Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more ➡
Download
Standard view
Full view
of .
Add note
Save to My Library
Sync to mobile
Look up keyword
Like this
8Activity
×
0 of .
Results for:
No results containing your search query
P. 1
BT Assure - Rethink the Risk

BT Assure - Rethink the Risk

Ratings: (0)|Views: 1,475|Likes:
Published by BT Let's Talk
Involving more than 2,000 interviews across 11 countries the BT ‘Rethink the Risk’ research contrasts the views and expectations of employees with the plans and priorities of IT decision-makers in enterprises across public and key commercial sectors.It highlights the new opportunities and security risks posed by the growing presence of personal devices on corporate networks, the large scale deployment of cloud solutions and increasing amounts of unstructured data generated by contemporary commerce – all challenges addressed by innovations within the BT Assure security portfolio. Crucially, the BT ‘Rethink the Risk’ research reveals that risks to enterprises are moving too fast for reactive security systems
Involving more than 2,000 interviews across 11 countries the BT ‘Rethink the Risk’ research contrasts the views and expectations of employees with the plans and priorities of IT decision-makers in enterprises across public and key commercial sectors.It highlights the new opportunities and security risks posed by the growing presence of personal devices on corporate networks, the large scale deployment of cloud solutions and increasing amounts of unstructured data generated by contemporary commerce – all challenges addressed by innovations within the BT Assure security portfolio. Crucially, the BT ‘Rethink the Risk’ research reveals that risks to enterprises are moving too fast for reactive security systems

More info:

Published by: BT Let's Talk on May 15, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See More
See less

04/24/2013

pdf

text

original

 
April 2012
BT AssureRethink the Risk
Summary
Involving more than 2,000 interviews across 11 countries the BT ‘Rethink theRisk’ research contrasts the views and expectations of employees with theplans and priorities of IT decision-makers in enterprises across public and keycommercial sectors.It highlights the new opportunities and security risks posed by the growingpresence of personal devices on corporate networks, the large scaledeployment of cloud solutions and increasing amounts of unstructureddata generated by contemporary commerce – all challenges addressed byinnovations within the BT Assure security portfolio. Crucially, the BT ‘Rethinkthe Risk’ research reveals that risks to enterprises are moving too fast forreactive security systems.
The risk landscape is changing, fast...
Emerging threats already rank alongside established cyber-security challenges – Employees leaking data, Bring your owndevice (BYOD) and a mobile workforce are in the same threatleague as cyber-security.Almost three-quarters of IT managers describe cyber-securityas “a major concern” while 84 per cent of those using cloudservices are “anxious” or “very anxious” about the securityimplications, acknowledging that keeping up is an endless task.Enterprise IT departments recognise that their approach tocyber-security needs an upgrade and tighter controls and newtechnology are seen as key weapons.When asked to select the three most important ways to helpstrengthen their approach towards cyber-security 66 per centhighlighted tighter controls over IT equipment, processes andnetworks, 62 per cent highlighted new technology to improvethe monitoring and identication of threats and 50 per centhighlighted improved skills among staff to assess and managecyber-security risks.When asked to select the three most important factorswhen considering cyber-security solutions 61 per cent citedeffectiveness of monitoring and speed of response, 52 percent cited strength of resilience against attacks and 42 percent cited the ability to ex and ne-tune solutionsto requirements.
BYOD is presenting new, unprecedented challenges
The BYOD genie is out of the bottle – 60 per cent of employeessay their employers permit them to connect personally-owneddevices to the corporate network to use them for work. Thisdrops to 37 per cent in the UK but increases to 80 per cent inIndia and 92 per cent in China, who have had the opportunityto develop new infrastructure from scratch so are more able toadopt modern policies and technologies.46 per cent of employees who currently can’t, would like to beable to use their personal devices for work.While company sanctioned BYOD adoption is generally high, usestated by employees is higher than level IT managers acknowledge.Organisations in China (53 per cent), Brazil (51 per cent) andthe USA (50 per cent) are most likely to have formal BYODpolicies in place, but there is still signicant acknowledgedpenetration in countries least likely to already have a policy –Italy (25 per cent), UK (31 per cent) and Germany (34 per cent).
Number of respondents rating each of these threat areas as “‘challenging” or “very challenging’(BASE: IT respondents)
 
All typical business personal computing applications are beingexecuted on personal devices.The benets of enhanced mobility and consumerisationare widely recognised – 58 per cent of IT decision-makersthink mobility and consumerisation can deliver increasedproductivity and efciency.84 per cent believe companies already allowing employeesto use their personal devices for work enjoy a competitiveadvantage – this increases to 98 per cent of IT decision-makers in China and 94 per cent in India.The challenge of maintaining an effective BYOD policy is clear– 71 per cent of enterprises surveyed will have a BYOD policyimplemented by March 2013. Yet only just over a quarter of ITrespondents report that managing their BYOD policy is easy,or that they expect it to be easy.
Do new rights come with new responsibilities?
For employees, consumerisation is mostly about benets – 42per cent of employees using their own device for work believethat they are more efcient and productive as a result but 1in 3 employees see “no risk” in using their own device in awork context and only 1 in 10 IT heads think all BYOD usersrecognise the risks.Employees resist management of their usage – 40 per centof employees say that “The IT department imposes rulesand regulations that restrict the most innovative use of newtechnologies” and almost half dislike the idea of havingadditional security features installed.Employees and IT departments are clashing over theimposed restrictions and conditions of BYOD – a maximumof 1 in 4 employees nd any BYOD policy conditions set bymanagement “reasonable”.
IT decision-makers have a tough balance to strike
Just 11 per cent of IT Managers believe all employees recognisethe risk to company security that using a personal device ina work context can represent. Only 19 per cent believe allusers understand their access/permissions related to theirmobile devices. 28 per cent agree that putting 24/7 accessto corporate systems into the hands of an increasingly mobileworkforce is now the main threat to corporate IT security.IT managers are nervous and with justication – nearly 4 in 10enterprise organisations surveyed have a history of BYOD-related breaches in security.IT decision-makers need to tackle an extensive range of issuesbefore they feel able to introduce a BYOD policy, includingsecurity, complexity of set-up, potential threats to IP andincreased costs associated with data usage.Their greatest concerns when it comes to creating or havingcreated BYOD policies are employees being able to leave withdata or knowledge that threatens IP and a lack of controlover devices.BYOD’s accompanying realignment of security infrastructurehas had signicant impacts on enterprise IT delivery – whenasked what effect providing the security infrastructure tosupport a BYOD policy has had 70 per cent of IT decisionmakers claimed that it has increased complexity, 60 per centclaimed that it had increased cost and 54 per cent claimed ithad changed how they prioritise resource allocation.
Global perspectives on BYOD
Of IT managers within organisations with BYOD policies,providing the security infrastructure to support a BYOD policyhas had the most impact on organisations in the USA (withevery aspect scoring between 62 per cent and 89 per cent)and least in Benelux (where scores range between 19 per centand 50 per cent).
April 2012
BT AssureRethink the Risk
Summary
Please select the three most important ways to help strengthen your approach towardscyber-security (BASE: IT respondents)Please select the three most important factors when considering cyber-security solutions(BASE: IT respondents)

Activity (8)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
BT Let's Talk liked this
BT Let's Talk liked this
BT Let's Talk liked this
BT Let's Talk liked this
BT Let's Talk liked this
BT Let's Talk liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->