschen Unter- nehmen Chefsache
Künstliche Intelligenz ist in deutschen Unter- nehmen Chefsache
 
Iperconvergenza come migliora gli economics del tuo IT
Iperconvergenza come migliora gli economics del tuo ITIperconvergenza come migliora gli economics del tuo IT
Iperconvergenza come migliora gli economics del tuo IT
 
10 Good Reasons: NetApp for Artificial Intelligence / Deep Learning
10 Good Reasons: NetApp for Artificial Intelligence / Deep Learning10 Good Reasons: NetApp for Artificial Intelligence / Deep Learning
10 Good Reasons: NetApp for Artificial Intelligence / Deep Learning
 
NetApp IT’s Tiered Archive Approach for Active IQ
NetApp IT’s Tiered Archive Approach for Active IQNetApp IT’s Tiered Archive Approach for Active IQ
NetApp IT’s Tiered Archive Approach for Active IQ
 

Kürzlich hochgeladen

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 

Corporate Data Goes Mobile

  • 1. HOW MANY PEOPLE WORK REMOTELY? WHAT MOBILE DEVICES DO THEY USE? 50 Million 125 Million About 125 million U.S. consumers own smartphones, 50 million own tablets. DO YOU BRING YOUR OWN DEVICE (BYOD)? 1out of 3people would gladly break any anti-BYOD rules and “contravene a company’s security policy that forbids them to use their personal devices at work or for work purposes.” Young “20-something” workers view BYOD policies as more of a right than a privilege. 2012 2017 HOW BIG IS MOBILE DATA TRAFFIC? 342 MB 820 MB In 2012: 342 MB per month per smartphone and 820 MB per tablet. In 2017: Monthly global data traffic will surpass 10 exabytes. ARE THERE ANY LOCAL DIFFERENCES? RESULTS SO FAR HOW CAN YOU MAKE YOUR MOBILE STRATEGY MORE SECURE? Have a well-understood mobile security policy1 2 3 Use an on-premise Mobile Information Management solution that provides mobile data access via a mobile app acting as a secure container Add encryption and secure communication protocols NetApp® Connect is an on-premise solution from NetApp that helps connect people, devices and corporate data without compromising your IT security. For more information go to: http://www.netapp.com/us/products/software/connect/ HOW SECURE IS YOUR CORPORATE DATA IN A MOBILE WORLD? Most common security incidents WHAT ARE THE DATA MOST AT RISK? Personal and corporate-owned devices often store and access a variety of sensitive information including: 79% email (internal database or business applications) WHAT IS THE AVERAGE COST OF A SECURITY INCIDENT? (includes data loss, damage to the brand, productivity loss, and loss of customer trust) 72% say that careless employees are a greater security threat than hackers. This is followed by: - In 2008: 32,544 mobile phones were left in taxis in New York alone in a 6-month period - There is an 83% chance that the person who found a lost corporate-connected device will attempt to access corporate data or the corporate network Insecure Wi-Fi Connectivity 59% The average remote worker spends About 80%of companies in the U.S. offer some form of telecommuting US$429,000 for enterprises US$126,000 for small businesses Malicious Mobile Application Download 57% Mobile Web Browsing 61% Lost or Stolen Devices 58% By 2015, the world’s mobile worker population will reach 1.3 billion, or 37.2% of the total workforce. The number of mobile-connected devices will exceed the world’s population in 2013. 25hrs = 40hrs 87%of managers report increased productivity of between 5-25% spent working at home spent in the office 11%more hours working than an office-based worker. 47% customer data 38% login credentials ! Corporate Data Goes Mobile How to increase productivity and employee satisfaction at the same time? Mobile data access seems to be the magic key. The pressure is high on IT to provide solutions that don't put corporate data at risk. Let's see what the latest trends are and how the right Mobile Information Management solution can keep both IT and users smiling. 10 EB 1. According to a survey conducted by Chicago outplacement firm Challenger, Gray & Christmas Inc. http://www.newsadvance.com/work_it_lynchburg/news/article_f6d82800-900c-11e2-b88d-001a4bcf6878.html 2. IDC press release 1/5/2012 http://www.idc.com/getdoc.jsp?containerId=prUS23251912 3. http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.html 4. ComScore's "2013 Mobile Future in Focus" report, http://www.comscore.com/Insights/Presentations_and_Whitepapers/2013/2013_Mobile_Future_in_Focus 5. http://www.cio.com/article/708718/Young_Employees_Say_BYOD_a_Right_Not_Privilege_ 6. http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.html 7. http://www.rediff.com/business/slide-show/slide-show-1-india-moving-towards-a-mobile-workforce/20121004.html 8. http://finance.yahoo.com/news/mobile-workforce-productivity-rise-60-040100531.html 9. http://www.slideshare.net/jackies/presentation-remote-workforce-v2 10. http://www.checkpoint.com/press/2012/011812-check-point-businesses-admit-increase-security.html 11. The Smart Phone Honey Stick project survey conducted by Symantec conducted in 2012 http://discover.profitstars.com/strategicallyspeaking/?Tag=BYOD%20workforce 12. http://www.checkpoint.com/press/2012/011812-check-point-businesses-admit-increase-security.html 13. http://www.cfoinnovation.com/content/mobile-security-incidents-cost-enterprises-usd429000-year © 2013 NetApp, Inc. 9 6 5 4 3 2 1 10 11 11 12 13 Percentage of mobile workers who sometime or obsessively wake up during the night to check their smartphone: 83% of Indian organizations can technically support mobile work styles compared to the global average of 57%. 8 31% 21% 56% 7