Professional Documents
Culture Documents
July 2015
1 Sponsored by:
Executive Summary
Modern IT organizations must find a way to deal with the
requirements for securing corporate systems and data,
while allowing business users to be productive.
2
Key Findings
3 Sponsored by:
METHODOLOGY
4 Sponsored by:
Goals and Methodology
Research Goal The primary research goal was to capture hard data
on experiences with and attitudes towards context
aware security among IT and business professionals
5 Sponsored by:
SECURITY IS PRIORITIZED OVER
EMPLOYEE CONVENIENCE
6 Sponsored by:
Everyone knows IT prioritizes security over
employee convenience
In your opinion, what is your
When making decisions about IT company’s philosophy about how
security, what is your typical much employees can be impacted
philosophy? (IT) in order to secure their electronic
assets? (Business)
8 Sponsored by:
91% of business users report their
productivity is impacted by security
How often do the security measures that your employer puts in place
negatively impact your productivity?
40% 38%
35%
91%
30%
25% 23%
20%
20%
15%
11% 9%
10%
5%
0%
Always Frequently Occasionally Rarely Never
9 Sponsored by:
85% must keep track of
multiple work passwords
How many different login/password combinations do you need to keep
track of for the different files and applications that you require at work?
60% 56%
50%
85%
40%
30%
20% 18%
13% 11%
10%
2%
0%
None One 2–5 6 – 10 More than 10
10 Sponsored by:
More than half say the day-to-day
impact of security is increasing
Consider the changes that have been made to security in your
corporate environment in the past 18 months. How would you
describe the difference?
Security is less
impactful on my day-
to-day work
11%
11 Sponsored by:
Almost half use their own mobile
device for work
Who MANAGES this mobile device
Who OWNS the main mobile device
including installing software and
that you use for work?
upgrading the operating system?
n = use smartphone or tablet for work
I manage my
My company
personal stuff
gives me money
and my company
to pay for it
manages the
3%
work stuff
12%
I own it
46%
I manage it
My company 51%
owns it
51%
My company
manages it
37%
12 Sponsored by:
Mobile devices not always managed
by their owner
Who MANAGES this mobile device including installing software and
upgrading the operating system?
(by who owns the mobile device)
n = use smartphone or tablet for work
I manage it
"My company owns it" 33% 53% 14%
My company manages it
13 Sponsored by:
95% access corporate assets on their
mobile device; 83% do so daily
How often do you access corporate assets (i.e. documents or
applications) on your mobile device?
35%
30% 30%
30%
25% 23%
20%
15%
10% 8%
5%
5% 3%
0%
More than 20 10 to 20 times a 1 to 10 times a Less than once a Less than once a Less than once a Never
times a day day day day week month
14 Sponsored by:
82% of users who work remotely
must use additional security measures
Does your employer require you
to use ADDITIONAL security
Do you ever work remotely? measures when you are
accessing corporate resources
remotely (i.e. VPN)?
No
18%
No
42%
“Yes” only
Yes
58%
Yes
82%
15 Sponsored by:
92% are negatively impacted when
required to use additional remote security
How often do additional security measures required outside of the
office negatively impact your ability to get work done?
n = use additional security when working remotely
25%
20% 18%
15%
10% 9% 8%
5%
0%
Always Frequently Occasionally Rarely Never
16 Sponsored by:
SECURITY SLOWS USE OF
BENEFICIAL SOLUTIONS
17 Sponsored by:
Cloud increases productivity, but
security challenges prevent adoption
In your opinion, do cloud In your opinion, do security
applications increase employee challenges prevent greater
productivity? adoption of cloud applications?
No
No
23%
26%
Yes
Yes
74%
77%
18 Sponsored by:
BYOD increases productivity, but
security challenges get in the way
In your opinion, does BYOD In your opinion, do security
increase employee challenges prevent greater
productivity? adoption of BYOD?
No
28%
No
39%
Yes
61%
Yes
72%
19 Sponsored by:
IT has concerns about a wide variety of
security risks
Which of the following do you believe creates security risks for your
organization?
20 Sponsored by:
IT SEES CLEAR BENEFITS TO
CONTEXT-AWARE SECURITY
21 Sponsored by:
Context-aware Security
22 Sponsored by:
Context-aware security has been
fully adopted by over a quarter
Does your organization have a context-aware approach to security?
23 Sponsored by:
97% see benefits in context-aware
security
Which of the following possible benefits of context-aware security
would be beneficial to your organization?
24 Sponsored by:
93% say lack of context-aware
security causes challenges
Does a lack of context-aware security cause challenges?
No challenges 7%
25 Sponsored by:
Lack of awareness the greatest
barrier to context-aware security
What is the greatest barrier or challenge to delivering a context-aware
security practice in your organization?
26 Sponsored by:
PARTICIPANT PROFILE
27 Sponsored by:
Participants Represented – Business Users
Country Company Size
United
Kingdom
33%
28 Sponsored by:
Participants Represented – IT
Role Country
United
Kingdom
35%
IT security is a
part of my job
1,000 to 5,000
68%
57%
29 Sponsored by:
For more information…
30 Sponsored by:
Dimensional Research:
Market research from technology professionals
31