SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Enterprise IT Consumerization Survey
June 2011



                Classification 03/28/13
                         Classification   Copyright 2009 Trend Micro Inc.   1
Objectives and Methodology
Objectives:
• To obtain a better/deeper understanding of IT Consumerization
  collaboration/social media in the workplace.

Methodology:
• An online survey was conducted in the US, Germany, and Japan among
  IT personnel responsible for endpoint operational management (desktop,
  laptop, smartphone, tablet, etc.) and/or messaging and collaboration
  operations (email, IM, sharepoint, etc.).
• Respondents needed to be part of an organization with at least 500
  employees worldwide .
• A total of 600 surveys were collected. Country breakdown as follows:
    o United States: 200
    o Germany: 200
    o Japan: 200




                              Classification 03/28/13
                                       Classification   Copyright 2011 Trend Micro Inc.   2
Employee Use of Personal Devices

• A majority of companies in the US and Germany allowed their employees to use
  personal devices for work-related activities.
• Significantly more companies in the US allowed their employees to use their personal
  devices for work-related activities than companies in both Germany and Japan.




   Question: Does your company allow employees to use their personal device(s) such as laptops, netbooks, smartphones, and tablets for work-related activities?


                                                               Classification 03/28/13
                                                                        Classification   Copyright 2011 Trend Micro Inc.   3
Corporate Applications/Databases
Accessible from Personal Devices
• The most common corporate applications/databases employees are allowed to access
  with their personal devices are email, calendars, contacts and intranet web.
• US employees were given access to more applications or databases than employees in
  Japan.




         Question: What corporate applications or databases can employees access from their personal devices? Please select all that apply.


                                                         Classification 03/28/13
                                                                  Classification   Copyright 2011 Trend Micro Inc.   4
Reasons Companies Allow Employees to Use
Personal Devices for Work-Related Activities
• Of companies that allow their employees to use their personal device(s) for work-related
  activities, most indicated they do so for productivity enablement.
• Another top reason is business IT capital cost savings, particularly in the US.




        Question: Why does your company allow employees to use their personal devices(s) for work-related activities? Please select all that apply.

                                                            Classification 03/28/13
                                                                     Classification   Copyright 2011 Trend Micro Inc.   5
Mobile Devices Connected to Corporate
Network—Median Distribution
• In the US and Germany, the distribution of devices connected to the corporate network
  was similar, with a majority of the devices being laptops/netbooks, followed by
  smartphones and tablet computers.
• In Japan, laptops/netbooks composed 100% of the mobile devices connected to the
  corporate network.




 Question: About how many mobile devices (whether company-owned or employee-owned, whether they are used in the office or remotely) are connected to your corporate network?


                                                               Classification 03/28/13
                                                                        Classification   Copyright 2011 Trend Micro Inc.   6
Concerns with Employee Personal Devices
in the Workplace
• Most companies in the US, Germany, and Japan indicated concern with security issues
  and data loss/theft regarding allowing employees to bring their personal devices in the
  workplace.
• Compliance and legal implications was a greater concern in the US and Japan than in
  Germany.




   Question: What are your company's concerns, if any, regarding allowing employees to bring their personal devices in the workplace? Please select all that apply.


                                                                 Classification 03/28/13
                                                                          Classification   Copyright 2011 Trend Micro Inc.   7
Corporate Network/Data Protection
from Mobile Devices—US
• Nearly all companies in the US indicated they currently have measures in place to
  protect corporate networks and data from company-owned mobile devices as well as
  personal devices; most often through installed security software.




                 Question: How do you protect corporate networks and data from the personal devices employees bring to the workplace?
                 Question: How do you protect corporate networks and data from the company-owned mobile devices?
                                                 Classification 03/28/13
                                                          Classification   Copyright 2011 Trend Micro Inc.   8
Corporate Network/Data Protection
from Mobile Devices—Germany
• Nearly all companies in Germany indicated they currently have measures in place to protect
  corporate networks and data from company-owned mobile devices as well as personal
  devices; most often through security software and ability to lock down mobile devices.




                 Question: How do you protect corporate networks and data from the personal devices employees bring to the workplace?
                 Question: How do you protect corporate networks and data from the company-owned mobile devices?
                                                 Classification 03/28/13
                                                          Classification   Copyright 2011 Trend Micro Inc.   9
Corporate Network/Data Protection
from Mobile Devices—Japan
• Similar to the US and Germany, most companies in Japan indicated they currently have
  measures in place to protect corporate networks and data from company-owned mobile
  devices as well as personal devices; most often through installed security software.




                 Question: How do you protect corporate networks and data from the personal devices employees bring to the workplace?
                 Question: How do you protect corporate networks and data from the company-owned mobile devices?
                                                 Classification 03/28/13
                                                          Classification   Copyright 2011 Trend Micro Inc. 10
Viewpoints on Use of Mobile Devices—US
      • US respondents agreed that they trust company-owned mobile devices more than
        personal devices employees bring to the workplace and that devices are vulnerable as
        long as any corporate data is stored on the mobile device.
  We trust company-owned devices more than personal devices employees bring to the
                                                                      workplace.
   Devices are vulnerable as long as any corporate data is stored on the mobile device.


     Employees should be required to install and use security software as a condition to
                                             accessing corporate applications and data.
 We will manage company-owned devices and personal devices employees bring to the
                                                        workplace the same way.
 The use of mobile security AND mobile device management is most effective means of
                       managing and securing devices brought to work by employees.
The use of VDI for computers/smartphones/tablets and other mobile devices brought to
                           work by employees is the most effective security measure.
With allowing employees to bring their own computers to work, company will realize ROI
                              by not having to invest in laptops & other mobile devices.
  Employees are bringing their own computers/smartphones/tablets, etc. to work and IT
                             needs to enable/empower employees using their devices.
       If we had to choose one of the two following solutions, we'd prefer mobile device
                                              management over anti-virus/anti-malware.
  There are lost smartphones and an ever growing amount of our company's intellectual
                                                    property on these smartphones.
   The growth of employees using their personal devices for work related activities was
                                                                rapid and unplanned.
     We see the shift of IT role from a commander/controller to an advisor in support of
                                          employees bringing their own devices to work.




                                             Question: Please tell us how much you agree or disagree with the following statements.
                                                                      Classification 03/28/13
                                                                               Classification   Copyright 2011 Trend Micro Inc. 11
Viewpoints on Use of Mobile Devices—Germany
      • Similar to the US, most respondents in Germany agreed that they trust company-owned
        mobile devices more than personal devices employees bring to the workplace.
  We trust company-owned devices more than personal devices employees bring to the
                                                                      workplace.
     Employees should be required to install and use security software as a condition to
                                             accessing corporate applications and data.
   Devices are vulnerable as long as any corporate data is stored on the mobile device.


 The use of mobile security AND mobile device management is most effective means of
                       managing and securing devices brought to work by employees.
     We see the shift of IT role from a commander/controller to an advisor in support of
                                          employees bringing their own devices to work.

  There are lost smartphones and an ever growing amount of our company's intellectual
                                                    property on these smartphones.

  Employees are bringing their own computers/smartphones/tablets, etc. to work and IT
                             needs to enable/empower employees using their devices.

       If we had to choose one of the two following solutions, we'd prefer mobile device
                                              management over anti-virus/anti-malware.

The use of VDI for computers/smartphones/tablets and other mobile devices brought to
                           work by employees is the most effective security measure.

 We will manage company-owned devices and personal devices employees bring to the
                                                        workplace the same way.

With allowing employees to bring their own computers to work, company will realize ROI
                              by not having to invest in laptops & other mobile devices.

   The growth of employees using their personal devices for work related activities was
                                                                rapid and unplanned.




                                             Question: Please tell us how much you agree or disagree with the following statements.
                                                                      Classification 03/28/13
                                                                               Classification   Copyright 2011 Trend Micro Inc. 12
Viewpoints on Use of Mobile Devices—Japan
      • In Japan, most respondents trusted company-owned mobile devices more than personal
        devices employees bring to the workplace and felt that devices are vulnerable as long
        as any corporate data is stored on the mobile device.
  We trust company-owned devices more than personal devices employees bring to the
                                                                      workplace.
   Devices are vulnerable as long as any corporate data is stored on the mobile device.


  There are lost smartphones and an ever growing amount of our company's intellectual
                                                    property on these smartphones.
     Employees should be required to install and use security software as a condition to
                                             accessing corporate applications and data.
The use of mobile security AND mobile device management is most effective means of
                       managing and securing devices brought to work by employees.
       If we had to choose one of the two following solutions, we'd prefer mobile device
                                              management over anti-virus/anti-malware.
 We will manage company-owned devices and personal devices employees bring to the
                                                        workplace the same way.
The use of VDI for computers/smartphones/tablets and other mobile devices brought to
                           work by employees is the most effective security measure.
With allowing employees to bring their own computers to work, company will realize ROI
                              by not having to invest in laptops & other mobile devices.
  Employees are bringing their own computers/smartphones/tablets, etc. to work and IT
                             needs to enable/empower employees using their devices.
   The growth of employees using their personal devices for work related activities was
                                                                rapid and unplanned.
     We see the shift of IT role from a commander/controller to an advisor in support of
                                          employees bringing their own devices to work.




                                             Question: Please tell us how much you agree or disagree with the following statements.
                                                                      Classification 03/28/13
                                                                               Classification   Copyright 2011 Trend Micro Inc. 13
Currently Supported Internal Collaboration/
Social Networking Initiatives
• The majority of respondents in the US and Germany, and two thirds in Japan reported their
  company currently supported certain internal collaboration or social networking initiatives.
• Overall, the US supported more initiatives than Japan with instant messaging being the most
  frequent US-supported initiative.




      Question: What internal collaboration or social networking initiatives within your organization are you currently supporting? Please select all that apply.


                                                                 Classification 03/28/13
                                                                          Classification   Copyright 2011 Trend Micro Inc. 14
Policies Regarding Usage of Collaboration
and Social Networking Tools
• For each country surveyed, companies were more likely to have policies regarding
  internal collaboration or social networking tools than external tools.
• Companies in the US were significantly more likely to have policies in place (for either
  internal or external tools) than in Germany or Japan.




               Question: Does your company currently have policies regarding usage of collaboration and social networking tools?


                                                      Classification 03/28/13
                                                               Classification   Copyright 2011 Trend Micro Inc. 15

Weitere ähnliche Inhalte

Was ist angesagt?

IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2J M
 
Discovering Computers: Chapter 01
Discovering Computers: Chapter 01Discovering Computers: Chapter 01
Discovering Computers: Chapter 01Anna Stirling
 
IET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesChris Pepin
 
White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...
White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...
White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...AeroFS
 
BASIC COMPUTERS
BASIC COMPUTERSBASIC COMPUTERS
BASIC COMPUTERSArMags
 
Employee use of mobile devices
Employee use of mobile devicesEmployee use of mobile devices
Employee use of mobile devicesmkeane
 
Windows phone 8 enterprise and Mobile Device Managment by Andrej Radinger (mdm)
Windows phone 8 enterprise and Mobile Device Managment by Andrej Radinger (mdm)Windows phone 8 enterprise and Mobile Device Managment by Andrej Radinger (mdm)
Windows phone 8 enterprise and Mobile Device Managment by Andrej Radinger (mdm)mgligorovski
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud accessAGILLY
 
Apple Device Management
Apple Device ManagementApple Device Management
Apple Device ManagementHexnode
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD RightRapidScale
 
German IT Pros Survey: Network Complexity
German IT Pros Survey: Network ComplexityGerman IT Pros Survey: Network Complexity
German IT Pros Survey: Network ComplexitySolarWinds
 
Summit 2010 04 27 Which New Technologies Are Right For Your Enterprise Rev 1
Summit 2010 04 27 Which New Technologies Are Right For Your Enterprise   Rev 1Summit 2010 04 27 Which New Technologies Are Right For Your Enterprise   Rev 1
Summit 2010 04 27 Which New Technologies Are Right For Your Enterprise Rev 1Joe Alexander
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD HandbookBarcoding, Inc.
 
IBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile ApproachIBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile ApproachGraham Acres
 
2: Technology - The driving force behind E-Commerce:
2: Technology - The driving force behind E-Commerce:2: Technology - The driving force behind E-Commerce:
2: Technology - The driving force behind E-Commerce:Jitendra Tomar
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...AGILLY
 

Was ist angesagt? (20)

ICT in Society
ICT in SocietyICT in Society
ICT in Society
 
IS3101 Tutorial Task 2
IS3101 Tutorial Task 2IS3101 Tutorial Task 2
IS3101 Tutorial Task 2
 
Discovering Computers: Chapter 01
Discovering Computers: Chapter 01Discovering Computers: Chapter 01
Discovering Computers: Chapter 01
 
IET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote workingIET India cybersecurity advisory: security practices for remote working
IET India cybersecurity advisory: security practices for remote working
 
Smarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst ServicesSmarter Commerce Summit - IBM MobileFirst Services
Smarter Commerce Summit - IBM MobileFirst Services
 
White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...
White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...
White Paper: The Critical Need for Enterprise-Grade File Sync and Share Solut...
 
BASIC COMPUTERS
BASIC COMPUTERSBASIC COMPUTERS
BASIC COMPUTERS
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Employee use of mobile devices
Employee use of mobile devicesEmployee use of mobile devices
Employee use of mobile devices
 
computers
computerscomputers
computers
 
Windows phone 8 enterprise and Mobile Device Managment by Andrej Radinger (mdm)
Windows phone 8 enterprise and Mobile Device Managment by Andrej Radinger (mdm)Windows phone 8 enterprise and Mobile Device Managment by Andrej Radinger (mdm)
Windows phone 8 enterprise and Mobile Device Managment by Andrej Radinger (mdm)
 
Simple and secure mobile cloud access
Simple and secure mobile cloud accessSimple and secure mobile cloud access
Simple and secure mobile cloud access
 
Apple Device Management
Apple Device ManagementApple Device Management
Apple Device Management
 
How To Do BYOD Right
How To Do BYOD RightHow To Do BYOD Right
How To Do BYOD Right
 
German IT Pros Survey: Network Complexity
German IT Pros Survey: Network ComplexityGerman IT Pros Survey: Network Complexity
German IT Pros Survey: Network Complexity
 
Summit 2010 04 27 Which New Technologies Are Right For Your Enterprise Rev 1
Summit 2010 04 27 Which New Technologies Are Right For Your Enterprise   Rev 1Summit 2010 04 27 Which New Technologies Are Right For Your Enterprise   Rev 1
Summit 2010 04 27 Which New Technologies Are Right For Your Enterprise Rev 1
 
The Essential BYOD Handbook
The Essential BYOD HandbookThe Essential BYOD Handbook
The Essential BYOD Handbook
 
IBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile ApproachIBM Connect 2013 BP210 Using a Mobile Approach
IBM Connect 2013 BP210 Using a Mobile Approach
 
2: Technology - The driving force behind E-Commerce:
2: Technology - The driving force behind E-Commerce:2: Technology - The driving force behind E-Commerce:
2: Technology - The driving force behind E-Commerce:
 
Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...Améliorer la productivité des employés et se protéger contre les menaces ...
Améliorer la productivité des employés et se protéger contre les menaces ...
 

Andere mochten auch

Presentación1 angieeeeeeee
Presentación1 angieeeeeeeePresentación1 angieeeeeeee
Presentación1 angieeeeeeeeangie1996
 
Tendencias 2014 el_desafio_de_la_privacidad_en_internet
Tendencias 2014 el_desafio_de_la_privacidad_en_internetTendencias 2014 el_desafio_de_la_privacidad_en_internet
Tendencias 2014 el_desafio_de_la_privacidad_en_internetGener Julca Carreño
 
EXCLAMA_ED26_104 PAGS_baja CORRECCIONES
EXCLAMA_ED26_104 PAGS_baja CORRECCIONESEXCLAMA_ED26_104 PAGS_baja CORRECCIONES
EXCLAMA_ED26_104 PAGS_baja CORRECCIONESsusana cheng
 
10 Comportamientos Digitales
10 Comportamientos Digitales10 Comportamientos Digitales
10 Comportamientos DigitalesDaryo R. Cuartas
 
Tus 10 comportamientos digitales
Tus 10 comportamientos digitalesTus 10 comportamientos digitales
Tus 10 comportamientos digitalesJessicaIzora
 
Los comportamiento digitales
Los comportamiento digitalesLos comportamiento digitales
Los comportamiento digitales1barrero
 

Andere mochten auch (8)

Presentación1 angieeeeeeee
Presentación1 angieeeeeeeePresentación1 angieeeeeeee
Presentación1 angieeeeeeee
 
Tendencias 2014 el_desafio_de_la_privacidad_en_internet
Tendencias 2014 el_desafio_de_la_privacidad_en_internetTendencias 2014 el_desafio_de_la_privacidad_en_internet
Tendencias 2014 el_desafio_de_la_privacidad_en_internet
 
EXCLAMA_ED26_104 PAGS_baja CORRECCIONES
EXCLAMA_ED26_104 PAGS_baja CORRECCIONESEXCLAMA_ED26_104 PAGS_baja CORRECCIONES
EXCLAMA_ED26_104 PAGS_baja CORRECCIONES
 
Costos calidad2
Costos calidad2Costos calidad2
Costos calidad2
 
10 Comportamientos Digitales
10 Comportamientos Digitales10 Comportamientos Digitales
10 Comportamientos Digitales
 
Tecnologia raquel
Tecnologia raquelTecnologia raquel
Tecnologia raquel
 
Tus 10 comportamientos digitales
Tus 10 comportamientos digitalesTus 10 comportamientos digitales
Tus 10 comportamientos digitales
 
Los comportamiento digitales
Los comportamiento digitalesLos comportamiento digitales
Los comportamiento digitales
 

Ähnlich wie Enterprise it consumerization survey

Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterpriseinfra-si
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataOnline Business
 
Current topic in it presentation
Current topic in it presentationCurrent topic in it presentation
Current topic in it presentationMihreteab F
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityТранслируем.бел
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesIcomm Technologies
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop VirtualizationCitrix
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devicesiSSAL
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERMobiloitte
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)Pace IT at Edmonds Community College
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYODK Singh
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxMarta Kusinska
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications Array Networks
 

Ähnlich wie Enterprise it consumerization survey (20)

Consumer tech invasion
Consumer tech invasionConsumer tech invasion
Consumer tech invasion
 
Securing a mobile oriented enterprise
Securing a mobile oriented enterpriseSecuring a mobile oriented enterprise
Securing a mobile oriented enterprise
 
En msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdataEn msft-scrty-cntnt-e book-protectyourdata
En msft-scrty-cntnt-e book-protectyourdata
 
Current topic in it presentation
Current topic in it presentationCurrent topic in it presentation
Current topic in it presentation
 
Embracing BYOD
Embracing BYODEmbracing BYOD
Embracing BYOD
 
Byod
ByodByod
Byod
 
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD)
 
A Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise SecurityA Business-Driven Approach to Mobile Enterprise Security
A Business-Driven Approach to Mobile Enterprise Security
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 
10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization10 Reasons to Strengthen Security with App & Desktop Virtualization
10 Reasons to Strengthen Security with App & Desktop Virtualization
 
Backing up Android and iOs devices
Backing up Android and iOs devicesBacking up Android and iOs devices
Backing up Android and iOs devices
 
Integrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPERIntegrating Enterprise Mobility - an Assessment WHITE PAPER
Integrating Enterprise Mobility - an Assessment WHITE PAPER
 
Challenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act BringsChallenges & Opportunities the Data Privacy Act Brings
Challenges & Opportunities the Data Privacy Act Brings
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 2)
 
Ten Commandments of BYOD
Ten Commandments of BYODTen Commandments of BYOD
Ten Commandments of BYOD
 
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knoxhow_to_balance_security_and_productivity_with_famoc_and_samsung_knox
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
 
Big Data for Security
Big Data for SecurityBig Data for Security
Big Data for Security
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 
Safeguard Your Business
Safeguard Your BusinessSafeguard Your Business
Safeguard Your Business
 

Mehr von Andrew Wong

2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing ReportAndrew Wong
 
Red Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongRed Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongAndrew Wong
 
Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Andrew Wong
 
Big Data in Retail Industry
Big Data in Retail IndustryBig Data in Retail Industry
Big Data in Retail IndustryAndrew Wong
 
Cloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBCloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBAndrew Wong
 
Oracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapOracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapAndrew Wong
 
Introduction Google Script in Marketing
Introduction Google Script in MarketingIntroduction Google Script in Marketing
Introduction Google Script in MarketingAndrew Wong
 
B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13Andrew Wong
 
Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Andrew Wong
 
SolarWinds Network Solution Guide
SolarWinds Network Solution GuideSolarWinds Network Solution Guide
SolarWinds Network Solution GuideAndrew Wong
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentationAndrew Wong
 
Trend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyTrend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyAndrew Wong
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protectionAndrew Wong
 
2010 corporate end user study
2010 corporate end user study2010 corporate end user study
2010 corporate end user studyAndrew Wong
 
Trend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportTrend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportAndrew Wong
 
Android Security Essentials Presentation
Android Security Essentials PresentationAndroid Security Essentials Presentation
Android Security Essentials PresentationAndrew Wong
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssAndrew Wong
 
Amazon Web Services
Amazon Web ServicesAmazon Web Services
Amazon Web ServicesAndrew Wong
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection NetworkAndrew Wong
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious emailAndrew Wong
 

Mehr von Andrew Wong (20)

2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
 
Red Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong KongRed Hat Training Briefing Hong Kong
Red Hat Training Briefing Hong Kong
 
Red Hat Training Catalog 2012
Red Hat Training Catalog 2012Red Hat Training Catalog 2012
Red Hat Training Catalog 2012
 
Big Data in Retail Industry
Big Data in Retail IndustryBig Data in Retail Industry
Big Data in Retail Industry
 
Cloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMBCloud Solution Handbook for HKSMB
Cloud Solution Handbook for HKSMB
 
Oracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And RoadmapOracle Social CRM Applications Strategy Overview And Roadmap
Oracle Social CRM Applications Strategy Overview And Roadmap
 
Introduction Google Script in Marketing
Introduction Google Script in MarketingIntroduction Google Script in Marketing
Introduction Google Script in Marketing
 
B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13B2B Content Marketing Trend 2012-13
B2B Content Marketing Trend 2012-13
 
Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8Introduction to Trend Micro Mobility Security 8
Introduction to Trend Micro Mobility Security 8
 
SolarWinds Network Solution Guide
SolarWinds Network Solution GuideSolarWinds Network Solution Guide
SolarWinds Network Solution Guide
 
Trend micro real time threat management press presentation
Trend micro real time threat management press presentationTrend micro real time threat management press presentation
Trend micro real time threat management press presentation
 
Trend micro global consumer technology use & security study
Trend micro global consumer technology use & security studyTrend micro global consumer technology use & security study
Trend micro global consumer technology use & security study
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
2010 corporate end user study
2010 corporate end user study2010 corporate end user study
2010 corporate end user study
 
Trend micro smartphone consumer market research report
Trend micro smartphone consumer market research reportTrend micro smartphone consumer market research report
Trend micro smartphone consumer market research report
 
Android Security Essentials Presentation
Android Security Essentials PresentationAndroid Security Essentials Presentation
Android Security Essentials Presentation
 
Introduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for BusinesssIntroduction to Kaspersky Endpoint Security for Businesss
Introduction to Kaspersky Endpoint Security for Businesss
 
Amazon Web Services
Amazon Web ServicesAmazon Web Services
Amazon Web Services
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
Introduction trend micro malicious email
Introduction    trend micro malicious emailIntroduction    trend micro malicious email
Introduction trend micro malicious email
 

Kürzlich hochgeladen

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Kürzlich hochgeladen (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

Enterprise it consumerization survey

  • 1. Enterprise IT Consumerization Survey June 2011 Classification 03/28/13 Classification Copyright 2009 Trend Micro Inc. 1
  • 2. Objectives and Methodology Objectives: • To obtain a better/deeper understanding of IT Consumerization collaboration/social media in the workplace. Methodology: • An online survey was conducted in the US, Germany, and Japan among IT personnel responsible for endpoint operational management (desktop, laptop, smartphone, tablet, etc.) and/or messaging and collaboration operations (email, IM, sharepoint, etc.). • Respondents needed to be part of an organization with at least 500 employees worldwide . • A total of 600 surveys were collected. Country breakdown as follows: o United States: 200 o Germany: 200 o Japan: 200 Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 2
  • 3. Employee Use of Personal Devices • A majority of companies in the US and Germany allowed their employees to use personal devices for work-related activities. • Significantly more companies in the US allowed their employees to use their personal devices for work-related activities than companies in both Germany and Japan. Question: Does your company allow employees to use their personal device(s) such as laptops, netbooks, smartphones, and tablets for work-related activities? Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 3
  • 4. Corporate Applications/Databases Accessible from Personal Devices • The most common corporate applications/databases employees are allowed to access with their personal devices are email, calendars, contacts and intranet web. • US employees were given access to more applications or databases than employees in Japan. Question: What corporate applications or databases can employees access from their personal devices? Please select all that apply. Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 4
  • 5. Reasons Companies Allow Employees to Use Personal Devices for Work-Related Activities • Of companies that allow their employees to use their personal device(s) for work-related activities, most indicated they do so for productivity enablement. • Another top reason is business IT capital cost savings, particularly in the US. Question: Why does your company allow employees to use their personal devices(s) for work-related activities? Please select all that apply. Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 5
  • 6. Mobile Devices Connected to Corporate Network—Median Distribution • In the US and Germany, the distribution of devices connected to the corporate network was similar, with a majority of the devices being laptops/netbooks, followed by smartphones and tablet computers. • In Japan, laptops/netbooks composed 100% of the mobile devices connected to the corporate network. Question: About how many mobile devices (whether company-owned or employee-owned, whether they are used in the office or remotely) are connected to your corporate network? Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 6
  • 7. Concerns with Employee Personal Devices in the Workplace • Most companies in the US, Germany, and Japan indicated concern with security issues and data loss/theft regarding allowing employees to bring their personal devices in the workplace. • Compliance and legal implications was a greater concern in the US and Japan than in Germany. Question: What are your company's concerns, if any, regarding allowing employees to bring their personal devices in the workplace? Please select all that apply. Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 7
  • 8. Corporate Network/Data Protection from Mobile Devices—US • Nearly all companies in the US indicated they currently have measures in place to protect corporate networks and data from company-owned mobile devices as well as personal devices; most often through installed security software. Question: How do you protect corporate networks and data from the personal devices employees bring to the workplace? Question: How do you protect corporate networks and data from the company-owned mobile devices? Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 8
  • 9. Corporate Network/Data Protection from Mobile Devices—Germany • Nearly all companies in Germany indicated they currently have measures in place to protect corporate networks and data from company-owned mobile devices as well as personal devices; most often through security software and ability to lock down mobile devices. Question: How do you protect corporate networks and data from the personal devices employees bring to the workplace? Question: How do you protect corporate networks and data from the company-owned mobile devices? Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 9
  • 10. Corporate Network/Data Protection from Mobile Devices—Japan • Similar to the US and Germany, most companies in Japan indicated they currently have measures in place to protect corporate networks and data from company-owned mobile devices as well as personal devices; most often through installed security software. Question: How do you protect corporate networks and data from the personal devices employees bring to the workplace? Question: How do you protect corporate networks and data from the company-owned mobile devices? Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 10
  • 11. Viewpoints on Use of Mobile Devices—US • US respondents agreed that they trust company-owned mobile devices more than personal devices employees bring to the workplace and that devices are vulnerable as long as any corporate data is stored on the mobile device. We trust company-owned devices more than personal devices employees bring to the workplace. Devices are vulnerable as long as any corporate data is stored on the mobile device. Employees should be required to install and use security software as a condition to accessing corporate applications and data. We will manage company-owned devices and personal devices employees bring to the workplace the same way. The use of mobile security AND mobile device management is most effective means of managing and securing devices brought to work by employees. The use of VDI for computers/smartphones/tablets and other mobile devices brought to work by employees is the most effective security measure. With allowing employees to bring their own computers to work, company will realize ROI by not having to invest in laptops & other mobile devices. Employees are bringing their own computers/smartphones/tablets, etc. to work and IT needs to enable/empower employees using their devices. If we had to choose one of the two following solutions, we'd prefer mobile device management over anti-virus/anti-malware. There are lost smartphones and an ever growing amount of our company's intellectual property on these smartphones. The growth of employees using their personal devices for work related activities was rapid and unplanned. We see the shift of IT role from a commander/controller to an advisor in support of employees bringing their own devices to work. Question: Please tell us how much you agree or disagree with the following statements. Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 11
  • 12. Viewpoints on Use of Mobile Devices—Germany • Similar to the US, most respondents in Germany agreed that they trust company-owned mobile devices more than personal devices employees bring to the workplace. We trust company-owned devices more than personal devices employees bring to the workplace. Employees should be required to install and use security software as a condition to accessing corporate applications and data. Devices are vulnerable as long as any corporate data is stored on the mobile device. The use of mobile security AND mobile device management is most effective means of managing and securing devices brought to work by employees. We see the shift of IT role from a commander/controller to an advisor in support of employees bringing their own devices to work. There are lost smartphones and an ever growing amount of our company's intellectual property on these smartphones. Employees are bringing their own computers/smartphones/tablets, etc. to work and IT needs to enable/empower employees using their devices. If we had to choose one of the two following solutions, we'd prefer mobile device management over anti-virus/anti-malware. The use of VDI for computers/smartphones/tablets and other mobile devices brought to work by employees is the most effective security measure. We will manage company-owned devices and personal devices employees bring to the workplace the same way. With allowing employees to bring their own computers to work, company will realize ROI by not having to invest in laptops & other mobile devices. The growth of employees using their personal devices for work related activities was rapid and unplanned. Question: Please tell us how much you agree or disagree with the following statements. Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 12
  • 13. Viewpoints on Use of Mobile Devices—Japan • In Japan, most respondents trusted company-owned mobile devices more than personal devices employees bring to the workplace and felt that devices are vulnerable as long as any corporate data is stored on the mobile device. We trust company-owned devices more than personal devices employees bring to the workplace. Devices are vulnerable as long as any corporate data is stored on the mobile device. There are lost smartphones and an ever growing amount of our company's intellectual property on these smartphones. Employees should be required to install and use security software as a condition to accessing corporate applications and data. The use of mobile security AND mobile device management is most effective means of managing and securing devices brought to work by employees. If we had to choose one of the two following solutions, we'd prefer mobile device management over anti-virus/anti-malware. We will manage company-owned devices and personal devices employees bring to the workplace the same way. The use of VDI for computers/smartphones/tablets and other mobile devices brought to work by employees is the most effective security measure. With allowing employees to bring their own computers to work, company will realize ROI by not having to invest in laptops & other mobile devices. Employees are bringing their own computers/smartphones/tablets, etc. to work and IT needs to enable/empower employees using their devices. The growth of employees using their personal devices for work related activities was rapid and unplanned. We see the shift of IT role from a commander/controller to an advisor in support of employees bringing their own devices to work. Question: Please tell us how much you agree or disagree with the following statements. Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 13
  • 14. Currently Supported Internal Collaboration/ Social Networking Initiatives • The majority of respondents in the US and Germany, and two thirds in Japan reported their company currently supported certain internal collaboration or social networking initiatives. • Overall, the US supported more initiatives than Japan with instant messaging being the most frequent US-supported initiative. Question: What internal collaboration or social networking initiatives within your organization are you currently supporting? Please select all that apply. Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 14
  • 15. Policies Regarding Usage of Collaboration and Social Networking Tools • For each country surveyed, companies were more likely to have policies regarding internal collaboration or social networking tools than external tools. • Companies in the US were significantly more likely to have policies in place (for either internal or external tools) than in Germany or Japan. Question: Does your company currently have policies regarding usage of collaboration and social networking tools? Classification 03/28/13 Classification Copyright 2011 Trend Micro Inc. 15