SlideShare a Scribd company logo
To view the complete survey report, go to
WIRELESS
SECURITY TRENDS
ALL DATA FROM FORTINET SPONSORED GLOBAL SURVEY
OF 1300 IT DECISION MAKERS, CONDUCTED IN MARCH, 2016.
WIRELESS - MOST VULNERABLE PART OF
NETWORK INFRASTRUCTURE
of respondents report
wireless network is
“very vulnerable”
of respondents expect
complete control over
devices that access
the network
of respondents allow
BYOD devices on
the network
35% 2/3 56%
Internet of Things is playing a bigger role:
59%of respondents in
North America say
they use business
critical IoT equipment
Globally,
SURVEY RESULTS:
80%of respondents
include IoT in
security strategy
Most widely used security mechanism:
Firewalls – deployed by
81%of respondents
Top 2 Security Risks:
Loss of sensitive corporate
and /or customer data
0
1 0
0
1
0
10 0
Industrial Espionage
Top capabilities expected from a secure
access architecture:
Combines
cyber-security with
enterprise access
Enables segmentation of
devices and access layers
across wired/wireless
networks
Over half of respondents prefer using cloud-based wireless network management
1 2
Application
awareness and control
60%
from last year
up
Authentication
up21%
from last year
Intrusion
Prevention Systems
up45%
from last year
TOP SECURITY RISKS
CONCERNS ABOUT WIRELESS ARE SHIFTING
SECURITY PRIORITIES
Biggest changes:
A CLEAR PREFERENCE FOR INTEGRATED
SECURITY SOLUTIONS
www.fortinet.com/secureWiFi

More Related Content

PPTX
T.A.S.C - mobile device secuirty
PDF
China's Cyber Threat Landscape from the Perspective of CNCERT/CC by Zhu Yunqi...
PPS
Nuevas tecnologías a nivel de hogares
PDF
2015 Global Threat Intelligence Report - an analysis of global security trends
PPTX
4 Things to know about cybersecurity
PDF
Info and telecom_network_security
PPTX
Power station monitoring and cyber security
PPTX
SC Magazine & ForeScout Survey Results
T.A.S.C - mobile device secuirty
China's Cyber Threat Landscape from the Perspective of CNCERT/CC by Zhu Yunqi...
Nuevas tecnologías a nivel de hogares
2015 Global Threat Intelligence Report - an analysis of global security trends
4 Things to know about cybersecurity
Info and telecom_network_security
Power station monitoring and cyber security
SC Magazine & ForeScout Survey Results

What's hot (20)

PDF
The Mobile Device Security Bible 2014-2020
PPTX
APE Intrusion Prevention
PDF
Unisys Security Insights Infographic: Global
PPTX
Technology: Built for Attack : Dr. Emma Garrison-Alexander
PDF
Website security statistics of 2012
PDF
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
PPT
Epic Sales Presentation
PDF
Protecting Americas Next Generation Networks
PDF
How Secure Is Your Building Automation System?
PPTX
IoT Threat Intel - Steppa
PDF
Unisys Security Insights Infographic: Netherlands
PDF
Digital Transformation and the Role of IAM
PPT
Stayer cis-513-week-8-assignment-3-wireless-security-policy-new
PPTX
The Internet of Security Things (A Story about Change)
KEY
What makes the IT industry tick?
PDF
UserLock Presentation | Access Security for Windows Networks
PDF
Better Security Through Big Data Analytics
PPTX
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges
PPTX
CYBER THREAT ASSESSMENT
PPTX
An Analysis of the Privacy and Security Risks of Android VPN Permission-enabl...
The Mobile Device Security Bible 2014-2020
APE Intrusion Prevention
Unisys Security Insights Infographic: Global
Technology: Built for Attack : Dr. Emma Garrison-Alexander
Website security statistics of 2012
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Epic Sales Presentation
Protecting Americas Next Generation Networks
How Secure Is Your Building Automation System?
IoT Threat Intel - Steppa
Unisys Security Insights Infographic: Netherlands
Digital Transformation and the Role of IAM
Stayer cis-513-week-8-assignment-3-wireless-security-policy-new
The Internet of Security Things (A Story about Change)
What makes the IT industry tick?
UserLock Presentation | Access Security for Windows Networks
Better Security Through Big Data Analytics
@AtchisonFrazer Enterprise Mobile Security Trends, Challenges
CYBER THREAT ASSESSMENT
An Analysis of the Privacy and Security Risks of Android VPN Permission-enabl...
Ad

Similar to Wireless security trends (20)

PDF
Wireless survey-report-saa-2016
PDF
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
PDF
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
PDF
Infographic 2014 smart_grid_cybersecurity_survey_smart_modular_technologies_z...
PDF
Infographic dsci 2016
PDF
Security and Your Business
PPTX
Iot cyber security
PPTX
IoT Slam Healthcare 12-02-2016
PDF
The impact of mobile devices on information security
PPT
State of endpoint risk v3
PPT
State of endpoint risk v3
PPT
State of endpoint risk v3
PDF
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
PDF
SVB Cybersecurity Impact on Innovation Report - Overview
PPTX
State of endpoint risk v3
PPTX
State of endpoint risk v3
PPTX
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
PDF
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
PPTX
Threat Detection as presented at the 2016 DGI Cyber security Conference
PPTX
CompTIA 11th Annual Information Security Trends
Wireless survey-report-saa-2016
ANDROID & FIREBASE BASED ANTI THEFT MOBILE APPLICATION
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
Infographic 2014 smart_grid_cybersecurity_survey_smart_modular_technologies_z...
Infographic dsci 2016
Security and Your Business
Iot cyber security
IoT Slam Healthcare 12-02-2016
The impact of mobile devices on information security
State of endpoint risk v3
State of endpoint risk v3
State of endpoint risk v3
WIRELESS DEFENSE STRATEGIES IN THE IOT ERA
SVB Cybersecurity Impact on Innovation Report - Overview
State of endpoint risk v3
State of endpoint risk v3
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
Scale vp wisegate-investing-in_security_innovation_aug2014-gartner_catalyst
Threat Detection as presented at the 2016 DGI Cyber security Conference
CompTIA 11th Annual Information Security Trends
Ad

Recently uploaded (20)

PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Getting Started with Data Integration: FME Form 101
PDF
Mushroom cultivation and it's methods.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Encapsulation theory and applications.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Machine learning based COVID-19 study performance prediction
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Building Integrated photovoltaic BIPV_UPV.pdf
Getting Started with Data Integration: FME Form 101
Mushroom cultivation and it's methods.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Group 1 Presentation -Planning and Decision Making .pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
OMC Textile Division Presentation 2021.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Spectral efficient network and resource selection model in 5G networks
Encapsulation theory and applications.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Machine learning based COVID-19 study performance prediction
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Reach Out and Touch Someone: Haptics and Empathic Computing
Per capita expenditure prediction using model stacking based on satellite ima...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Programs and apps: productivity, graphics, security and other tools
Mobile App Security Testing_ A Comprehensive Guide.pdf

Wireless security trends

  • 1. To view the complete survey report, go to WIRELESS SECURITY TRENDS ALL DATA FROM FORTINET SPONSORED GLOBAL SURVEY OF 1300 IT DECISION MAKERS, CONDUCTED IN MARCH, 2016. WIRELESS - MOST VULNERABLE PART OF NETWORK INFRASTRUCTURE of respondents report wireless network is “very vulnerable” of respondents expect complete control over devices that access the network of respondents allow BYOD devices on the network 35% 2/3 56% Internet of Things is playing a bigger role: 59%of respondents in North America say they use business critical IoT equipment Globally, SURVEY RESULTS: 80%of respondents include IoT in security strategy Most widely used security mechanism: Firewalls – deployed by 81%of respondents Top 2 Security Risks: Loss of sensitive corporate and /or customer data 0 1 0 0 1 0 10 0 Industrial Espionage Top capabilities expected from a secure access architecture: Combines cyber-security with enterprise access Enables segmentation of devices and access layers across wired/wireless networks Over half of respondents prefer using cloud-based wireless network management 1 2 Application awareness and control 60% from last year up Authentication up21% from last year Intrusion Prevention Systems up45% from last year TOP SECURITY RISKS CONCERNS ABOUT WIRELESS ARE SHIFTING SECURITY PRIORITIES Biggest changes: A CLEAR PREFERENCE FOR INTEGRATED SECURITY SOLUTIONS www.fortinet.com/secureWiFi