SlideShare a Scribd company logo
Free IT reports on today’s hottest tech topics and trends. 
Weathering the Mobile Storm 
How IT pros navigate a whirlwind of devices, 
security and monitoring. 
Making the Tech Grade: IT pros sound off on tYhoeu v Balaucek ,o Uf nITio tnra Jinacinkg? . 1 
October 2014 | #MobileStorm 
Sponsored by:
2 Weathering the Mobile Storm: How IT pros navigate a whirlwind of devices, security and monitoring. | #MobileStorm
October 2014 3 
TABLE OF CONTENTS 
01 BYOD Winds: 
Picking Up 
02 Waiting for Lighting 
to Strike... 
03 Are Users on the 
MDM Radar? 
04 Alert: Seek Adequate 
Shelter 
PAGE 08 
PAGE 12 
PAGE 16 
PAGE 18 
05 Details on 
the Data 
PAGE 20
We’ve studied the radar for an in-depth look at 
what IT pros are up against (hint: there’s a dense 
fog advisory as they attempt to manage an 
ever-mobile workforce). 
4 Weathering the Mobile Storm: How IT pros navigate a whirlwind of devices, security and monitoring. | #MobileStorm
October 2014 5 
Is a Mobile Storm Brewing? 
An ominous cloud of devices continues 
to descend upon Tech City. As mobile 
devices rain down on organizations, 
how is IT weathering the deluge? And 
what, exactly, are they dealing with? Are 
we talking a run-of-the-mill afternoon 
shower… or a Category 5 beast? We’ve 
studied the radar for an in-depth look at 
what IT pros are up against (hint: there’s 
a dense fog advisory as they attempt to 
manage an ever-mobile workforce). 
How do IT pros think about – and prepare 
for – mobile security? And what gaps exist 
in their current policies? 
 
Should they be monitoring employee 
usage more… or less? And how are users 
reacting to the possibility of being under 
a mobile storm watch? So many questions, 
so many forecasts coming your way. 
“The security risks associated 
with smartphones and tablets 
are nothing short of scary.” 
- Don Reisinger, eWeek1
6 Weathering the Mobile Storm: How IT pros navigate a whirlwind of devices, security and monitoring. | #MobileStorm
October 2014 7 
Survey Information 
To get to the eye of the mobile maelstrom, 
Spiceworks asked 300 IT pros in the US to share 
how their organizations are currently managing 
mobile devices and what they’re doing – or not 
doing – to keep corporate data safe and dry. 
 
We’re seeing mobile devices, including those 
brought in by employees (BYOD, baby), continue 
to pour into the workplace. But Bring Your Own 
Everything (BYOx)… is still a blip on the radar. 
IT pros forecast continued mobile device 
growth, but their security measures aren’t quite 
in line. While mobile device management (MDM) 
is the top mobile device security software used 
by IT pros (followed by malware/antivirus soft-ware) 
– fewer than half are using or plan to use 
either type of security software. 
User privacy is still mostly intact. Very few IT 
pros tell us they’re monitoring “every move” users 
make on their mobile devices. But should they be 
more… watchful? And what do users have to say 
about this privacy invasion? 
Mobile threats are real, they’re intensifying… 
and they’re not going away. So what’s the 
holdup in widespread MDM adoption? Why 
aren’t we seeing more mobile device security 
software? Why aren’t more IT pros taking 
measures to protect mobile devices in the 
workplace from insidious threats just over 
the horizon? 
Key Findings 
1 
2 
3 
“As malicious code for mobile 
devices begins to generate 
revenue for malware authors, 
we can expect the number of 
threats to grow.” 
- BizCommunity.com2 
Snap open your umbrella and prepare 
to find out how your organization measures 
up against the approaching downpour. 
Oh, you’d better bring your rain boots 
too, just in case. It’s a mess out there.
01 
BYOD Winds: Picking 
Up. BYOD-Everything? 
Not So Much. 
 BYOD continues to spill into the work-place, 
as almost 90% of respondents 
indicate employees are bringing at least 
one device to work… and smartphones 
and tablets still lead the pack. 
Hey, nice Google Glass Eye… or whatever 
you call that thing. The future has arrived, 
and it’s sporting tech specs, wireless cuff-links, 
digital underwear, and who knows 
what else! A tornado of wearable technol-ogy 
– smart watches, smart glasses, fitness/ 
health monitors and more – is gathering 
strength as it swirls toward 
your network. 
At more than 20%, that’s almost eight 
percentage points higher than Spiceworks 
wearable tech data from May 2014.3 
8 Weathering the Mobile Storm: How IT pros navigate a whirlwind of devices, security and monitoring. | #MobileStorm
October 2014 9 
Types of Mobile Devices Supported 
90% 
77% 
21% 
Smartphones 
Tablets 
Wearables 
0 20 40 60 80 100 
As far as mobile device numbers, almost 80% of surveyed IT pros support one to two per 
employee. And that’s more than enough vulnerable data to reshape how IT departments 
handle the mobile monsoon (unfortunately, this one ain’t seasonal!). 
Number of Mobile Devices Supported 
50 
40 
30 
20 
10 
0 
34% 
6% 5% 3% 
The survey says iOS (46%) leads Android (35%) as the most common 
mobile operating system supported in the workplace. However, 
Windows (54%) and Android (47%) are perceived as being easier 
to monitor than iOS (42%). 
7% 
1 per 
employee 
2 per 
employee 
3 per 
employee 
More than 3 
per employee 
None Don’t know 
45%
Despite a shifting climate (and a growing number) of employee-owned devices, on 
average more than half of organizations’ supported devices are company-owned. 
Average Percent of Devices in the Workplace 
35% 
Employee-owned, company subsidized 
Company-owned 
Employee-owned 
55% 
10% 
0 10 20 30 40 50 60 
10 Weathering the Mobile Storm: How IT pros navigate a whirlwind of devices, security and monitoring. | #MobileStorm
October 2014 11 
Roughly half of respondents forecast 
that employee- and/or company-owned 
mobile devices will continue to swirl up 
in numbers over the next three years. 
BYOD is still raining cats and dogs in 
the workplace, but what about BYOx? 
Despite lots of media buzz (and a super 
cool acronym), only a third of IT pros 
report employees bringing in their own 
applications, encryption, networks, etc. 
54% 
Percent of IT Pros Anticipating an Increase in Mobile Devices 
27% 
47% 
Employee-owned 
Company-owned 
Employee-owned, 
company subsidized
02 
Waiting for the 
Lightning to Strike... 
 Naturally, more mobile devices mean 
more mobile threats. And while consumer 
devices may not be as at risk, industry 
experts believe that mobile malware is 
on the rise, especially for mobile devices 
in the workplace.4 After all, the lightning 
bolts of data theft are pretty much aimed 
at sensitive company data on unsecured 
mobile devices. So you’d think IT pros 
would be keeping up in terms of mobile 
security, right? Think again… 
Varying degrees of mobile policy 
Sure, most IT pros surveyed have rules 
about what types of devices can connect 
to which networks. But almost a quarter 
say they have no formal mobile device 
policy in place. 
And to extend the mobile weather meta-phor 
even more: That’s sort of like having 
no evacuation route in place when real 
disaster strikes. 
“Malware concerns are more 
acute in the workplace, where 
people increasingly bring their 
own devices and use them for 
conducting business.” 
- Molly Wood, The New York Times3 
12 Weathering the Mobile Storm: How IT pros navigate a whirlwind of devices, security and monitoring. | #MobileStorm
October 2014 13 
Corporate Network Access Policies 
We allow employee-owned BYOD devices to connect on a separate guest network 
We allow employee and company-owned/subsidized devices on the corporate network 
We allow company-owned devices only on the corporate network 
We don't have a formal policy 
Don’t know 
1% 
What corporate data do IT pros allow 
users to access on their mobile devices? 
Almost all allow access to email/calen-dar/ 
contacts, but many board up the 
windows from there. 
The numbers drop below half for other 
types of corporate data such as company 
file-sharing accounts (e.g. Dropbox, Box, 
etc.), company mobile apps/software, and 
secure network resources. 
28% 
25% 
24% 
22% 
Access To Corporate Assets 
100 
80 
60 
40 
20 
0 
Email/Calendar/ 
Contacts 
Company 
le-sharing 
accounts 
(e.g., Dropbox) 
Company 
mobile 
apps/software 
Secure 
network 
resources 
96% 
44% 42% 
33% 
0 5 10 15 20 25 30
Mobile security measures? I’ve heard of those… 
If there’s nothing to see (or hear), there’s 
nothing to fear. Consider it the “duck-un-der- 
the-covers-and-hope-the-thunder-goes- 
away” approach. It looks like IT pros 
might be limiting access to corporate data 
in lieu of relying on mobile device security 
software or formal MDM policies. 
That may be why less than half of 
respondents use or even plan to 
use MDM software within the next 
12 months. Unfortunately, where 
there’s thunder… there’s lightning. 
Types of Mobile Device Security Software Used or Planned to Use 
MDM 
Antivirus/malware software 
16% 
15% 
22% 
49% 
41% 
Central management 
Data protection 
Data loss prevention 
14% 
8% 
6% 
EMM 
2% 
Secure container 
Other 
9% 
Application control 
19% 
None 
Don’t know 
0 10 20 30 40 50 
14 Weathering the Mobile Storm: How IT pros navigate a whirlwind of devices, security and monitoring. | #MobileStorm
In all fairness, it’s not like IT pros are unaware of the risks. Almost all respondents (98%) report 
some level of concern with mobile security. In fact, security (including compliance and threats) 
is reported as the top challenge when managing mobile devices for most IT pros surveyed: 
October 2014 15 
Why, then, do a number of IT pros appear to 
be standing in the middle of an open field… 
waiting for the lightning to strike? Many say 
the cost of mobile device security is prohibitive 
given the size of their organization. Others say 
management is not yet onboard. And still others 
just don’t view mobile security as necessary. Let’s 
hear it straight from real IT pros: 
• “There just aren’t enough threats to mobile 
devices out there that warrant the time 
and headache of managing mobile 
security software.” 
• “The cost is substantial and finding the 
budgets for these solutions is difficult. We’ll 
have to work with what we’ve got, for now. ” 
• “We don’t use mobile device security because 
too many other things are bigger issues; we 
haven’t yet experienced a problem with mobile 
security to cause it to be a higher priority.” 
Top Mobile Device Management Challenges 
Category 
1 2 3 4 5 
Category 
Category 
Category 
Category 
MPH: 74-95 96-110 110-130 131-155 156+ 
SURGE: 4-5 FT. 6-8 FT. 9-12 FT. 13-18 FT. 18+ FT. 
Security compliance/ 
requirements 
Security breaches/ 
threats 
Increased help desk 
calls/support time 
Enforcement of 
end-user policies 
Security compliance/ 
requirements
03 
Are Users On the 
MDM Radar? 
The issue of user privacy seems 
to be enjoying the calm before the 
storm. It turns out that very few IT 
pros (4%) monitor all their users’ 
mobile activity. 
In fact, more than two-thirds report 
monitoring “very little” to no mobile 
device usage. 
 
Approach To Mobile Device Monitoring 
50 
40 
30 
20 
10 
0 
45% 
23% 
4% 
23% 
5% 
We monitor 
every move 
We monitor 
major stu like 
installing apps 
and connecting to 
cloud services 
We monitor 
very little 
We don’t monitor 
employee mobile 
device usage 
Don’t know/ 
No comment 
16 Weathering the Mobile Storm: How IT pros navigate a whirlwind of devices, security and monitoring. | #MobileStorm
“Obviously, users want to make 
sure that their private infor-mation 
stays that way, private! 
However, after explaining the 
need for certain security mea-sures, 
most understand – and I 
always give the option to use a 
company-owned device if they 
are reluctant.” 
- Spiceworks IT pro and survey respondent3 
October 2014 17 
Why not? As one IT pro explains, “We con-tainerize 
the company usage – and have the 
ability to wipe the mobile device in case of 
theft or loss – but we do not monitor usage 
as these devices may be for personal use 
as well.” 
While others echo the sentiment that it 
seems too intrusive to monitor employee-owned 
devices, less than half (46%) of IT 
pros surveyed report reluctance from their 
users toward allowing MDM software on 
their devices. But it’s likely only a matter of 
time before the sprinkling of mobile privacy 
issues… escalates into a torrent. 
We asked survey respondents to share com-mon 
concerns regarding MDM. Fears range 
from “big brother” to draining batteries: 
• “Mainly a feeling of lost privacy on their 
own devices.” 
• “It’s their device, they want to be in con-trol.” 
• “They fear ‘big brother’ in our overworked 
and undermanned IT team.” 
• “Where do you draw the line between per-sonal 
ownership and company intrusion?” 
• “They are afraid we can see everything 
they do. They also are afraid of us being 
able to wipe their phones, and have heard 
horror stories about it!” 
Maybe the real question is: Should IT pros 
keep user devices within their scope?
04 
Alert: Seek Adequate 
Shelter 
While the tidal wave of BYOD in the work-place 
continues to surge – a directional trend 
 
that shows no signs of weakening – mobile 
security measures are not quite ready to surf 
the swell. 
In the words of a surveyed respondent, “We 
haven’t gotten around to implementing 
mobile security yet… many projects have 
been shuffled back by the powers that be. 
Until, of course, something happens to move 
it back to the front burner – then it will be an 
emergency.” 
There are many factors leading to the lack 
of prep, but it won’t be long before IT pros 
will need to brace themselves and confront 
the storm - head-on. Integrating MDM and 
mobile security solutions into the workplace 
will likely become unavoidable at some point. 
As more and more organizations embrace a 
mobile workforce (increased flexibility and 
higher productivity, anyone?), the next step 
is clear: Protect against a developing storm of 
mobile threats, the kind that tend to follow in 
the wake of emerging technology. 
18 Weathering the Mobile Storm: How IT pros navigate a whirlwind of devices, security and monitoring. | #MobileStorm
October 2014 19 
MOBILE SECURITY 
PRESS HERE 
BREAK GLASS
05 
Details on the Data 
You’ve just read Spiceworks’ version of 
 
data gone spicy: Our answer to humdrum 
data. We tackle the tech issues of today... 
and what’s coming soon to a server room 
near you. 
And we deliver it all with more originality 
and spice than your typical run-of-the-mill 
reports. Drawing from a user base of more 
than 6 million IT pros, it’s a glimpse into tech 
you can’t get anywhere else! 
Industry (Top 12 industries shown) 
10% 
Healthcare 
7% 7% 
7% 
Education Non-Prot Finance 
13% 
11% 
IT Service 
Provider 
Manufacturing 
6% 4% 4% 4% 3% 3% 
Construction Software Engineering 
Consulting 
Government 
Transportation 
20 Weathering the Mobile Storm: How IT pros navigate a whirlwind of devices, security and monitoring. | #MobileStorm
October 2014 21 
Company Size 
Region 
1-19 
17% 
20-99 
32% 
500-999 
5% 
250-499 
13% 
100-249 
22% 
1,000 or more 
11%
This report was sponsored by Samsung. 
About Samsung Telecommunications America 
Samsung Telecommunications America, LLC, (Samsung Mobile) a Dallas-based 
subsidiary of Samsung Electronics Co., Ltd., researches, develops and markets wireless 
handsets, wireless infrastructure and other telecommunications products throughout 
North America. For more information, please visit www.samsung.com. 
About Samsung Electronics Co., Ltd. 
Samsung Electronics Co., Ltd. is a global leader in technology, opening new possibilities 
for people everywhere. Through relentless innovation and discovery, we are 
transforming the worlds of TVs, smartphones, tablets, PCs, cameras, home appliances, 
printers, LTE systems, medical devices, semiconductors and LED solutions. 
22 Weathering the Mobile Storm: How IT pros navigate a whirlwind of devices, security and monitoring. | #MobileStorm
1 Don Reisinger, “10 Mobile Security Issues That Should Worry You,” eWeek, February 11, 2014. http://www.eweek. 
com/mobile/slideshows/10-mobile-security-issues-that-should-worry-you.html/ 
2 “Mobile device malware a growing threat to smartphone users,” BizCommunity.com, July 17, 2013. http://www. 
bizcommunity.com/Article/196/542/96787.html 
3 Compared to US-only data. Spiceworks Voice of IT Report, “The Devices are Coming! How the ‘Internet of Things’ 
will affect IT… and why resistance is futile,” Spiceworks, May 2014. http://www.spiceworks.com/voit/reports/the-de-vices- 
are-coming/ 
4 Molly Wood, “Mobile Malware: Small Numbers, but Growing,” The New York Times, October 1, 2014. http://www. 
nytimes.com/2014/10/02/technology/personaltech/mobile-malware-small-numbers-but-growing.html?_r=0 
Illustrations: 
Clarice Jenkins, Designer, Spiceworks 
Voice of IT ® 
Sources: 
About Spiceworks Voice of IT® 
The Spiceworks Voice of IT market insights program publishes stats, trends and opinions collected from technology 
professionals that are among the more than 5 million users of Spiceworks. Survey panelists opt-in to answer questions on 
technology trends important to them. To find out more about our research capabilities, email insights@spiceworks.com. 
About Spiceworks 
Spiceworks is the professional network more than 5 million IT professionals use to connect with one another and over 
3,000 technology brands. The company simplifies how IT professionals discover, buy and manage more than $525 billion 
in technology products and services each year. Headquartered in Austin, Texas, Spiceworks is backed by Adams Street 
Partners, Austin Ventures, Institutional Venture Partners (IVP), Goldman Sachs, Shasta Ventures and Tenaya Capital. For 
more information visit www.spiceworks.com 
The contents in this report are a result of primary research performed by Spiceworks. Unless otherwise noted, the entire contents distributed 
as part of this report are copyrighted by Spiceworks. As such any information made available by any means in this report may not be copied, 
reproduced, duplicated, published, displayed, transmitted, distributed, given, sold, traded, resold, marketed, offered for sale, modified to 
create derivative works or otherwise exploited for valuable consideration without prior written consent by Spiceworks. For more information 
visit www.spiceworks.com/voice-of-it/terms. 
This report contains information of fact relating to parties other than Spiceworks. Although the information has been obtained from, and 
is based on sources that Spiceworks believes to be reliable, Spiceworks does not guarantee the accuracy, and any such information might be 
incomplete or condensed. Any estimates included in this report constitute Spiceworks’ judgment as of the date of compilation, and are subject 
to change without notice. This report is for information purposes only. All responsibility for any interpretations or actions based on 
the information or commentary contained within this report lie solely with the recipient. All rights reserved. 2014. 
October 2014 23 
For more information visit: For other Spiceworks Voice of IT reports visit: 
www.spiceworks.com www.spiceworks.com/marketing/resources/
24 Spiceworks VoIT Report: March 2014 | #ITTraining

More Related Content

PDF
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
PDF
Mobile malware and enterprise security v 1.2_0
PDF
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
PDF
Developing surveillance challenges in theinternet of things
PDF
Cybersecurity in the Age of Mobility
PDF
Article on Mobile Security
PDF
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
PDF
Mobility, Security and the Enterprise: The Equation to Solve
Mbs t17 o'neil-mbs-t17 rsa-realizing-mobile-enterprise
Mobile malware and enterprise security v 1.2_0
IBM MobileFrist Protect - Guerir la Mobilephobie des RSSI
Developing surveillance challenges in theinternet of things
Cybersecurity in the Age of Mobility
Article on Mobile Security
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
Mobility, Security and the Enterprise: The Equation to Solve

What's hot (20)

PDF
Mobile Vision 2020
PDF
Sholove cyren web security - technical datasheet2
PDF
Secure your Future with IoT Security Testing | Application Security
PDF
Mobile Application Security
PDF
IT Security Trends in 2012
PDF
Kaspersky: Global IT Security Risks
PDF
The Devices are Coming! How the “Internet of Things” will affect IT.
PDF
Security annual report_mid2010
PDF
Volume2 chapter1 security
PPTX
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
PDF
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
PDF
The impact of mobile devices on information security
PDF
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
PDF
Report on Mobile security
PDF
Cyber Training: Developing the Next Generation of Cyber Analysts
PDF
Actionable insights
PDF
InformationSecurity_11141
PDF
IBM 2015 Cyber Security Intelligence Index
PDF
New trends in Payments Security: NFC & Mobile
PDF
Omlis Data Breaches Report - An Inside Perspective
Mobile Vision 2020
Sholove cyren web security - technical datasheet2
Secure your Future with IoT Security Testing | Application Security
Mobile Application Security
IT Security Trends in 2012
Kaspersky: Global IT Security Risks
The Devices are Coming! How the “Internet of Things” will affect IT.
Security annual report_mid2010
Volume2 chapter1 security
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
The impact of mobile devices on information security
how_to_balance_security_and_productivity_with_famoc_and_samsung_knox
Report on Mobile security
Cyber Training: Developing the Next Generation of Cyber Analysts
Actionable insights
InformationSecurity_11141
IBM 2015 Cyber Security Intelligence Index
New trends in Payments Security: NFC & Mobile
Omlis Data Breaches Report - An Inside Perspective
Ad

Viewers also liked (11)

PDF
Social it-purchasing-spiceworks-webinar-slides
PDF
Spice U Online Courses
PDF
How it pros buy cloud servers
PDF
On Your Mark! Getting ready and set to spice IT up in Spiceworks.
PPTX
Quick Tips from the IT Trenches
PDF
Voice of IT Cloud Barometer Report
PDF
Spiceworks Unplugged - Seattle!
PDF
US Presidents and the Evolution of Technology
PPTX
Group Policy Management Makes Your Life Easier
PDF
Avoiding a BYOD Blowup!
PDF
5 Keys to Connecting with IT Pros in Social Communities
Social it-purchasing-spiceworks-webinar-slides
Spice U Online Courses
How it pros buy cloud servers
On Your Mark! Getting ready and set to spice IT up in Spiceworks.
Quick Tips from the IT Trenches
Voice of IT Cloud Barometer Report
Spiceworks Unplugged - Seattle!
US Presidents and the Evolution of Technology
Group Policy Management Makes Your Life Easier
Avoiding a BYOD Blowup!
5 Keys to Connecting with IT Pros in Social Communities
Ad

Similar to Weathering mobile-storm-report-october-2014 (20)

PDF
IRJET- Android Device Attacks and Threats
PDF
Mobile security article
PPTX
Tips and Tricks on Securing your Android Devices
PPTX
T.A.S.C - mobile device secuirty
PDF
Survey On Mobile User’s Data Privacy Threats And Defence Mechanism
PDF
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
PDF
Securing mobile devices in the business environment
DOCX
Team 3_Final Project.docx
PDF
4514ijmnct01
PDF
Security attacks taxonomy on
DOCX
271 Information Governance for Mobile Devices .docx
PDF
Mobile Security: Preparing for the 2017 Threat Landscape
PPTX
Why Cybersecurity is a Data Problem
PDF
1402.1842.pdf
PDF
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
PDF
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
PDF
Understanding and Solving Common IoT Security Problems.pdf
PPTX
Mobile Security Trends in the Workplace
PDF
Security Threats Predictions in 2015 – Netmagic
DOCX
Mobile SecurityKalyan BereKodapeComputer Security .docx
IRJET- Android Device Attacks and Threats
Mobile security article
Tips and Tricks on Securing your Android Devices
T.A.S.C - mobile device secuirty
Survey On Mobile User’s Data Privacy Threats And Defence Mechanism
CASE STUDY There is a new phenomenon in the cybersecurity domain ca.pdf
Securing mobile devices in the business environment
Team 3_Final Project.docx
4514ijmnct01
Security attacks taxonomy on
271 Information Governance for Mobile Devices .docx
Mobile Security: Preparing for the 2017 Threat Landscape
Why Cybersecurity is a Data Problem
1402.1842.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Understanding and Solving Common IoT Security Problems.pdf
Mobile Security Trends in the Workplace
Security Threats Predictions in 2015 – Netmagic
Mobile SecurityKalyan BereKodapeComputer Security .docx

More from Spiceworks Ziff Davis (20)

PDF
Are You an IT Geek?
PDF
Windows Server 2003 Lifecycle
PDF
5 Signs You're Up to Spice!
PDF
Hiring Managers Tell All
PPTX
Milking Spiceworks for all IT's worth
PDF
Managing the mobile takeover
PDF
Intro to the Spiceworks Help Desk
PDF
Beancounters: Friend or Foe?
PDF
Bang on tips for running a successful IT service business
PDF
Big data security in the cloud: Buzzword Bingo!
PDF
Top 3 demand gen challenges
PDF
The IT Buyer's Path to Purchase
PDF
You've got email!
PDF
All about virtualization spiceworks - slideshare
PDF
The Balance of art & Science: Tech Marketing To-Dos in Spiceworks
PPTX
Witnessing Spiceworks in the Wild: Partner Case Study
PPTX
State of Social IT (and Why you Should Care...)
PPTX
Accelerate Innovation in Your Business with HP
PPTX
Making Mobile Manageable
PDF
10 Spiceworks share simple ways to spice up your IT promos!
Are You an IT Geek?
Windows Server 2003 Lifecycle
5 Signs You're Up to Spice!
Hiring Managers Tell All
Milking Spiceworks for all IT's worth
Managing the mobile takeover
Intro to the Spiceworks Help Desk
Beancounters: Friend or Foe?
Bang on tips for running a successful IT service business
Big data security in the cloud: Buzzword Bingo!
Top 3 demand gen challenges
The IT Buyer's Path to Purchase
You've got email!
All about virtualization spiceworks - slideshare
The Balance of art & Science: Tech Marketing To-Dos in Spiceworks
Witnessing Spiceworks in the Wild: Partner Case Study
State of Social IT (and Why you Should Care...)
Accelerate Innovation in Your Business with HP
Making Mobile Manageable
10 Spiceworks share simple ways to spice up your IT promos!

Recently uploaded (20)

PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
cuic standard and advanced reporting.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Cloud computing and distributed systems.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Machine learning based COVID-19 study performance prediction
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPT
Teaching material agriculture food technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
MYSQL Presentation for SQL database connectivity
Per capita expenditure prediction using model stacking based on satellite ima...
cuic standard and advanced reporting.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Digital-Transformation-Roadmap-for-Companies.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
“AI and Expert System Decision Support & Business Intelligence Systems”
Review of recent advances in non-invasive hemoglobin estimation
Cloud computing and distributed systems.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Machine learning based COVID-19 study performance prediction
20250228 LYD VKU AI Blended-Learning.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Encapsulation theory and applications.pdf
Electronic commerce courselecture one. Pdf
Chapter 3 Spatial Domain Image Processing.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Teaching material agriculture food technology
Understanding_Digital_Forensics_Presentation.pptx
MYSQL Presentation for SQL database connectivity

Weathering mobile-storm-report-october-2014

  • 1. Free IT reports on today’s hottest tech topics and trends. Weathering the Mobile Storm How IT pros navigate a whirlwind of devices, security and monitoring. Making the Tech Grade: IT pros sound off on tYhoeu v Balaucek ,o Uf nITio tnra Jinacinkg? . 1 October 2014 | #MobileStorm Sponsored by:
  • 2. 2 Weathering the Mobile Storm: How IT pros navigate a whirlwind of devices, security and monitoring. | #MobileStorm
  • 3. October 2014 3 TABLE OF CONTENTS 01 BYOD Winds: Picking Up 02 Waiting for Lighting to Strike... 03 Are Users on the MDM Radar? 04 Alert: Seek Adequate Shelter PAGE 08 PAGE 12 PAGE 16 PAGE 18 05 Details on the Data PAGE 20
  • 4. We’ve studied the radar for an in-depth look at what IT pros are up against (hint: there’s a dense fog advisory as they attempt to manage an ever-mobile workforce). 4 Weathering the Mobile Storm: How IT pros navigate a whirlwind of devices, security and monitoring. | #MobileStorm
  • 5. October 2014 5 Is a Mobile Storm Brewing? An ominous cloud of devices continues to descend upon Tech City. As mobile devices rain down on organizations, how is IT weathering the deluge? And what, exactly, are they dealing with? Are we talking a run-of-the-mill afternoon shower… or a Category 5 beast? We’ve studied the radar for an in-depth look at what IT pros are up against (hint: there’s a dense fog advisory as they attempt to manage an ever-mobile workforce). How do IT pros think about – and prepare for – mobile security? And what gaps exist in their current policies?  Should they be monitoring employee usage more… or less? And how are users reacting to the possibility of being under a mobile storm watch? So many questions, so many forecasts coming your way. “The security risks associated with smartphones and tablets are nothing short of scary.” - Don Reisinger, eWeek1
  • 6. 6 Weathering the Mobile Storm: How IT pros navigate a whirlwind of devices, security and monitoring. | #MobileStorm
  • 7. October 2014 7 Survey Information To get to the eye of the mobile maelstrom, Spiceworks asked 300 IT pros in the US to share how their organizations are currently managing mobile devices and what they’re doing – or not doing – to keep corporate data safe and dry.  We’re seeing mobile devices, including those brought in by employees (BYOD, baby), continue to pour into the workplace. But Bring Your Own Everything (BYOx)… is still a blip on the radar. IT pros forecast continued mobile device growth, but their security measures aren’t quite in line. While mobile device management (MDM) is the top mobile device security software used by IT pros (followed by malware/antivirus soft-ware) – fewer than half are using or plan to use either type of security software. User privacy is still mostly intact. Very few IT pros tell us they’re monitoring “every move” users make on their mobile devices. But should they be more… watchful? And what do users have to say about this privacy invasion? Mobile threats are real, they’re intensifying… and they’re not going away. So what’s the holdup in widespread MDM adoption? Why aren’t we seeing more mobile device security software? Why aren’t more IT pros taking measures to protect mobile devices in the workplace from insidious threats just over the horizon? Key Findings 1 2 3 “As malicious code for mobile devices begins to generate revenue for malware authors, we can expect the number of threats to grow.” - BizCommunity.com2 Snap open your umbrella and prepare to find out how your organization measures up against the approaching downpour. Oh, you’d better bring your rain boots too, just in case. It’s a mess out there.
  • 8. 01 BYOD Winds: Picking Up. BYOD-Everything? Not So Much.  BYOD continues to spill into the work-place, as almost 90% of respondents indicate employees are bringing at least one device to work… and smartphones and tablets still lead the pack. Hey, nice Google Glass Eye… or whatever you call that thing. The future has arrived, and it’s sporting tech specs, wireless cuff-links, digital underwear, and who knows what else! A tornado of wearable technol-ogy – smart watches, smart glasses, fitness/ health monitors and more – is gathering strength as it swirls toward your network. At more than 20%, that’s almost eight percentage points higher than Spiceworks wearable tech data from May 2014.3 8 Weathering the Mobile Storm: How IT pros navigate a whirlwind of devices, security and monitoring. | #MobileStorm
  • 9. October 2014 9 Types of Mobile Devices Supported 90% 77% 21% Smartphones Tablets Wearables 0 20 40 60 80 100 As far as mobile device numbers, almost 80% of surveyed IT pros support one to two per employee. And that’s more than enough vulnerable data to reshape how IT departments handle the mobile monsoon (unfortunately, this one ain’t seasonal!). Number of Mobile Devices Supported 50 40 30 20 10 0 34% 6% 5% 3% The survey says iOS (46%) leads Android (35%) as the most common mobile operating system supported in the workplace. However, Windows (54%) and Android (47%) are perceived as being easier to monitor than iOS (42%). 7% 1 per employee 2 per employee 3 per employee More than 3 per employee None Don’t know 45%
  • 10. Despite a shifting climate (and a growing number) of employee-owned devices, on average more than half of organizations’ supported devices are company-owned. Average Percent of Devices in the Workplace 35% Employee-owned, company subsidized Company-owned Employee-owned 55% 10% 0 10 20 30 40 50 60 10 Weathering the Mobile Storm: How IT pros navigate a whirlwind of devices, security and monitoring. | #MobileStorm
  • 11. October 2014 11 Roughly half of respondents forecast that employee- and/or company-owned mobile devices will continue to swirl up in numbers over the next three years. BYOD is still raining cats and dogs in the workplace, but what about BYOx? Despite lots of media buzz (and a super cool acronym), only a third of IT pros report employees bringing in their own applications, encryption, networks, etc. 54% Percent of IT Pros Anticipating an Increase in Mobile Devices 27% 47% Employee-owned Company-owned Employee-owned, company subsidized
  • 12. 02 Waiting for the Lightning to Strike...  Naturally, more mobile devices mean more mobile threats. And while consumer devices may not be as at risk, industry experts believe that mobile malware is on the rise, especially for mobile devices in the workplace.4 After all, the lightning bolts of data theft are pretty much aimed at sensitive company data on unsecured mobile devices. So you’d think IT pros would be keeping up in terms of mobile security, right? Think again… Varying degrees of mobile policy Sure, most IT pros surveyed have rules about what types of devices can connect to which networks. But almost a quarter say they have no formal mobile device policy in place. And to extend the mobile weather meta-phor even more: That’s sort of like having no evacuation route in place when real disaster strikes. “Malware concerns are more acute in the workplace, where people increasingly bring their own devices and use them for conducting business.” - Molly Wood, The New York Times3 12 Weathering the Mobile Storm: How IT pros navigate a whirlwind of devices, security and monitoring. | #MobileStorm
  • 13. October 2014 13 Corporate Network Access Policies We allow employee-owned BYOD devices to connect on a separate guest network We allow employee and company-owned/subsidized devices on the corporate network We allow company-owned devices only on the corporate network We don't have a formal policy Don’t know 1% What corporate data do IT pros allow users to access on their mobile devices? Almost all allow access to email/calen-dar/ contacts, but many board up the windows from there. The numbers drop below half for other types of corporate data such as company file-sharing accounts (e.g. Dropbox, Box, etc.), company mobile apps/software, and secure network resources. 28% 25% 24% 22% Access To Corporate Assets 100 80 60 40 20 0 Email/Calendar/ Contacts Company le-sharing accounts (e.g., Dropbox) Company mobile apps/software Secure network resources 96% 44% 42% 33% 0 5 10 15 20 25 30
  • 14. Mobile security measures? I’ve heard of those… If there’s nothing to see (or hear), there’s nothing to fear. Consider it the “duck-un-der- the-covers-and-hope-the-thunder-goes- away” approach. It looks like IT pros might be limiting access to corporate data in lieu of relying on mobile device security software or formal MDM policies. That may be why less than half of respondents use or even plan to use MDM software within the next 12 months. Unfortunately, where there’s thunder… there’s lightning. Types of Mobile Device Security Software Used or Planned to Use MDM Antivirus/malware software 16% 15% 22% 49% 41% Central management Data protection Data loss prevention 14% 8% 6% EMM 2% Secure container Other 9% Application control 19% None Don’t know 0 10 20 30 40 50 14 Weathering the Mobile Storm: How IT pros navigate a whirlwind of devices, security and monitoring. | #MobileStorm
  • 15. In all fairness, it’s not like IT pros are unaware of the risks. Almost all respondents (98%) report some level of concern with mobile security. In fact, security (including compliance and threats) is reported as the top challenge when managing mobile devices for most IT pros surveyed: October 2014 15 Why, then, do a number of IT pros appear to be standing in the middle of an open field… waiting for the lightning to strike? Many say the cost of mobile device security is prohibitive given the size of their organization. Others say management is not yet onboard. And still others just don’t view mobile security as necessary. Let’s hear it straight from real IT pros: • “There just aren’t enough threats to mobile devices out there that warrant the time and headache of managing mobile security software.” • “The cost is substantial and finding the budgets for these solutions is difficult. We’ll have to work with what we’ve got, for now. ” • “We don’t use mobile device security because too many other things are bigger issues; we haven’t yet experienced a problem with mobile security to cause it to be a higher priority.” Top Mobile Device Management Challenges Category 1 2 3 4 5 Category Category Category Category MPH: 74-95 96-110 110-130 131-155 156+ SURGE: 4-5 FT. 6-8 FT. 9-12 FT. 13-18 FT. 18+ FT. Security compliance/ requirements Security breaches/ threats Increased help desk calls/support time Enforcement of end-user policies Security compliance/ requirements
  • 16. 03 Are Users On the MDM Radar? The issue of user privacy seems to be enjoying the calm before the storm. It turns out that very few IT pros (4%) monitor all their users’ mobile activity. In fact, more than two-thirds report monitoring “very little” to no mobile device usage.  Approach To Mobile Device Monitoring 50 40 30 20 10 0 45% 23% 4% 23% 5% We monitor every move We monitor major stu like installing apps and connecting to cloud services We monitor very little We don’t monitor employee mobile device usage Don’t know/ No comment 16 Weathering the Mobile Storm: How IT pros navigate a whirlwind of devices, security and monitoring. | #MobileStorm
  • 17. “Obviously, users want to make sure that their private infor-mation stays that way, private! However, after explaining the need for certain security mea-sures, most understand – and I always give the option to use a company-owned device if they are reluctant.” - Spiceworks IT pro and survey respondent3 October 2014 17 Why not? As one IT pro explains, “We con-tainerize the company usage – and have the ability to wipe the mobile device in case of theft or loss – but we do not monitor usage as these devices may be for personal use as well.” While others echo the sentiment that it seems too intrusive to monitor employee-owned devices, less than half (46%) of IT pros surveyed report reluctance from their users toward allowing MDM software on their devices. But it’s likely only a matter of time before the sprinkling of mobile privacy issues… escalates into a torrent. We asked survey respondents to share com-mon concerns regarding MDM. Fears range from “big brother” to draining batteries: • “Mainly a feeling of lost privacy on their own devices.” • “It’s their device, they want to be in con-trol.” • “They fear ‘big brother’ in our overworked and undermanned IT team.” • “Where do you draw the line between per-sonal ownership and company intrusion?” • “They are afraid we can see everything they do. They also are afraid of us being able to wipe their phones, and have heard horror stories about it!” Maybe the real question is: Should IT pros keep user devices within their scope?
  • 18. 04 Alert: Seek Adequate Shelter While the tidal wave of BYOD in the work-place continues to surge – a directional trend  that shows no signs of weakening – mobile security measures are not quite ready to surf the swell. In the words of a surveyed respondent, “We haven’t gotten around to implementing mobile security yet… many projects have been shuffled back by the powers that be. Until, of course, something happens to move it back to the front burner – then it will be an emergency.” There are many factors leading to the lack of prep, but it won’t be long before IT pros will need to brace themselves and confront the storm - head-on. Integrating MDM and mobile security solutions into the workplace will likely become unavoidable at some point. As more and more organizations embrace a mobile workforce (increased flexibility and higher productivity, anyone?), the next step is clear: Protect against a developing storm of mobile threats, the kind that tend to follow in the wake of emerging technology. 18 Weathering the Mobile Storm: How IT pros navigate a whirlwind of devices, security and monitoring. | #MobileStorm
  • 19. October 2014 19 MOBILE SECURITY PRESS HERE BREAK GLASS
  • 20. 05 Details on the Data You’ve just read Spiceworks’ version of  data gone spicy: Our answer to humdrum data. We tackle the tech issues of today... and what’s coming soon to a server room near you. And we deliver it all with more originality and spice than your typical run-of-the-mill reports. Drawing from a user base of more than 6 million IT pros, it’s a glimpse into tech you can’t get anywhere else! Industry (Top 12 industries shown) 10% Healthcare 7% 7% 7% Education Non-Prot Finance 13% 11% IT Service Provider Manufacturing 6% 4% 4% 4% 3% 3% Construction Software Engineering Consulting Government Transportation 20 Weathering the Mobile Storm: How IT pros navigate a whirlwind of devices, security and monitoring. | #MobileStorm
  • 21. October 2014 21 Company Size Region 1-19 17% 20-99 32% 500-999 5% 250-499 13% 100-249 22% 1,000 or more 11%
  • 22. This report was sponsored by Samsung. About Samsung Telecommunications America Samsung Telecommunications America, LLC, (Samsung Mobile) a Dallas-based subsidiary of Samsung Electronics Co., Ltd., researches, develops and markets wireless handsets, wireless infrastructure and other telecommunications products throughout North America. For more information, please visit www.samsung.com. About Samsung Electronics Co., Ltd. Samsung Electronics Co., Ltd. is a global leader in technology, opening new possibilities for people everywhere. Through relentless innovation and discovery, we are transforming the worlds of TVs, smartphones, tablets, PCs, cameras, home appliances, printers, LTE systems, medical devices, semiconductors and LED solutions. 22 Weathering the Mobile Storm: How IT pros navigate a whirlwind of devices, security and monitoring. | #MobileStorm
  • 23. 1 Don Reisinger, “10 Mobile Security Issues That Should Worry You,” eWeek, February 11, 2014. http://www.eweek. com/mobile/slideshows/10-mobile-security-issues-that-should-worry-you.html/ 2 “Mobile device malware a growing threat to smartphone users,” BizCommunity.com, July 17, 2013. http://www. bizcommunity.com/Article/196/542/96787.html 3 Compared to US-only data. Spiceworks Voice of IT Report, “The Devices are Coming! How the ‘Internet of Things’ will affect IT… and why resistance is futile,” Spiceworks, May 2014. http://www.spiceworks.com/voit/reports/the-de-vices- are-coming/ 4 Molly Wood, “Mobile Malware: Small Numbers, but Growing,” The New York Times, October 1, 2014. http://www. nytimes.com/2014/10/02/technology/personaltech/mobile-malware-small-numbers-but-growing.html?_r=0 Illustrations: Clarice Jenkins, Designer, Spiceworks Voice of IT ® Sources: About Spiceworks Voice of IT® The Spiceworks Voice of IT market insights program publishes stats, trends and opinions collected from technology professionals that are among the more than 5 million users of Spiceworks. Survey panelists opt-in to answer questions on technology trends important to them. To find out more about our research capabilities, email insights@spiceworks.com. About Spiceworks Spiceworks is the professional network more than 5 million IT professionals use to connect with one another and over 3,000 technology brands. The company simplifies how IT professionals discover, buy and manage more than $525 billion in technology products and services each year. Headquartered in Austin, Texas, Spiceworks is backed by Adams Street Partners, Austin Ventures, Institutional Venture Partners (IVP), Goldman Sachs, Shasta Ventures and Tenaya Capital. For more information visit www.spiceworks.com The contents in this report are a result of primary research performed by Spiceworks. Unless otherwise noted, the entire contents distributed as part of this report are copyrighted by Spiceworks. As such any information made available by any means in this report may not be copied, reproduced, duplicated, published, displayed, transmitted, distributed, given, sold, traded, resold, marketed, offered for sale, modified to create derivative works or otherwise exploited for valuable consideration without prior written consent by Spiceworks. For more information visit www.spiceworks.com/voice-of-it/terms. This report contains information of fact relating to parties other than Spiceworks. Although the information has been obtained from, and is based on sources that Spiceworks believes to be reliable, Spiceworks does not guarantee the accuracy, and any such information might be incomplete or condensed. Any estimates included in this report constitute Spiceworks’ judgment as of the date of compilation, and are subject to change without notice. This report is for information purposes only. All responsibility for any interpretations or actions based on the information or commentary contained within this report lie solely with the recipient. All rights reserved. 2014. October 2014 23 For more information visit: For other Spiceworks Voice of IT reports visit: www.spiceworks.com www.spiceworks.com/marketing/resources/
  • 24. 24 Spiceworks VoIT Report: March 2014 | #ITTraining