US Mobile Security Survey

Embed Size (px)

Citation preview

  • 8/10/2019 US Mobile Security Survey

    1/16

    Filing Information: April 2013, IDC #240598, Volume: 1

    Security Products: Survey

    S U R V E Y

    U . S . M o b i l e S e c u r i t y S u r v e y , 2 0 1 3

    Phil Hochmuth Charles J. Kolodgy

    John Grady Sally HudsonChristian A. Christiansen

    I D C O P I N I O N

    The views of U.S. enterprises on personal mobile devices (PMDs) vary widely

    depending on the organizations' tolerance for risk as well as their general reliance on

    mobility to drive productivity and revenue. To some IT-controlled firms, or organizations

    that disallow PMD use, the acronym PMD is viewed as "potential mass destruction" with

    regard to perceived risks of data loss or breaches associated with uncontrolled mobiles;

    for many such organizations, mobility is too essential to the business to introduce risks

    from unknown devices. For firms adopting the bring-your-own-device (BYOD) stance,

    PMDs represent an opportunity to have a more empowering workforce while offloading

    the cost of hardware, and potentially services, to the end users. However, many of

    these organizations rely less on mobility as an essential technology for employees and

    thus have greater tolerance for risk. U.S. enterprises use a wide variety of products and

    services to secure their employees' mobile devices, and the approach, mix, and types of

    solutions deployed correlates to the organizations' appetite for risk regarding PMDs, the

    level of mobility among organizations' workforce, and the size of the organizations in

    terms of employees and locations. According to IDC's recent study on mobility trends,

    the majority (62.5%) of United Statesbased enterprises consider themselves BYOD

    inclined, while a little more than one-third of enterprises are IT controlled when it comes

    to PMDs in the workplace. Other key findings in the survey include:

    Mobile malware is a top security concern among IT-controlled enterprises (68%).

    Exposure of sensitive data (via "leaky" or misconfigured apps) is the top concern

    among BYOD firms.

    Organizations of all types see social media and cloud storage as the greatest

    threats in terms of mobile app usage.

    Mobile security services (from carriers or MSPs) are the least deployed and most

    frequently "not planned" technology for protecting mobile workforces. However,

    organizations that have experienced a mobile-related data breach are more likely

    to install mobile security services to augment deployed mobile security hardware

    and software products.

    While three-quarters of enterprises see PMDs as a risk factor, two-thirds of

    enterprises also say employees using PMDs have a good understanding of the

    risks involved.

    GlobalHead

    quarters:5SpeenStreetFramingham,MA

    01701USA

    P.508.872.8200

    F.508.935

    .4015

    www.idc.com

  • 8/10/2019 US Mobile Security Survey

    2/16

  • 8/10/2019 US Mobile Security Survey

    3/16

    2013 IDC #240598 1

    I N T H I S S T U D Y

    M e t h o d o l o g y

    IDC's U.S. Mobile Security Survey, 2013, is a Web-based survey of 200 IT decisionmakers at United Statesbased enterprises (with 1,000+ employees) conducted in

    February 2013. Key questions and themes of the survey included:

    Top mobile security issues and challenges

    Key technologies enterprises are using, planning, and planning not to use to

    secure mobile workforces

    Vendor choices "core" versus "complementary" security technologies

    Analysis of IT-controlled versus BYOD enterprises

    Mobile security incidents and breaches experienced

    The organizations surveyed spanned 14 different vertical markets, including

    healthcare, finance, manufacturing, government, military, and education.

    Respondents were required to be in a position to make purchasing decisions and/or

    technical evaluations of mobile security products and services for their organization.

    IDC's U.S. Mobile Security Survey, 2013, is the first of four surveys to be published

    on a quarterly basis throughout 2013, with each survey focusing on each of IDC's

    Four Pillar research areas: mobility, cloud, social business, and Big Data/analytics.

    Following the 2013 U.S. Mobile Security Survey, forthcoming surveys will study how

    cloud computing, social media, and Big Data/analytics are affecting enterprise data

    and network security. These studies are slated for publication in the second, third,

    and fourth quarters of 2013.

    Note: All numbers in this document may not be exact due to rounding.

    S I T U A T I O N O V E R V I E W

    S u r v e y F i n d i n g s

    The momentum behind the BYOD movement and the use of PMDs in the office have

    been extensively chronicled in the technology and mainstream press. Empirical data

    from our study backs up these trends. To gauge how enterprises are responding to

    the influx of PMDs in the workplace, respondents were asked, "Which statement best

    describes the state of mobile/smartphone usage in your environment?"

    An IT-controlled environment is defined as one in which only corporate-issued

    devices are allowed to access enterprise applications and data.

    In a mix of IT-controlled environment and PMDs, both are allowed equal access

    to enterprise network applications and data.

  • 8/10/2019 US Mobile Security Survey

    4/16

    2 #240598 2013 IDC

    A decentralized environment is defined as one in which devices are not generally

    issued by the employer and any PMD is allowed to access corporate systems.

    For data analysis purposes, we have grouped "mixed" environments and

    "decentralized" environments into a single category calling them BYOD environments.

    Nearly two-thirds (62.5%) of all respondents categorized themselves as BYOD

    environments (114 respondents were mixed environments; only 22 respondents were

    decentralized environments). Of the total survey base, just over one-third (37.5%) of

    organizations were IT-controlled environments (see Figure 1).

    F I G U R E 1

    E n te r pr i se s ' T r en d T o w a rd B Y O D E n vi r o nm e nt s

    Q. Which statement best describes the state of mobile device/smartphone usage in

    your environment?

    n = 200

    Source: IDC's U.S. Mobile Security Survey, 2013

    Regarding mobility, enterprises were asked to define the level of mobility among the

    workforce as follows:

    Highly mobile (>50% of employees travel frequently outside the office and accesscorporate with mobile devices)

    Frequently mobile (3049% of employees are mobile or travel frequently)

    Moderately mobile (1029% of employees travel)

    Nonmobile (>10% of employees travel at any time)

  • 8/10/2019 US Mobile Security Survey

    5/16

    2013 IDC #240598 3

    Based on these responses, IDC grouped the categories into two overarching mobile

    personas: "mobile oriented," which combines the categories of highly and frequently

    mobile enterprises, and "mobile averse," which comprises moderate and nonmobile

    enterprises.

    Regarding company size, respondents were broken down into three categories:

    Small enterprise organizations with 1,0004,999 employees

    Medium-sized enterprise organizations with 5,0009,999 employees

    Large enterprise organizations with more than 10,000 employees

    From these basic characteristics, a clearer picture emerges of how organizations are

    using and controlling mobile devices. Among IT-controlled environments, nearly half

    of these organizations are considered "highly mobile." This indicates that in

    organizations where a mobile workforce is critical for productivity and growth, control

    over devices, and more importantly the data and apps on them, is a key requirement.

    This might include organizations with a large road warrior workforce consultancies,sales teams, and field workers which drives business and revenue.

    On the opposite end, only a quarter of BYOD enterprises categorized themselves as

    highly mobile, although overall BYOD-focused enterprises were slightly more mobile

    oriented than IT-controlled firms (72% of BYOD firms were also mobile oriented; 68%

    of IT-controlled firms considered themselves in this category). Another way to

    interpret this is that mobility has permeated enterprises at all levels; highly mobile, IT-

    controlled enterprises do mobility "for a living" (it's a must-have capability);

    meanwhile, BYOD-focused, mobile-oriented firms view mobility as more of a "nice to

    have" capability (see Figure 2).

  • 8/10/2019 US Mobile Security Survey

    6/16

    4 #240598 2013 IDC

    F I G U R E 2

    M a k e up o f E m p l o ye e B a s e i n T e r m s of L o c a t i on

    Q. How would you describe the makeup of the majority of your employee base

    in terms of location?

    Source: IDC's U.S. Mobile Security Survey, 2013

    Data Breach Trends

    A key question in the survey was, "Has your organization experienced in the past 12

    months any data breach incidents (i.e., data loss or exposure of confidential

    information) in which it was determined that the usage of a mobile device was a

    factor." Based on respondents:

    36.5% answered Yes and are considered Breached.

    58.5% answered No and are considered Non-Breached.

    5% of organizations said they did not know.

    Whether a firm was IT controlled or BYOD had little consequence on the frequency of

    mobile-related breaches (38% for BYOD firms versus 35% for IT-controlled firms). As

    might be expected, 46.8% of mobile-oriented firms experienced a breach in the past

    12 months, while only 11.9% of mobile-averse firms experienced a mobile-related

    breach (see Figure 3).

  • 8/10/2019 US Mobile Security Survey

    7/16

    2013 IDC #240598 5

    F I G U R E 3

    D a t a B r e a c h I n c i d e n t s A m o n g M o b i l e - A v e r s e a n d

    M o b i le - O r i e nt e d F i r m s i n t he P a s t 1 2 M o nt h s

    Q. Has your organization experienced in the past 12 months any data breach incidents (i.e.,

    data loss or exposure of confidential information) in which it was determined that the usage

    of a mobile device was a factor?

    Source: IDC's U.S. Mobile Security Survey, 2013

    The majority of respondents indicated their organization had between one and nine

    locations. Of these respondents, 37% had experienced a data breach. Thirty percentof firms with 1099 locations experienced breaches, while half of very dispersed

    organizations with over 100 locations said they experienced a breach. Also

    noteworthy, 8.7% of very dispersed organizations said they did not know if they

    experienced a breach the highest rate among any of the three size groups.

    The percentage of respondents who experienced a breach increased with regard to

    the size of the organization from an employee standpoint as well. Fewer than 30% of

    small enterprises had experienced a breach, while just over a third of medium-sized

    enterprises said a breach had occurred. Among the large organizations with more

    than 10,000 employees, close to half (49%) said they had experienced a breach.

    Also, 10.4% of very large enterprises said they do not know if they had experienced a

    breach, again showing that large organizations, whether measured by size orlocation, often have less visibility into the activities of their mobile workforce.

    Security Product Choice for Enterprise Mobility

    Respondents were asked to describe the status or plans for security product

    deployments targeted at securing their mobile workforces. This included both mobile-

    specific security solutions (such as mobile endpoint software or mobile security

    services) and mobile management solutions (mobile device management [MDM] and

  • 8/10/2019 US Mobile Security Survey

    8/16

    6 #240598 2013 IDC

    mobile applications management [MAM]). Traditional security technologies that could

    be used to secure mobile devices and traffic were also considered.

    General security products, as opposed to mobile-focused tools, were the most

    frequently deployed solutions for securing mobile workforces among respondents; at

    54%, security functions in wireless LAN (WLAN) infrastructure was the most widely

    deployed technology for securing mobile devices and users. This makes senses as

    the initial first point of contact for an employee-owned device in an organization is

    with the corporate WLAN. Many enterprises use common approaches such as access

    control lists, passwords, and guest/quarantine WLANs to control how mobile devices

    access the network. IT-controlled firms did this more frequently (64%) compared with

    BYOD firms (48%), which suggests that the majority of enterprises, which are BYOD

    focused, are opening WLANs up to end users' PMDs in the office.

    Security gateway solutions Web filtering, firewall, UTM, and VPN technologies

    were the second most deployed technology for mobile workforce security, as just over

    50% of organizations are using mobile features in these gateways. (Relating to the

    WLAN control trend, network access control [NAC] ranked fourth in deployments, at

    45.5%.)

    Mobile device management, at 50%, was the third most deployed technology. MDM

    solutions are primarily management platforms, which control the configuration of mobile

    devices and security tools. Enterprises see MDM as a valuable way to secure mobile

    devices. In case of mobile applications management platforms, fewer than 40% of

    organizations had deployed application containerization solutions, which allow for the

    separation of work and personal environments on mobiles, tablets, and smartphones.

    Security and managed services from wireless service providers or carriers (i.e.,

    AT&T, Verizon) and security SaaS solutions represented the bottom tier, with fewer

    than 40% of organizations deploying these solutions. Mobile security services from a

    managed security service provider (MSSP) were deployed in 35.5% of all

    organizations surveyed. Last, cloud or SaaS-based Web security solutions were the

    least deployed technology for mobile security, with a little more than one-third (34.5%)

    of organizations having deployed this technology. Interestingly, the highest frequency

    of technologies enterprises said they had "no plans" to deploy were mobile security

    services from MSSPs or wireless carriers (see Figure 4).

  • 8/10/2019 US Mobile Security Survey

    9/16

    2013 IDC #240598 7

    F I G U R E 4

    O r g a n i z a t i o n s ' M o b i l e S e c u r i t y S o l u t i o n D e p l o y m e n t P l a n s

    Q. Please indicate what plans your organizations has, if any, for deploying the following

    technologies to address mobile security concerns.

    n = 200

    Source: IDC's U.S. Mobile Security Survey, 2013

    U.S. enterprises will more likely address mobile security challenges with on-premise

    software/hardware solutions rather than with services and SaaS. In particular,

    enterprises will leverage features in existing infrastructure, mobile management

    platforms, and general-purpose security platforms to secure mobile workforces. While

    mobile-specific security products, such as mobile endpoint software, are being deployed

    and considered, these are largely secondary to infrastructure-based technologies.

  • 8/10/2019 US Mobile Security Survey

    10/16

    8 #240598 2013 IDC

    However, mobile security services and mobile-specific security products (such as

    mobile endpoint security software) are used, or are being evaluated, more frequently

    by enterprises that have experienced a mobile-related data breach. Among breached

    organizations, 45% have security services from mobile carriers deployed versus 33%

    of non-breached organizations. Also, 60% of breached firms say they are evaluating

    or plan to deploy mobile MSSP services in the next 1224 months, while only 43% of

    non-breached firms had similar trials/plans.

    Comparing deployed/planned solutions between BYOD and IT-controlled

    respondents, the greatest disparities among deployment between these two

    organization types included application containerization solutions (49% deployed in

    IT-controlled environments; 34% deployed among BYOD firms).

    IDC's interpretation of the data indicates that IT-controlled firms take measured,

    planned approaches to mobility in terms of buying and deploying security

    technologies, in addition to having policies around not permitting PMDs on corporate

    networks. BYOD firms are, as their nature indicates, less restrictive and less

    frequently deploy products to limit and secure access to networks and data. BYOD

    firms are more likely to go mobile first, and "ask questions later," with regard to

    deploying solutions for controlling and managing end-user devices. BYOD firms are

    less likely to put up barriers to WLAN network access and far less likely to utilize

    mobility identity, application management, and endpoint client security software

    agents than IT-controlled firms.

    Assessment of End-User Risk

    Two questions in the survey measured how enterprise IT views the risk of mobile device

    usage among the end-user population. Respondents were asked to show their level of

    agreement from 1 to 5 (with 5 being strongly agree) to the following statements:

    Increased usage of personal smartphones and tablets by employees at workposes security risks to my organization.

    Employees who use their personal smartphones for work purposes understand

    the risks and are aware of proper security practices.

    While only 25% of BYOD firms strongly agreed that increased usage of PMDs posed

    a security threat, only 26.4% of BYOD firms strongly agreed that employees using

    PMDs at work understood the risks. This indicates that these firms know there is an

    inherent lack of awareness as to the risks of PMD usage, but these firms are probably

    not supporting access to many critical applications or data sources for employees'

    personal devices. In contrast, 46.7% of IT-controlled firms viewed PMDs as a risk, but

    nearly 39% of firms also agreed that employees understood the risks involved (seeFigure 5). This indicates that IT-controlled firms, while restrictive in what devices are

    allowed, may be doing a better job around overall in educating their workforces

    regarding responsible device usage. BYOD firms appear to have a ways to go in this

    respect, again, pointing to a "go mobile first, ask questions later" approach, as

    described in the Security Product Choice for Enterprise Mobility section.

  • 8/10/2019 US Mobile Security Survey

    11/16

    2013 IDC #240598 9

    F I G U R E 5

    S e c u r i t y R i s k s C a u s e d b y I n c r e a s e d U s a g e o f E m p l o y e e s '

    P e r s o n a l S m a r t p h o n e s a n d T a b l e t s

    Q. Indicate your level of agreement with the following statements on a scale from 1 to 5, with 1

    being "strongly disagree" and 5 being "strongly agree." Increased usage of personal

    smartphones and tablets by employees at work poses security risks to my organization.

    Source: IDC's U.S. Mobile Security Survey, 2013

    Awareness of risks regarding mobile devices also increased with the frequency of

    mobile usage. Among mobile-oriented firms, 72% of firms agreed or strongly agreed

    that their end users were aware of the risks regarding mobile device usage, whereasonly 44% of mobile-averse firms agreed/strongly agreed that their end users were

    aware of the risks regarding mobile device usage. As mobile-averse organizations

    become more mobile, a greater risk for data loss or breaches or security usage in

    general may exist.

    Larger organizations, both in terms of user population and number of locations, saw

    greater risks regarding the use of PMDs than smaller firms. Among organizations with

    more than 100 locations, 40% agreed that the increased use of PMDs poses a

    security risk, while 20% of organizations with 1099 locations agreed with this.

    However, regarding the number of employees, there was not much a difference

    among small, medium-sized, and large enterprises regarding views on PMDs andrisk. A third of small enterprises strongly agreed that the increased use of mobile

    devices introduce risk, and that frequency increased only slightly among medium-

    sized and large enterprises (34% and 36%, respectively).

    Top Mobile Threats Leaky Apps and Data Loss

    Enterprises, both BYOD and IT controlled, see a wide range of threats to their mobile

    device deployments. Insecure or loosely secured privacy settings on mobile

  • 8/10/2019 US Mobile Security Survey

    12/16

    10 #240598 2013 IDC

    applications (i.e., social network collaboration or contact records applications) was the

    most frequently cited threat among all survey respondents. This is a very real issue

    for many enterprises as workers begin to integrate personal applications with

    business contact lists and professional directories. Some social and productivity

    applications have been known to surreptitiously upload users' entire contact lists or

    databases of connections from other social media applications onto unknown servers.

    Others can reveal potentially sensitive information such as the users' geolocation or

    the identification number of the users' devices. These trends worry organizations as

    potentially sensitive customer contact information, sales leads, or confidential

    information may be leaked by end users without their knowledge.

    The issue of insecure or loosely secured privacy settings was the most frequently cited

    among BYOD firms, as 69.6% said this was a top threat to their mobile devices in their

    organization. Only 53.3% of IT-controlled firms cited this as an issue; however, this

    percentage could likely be attributed to the fact that IT-controlled firms disallow such

    applications, which could be susceptible to unwanted contact uploading (see Figure 6).

    F I G U R E 6

    T o p M o b i l e S e c u r i t y T h r e a t s

    Q. What are the top security threats to mobile devices (whether personal or

    employee owned)?

    Source: IDC's U.S. Mobile Security Survey, 2013

  • 8/10/2019 US Mobile Security Survey

    13/16

  • 8/10/2019 US Mobile Security Survey

    14/16

    12 #240598 2013 IDC

    F I G U R E 7

    I n f o r m a t i o n S e c u r i t y R i s k f o r O r g a n i z a t i o n s f r o m

    N o n c o r p o r a t e M o b i l e A p p l i c a t i o n s

    Q. What types of noncorporate mobile applications pose the greatest risk to information

    security in your organization?

    Source: IDC's U.S. Mobile Security Survey, 2013

    Remote PC access tools such as GoToMyPC or VNC for mobile devices are

    actually viewed as more of a threat among BYOD firms (55%) versus IT-controlled firms

    (44%); however, this stands to reason as IT-controlled firms are more likely to lock

    down mobile devices and PCs from noncorporate remote access tools. However, it also

    indicates that a trend exists in more open environments, where employees are using

    personal smartphones as a way to access PCs and other machines behind their

    corporate firewall. (Relative to this, BYOD firms also cited greater frequencies of

    breaches in which unauthorized users access corporate applications from an

    employee's mobile device than IT-controlled firms, or among all enterprises in general.)

  • 8/10/2019 US Mobile Security Survey

    15/16

    2013 IDC #240598 13

    F U T U R E O U T L O O K

    From the data, we see a pattern that many enterprises are "backing into" securing

    their mobile workforces with products designed for general-purpose IT security

    (security gateways, NAC) or even network infrastructure in general (i.e., WLAN). This

    speaks to the nature of mobility in the majority of enterprises BYOD or a mix of IT-

    controlled and employee-owned mobile devices, which can access corporate dataand applications. Organizations that do mobility "for a living" (i.e., organizations that

    have highly mobile workforces, which are relied upon to drive revenue and

    productivity) are more likely to be IT controlled from a mobile device standpoint and

    are also more likely to use mobile-specific security and management technologies,

    such as mobile endpoint security agents.

    The security approach enterprises will have to take with mobile employees, especially

    the majority of BYOD-focused firms, will be more lateral than head-on; existing

    technologies and infrastructures will have to be expanded and features added to

    accommodate the BYOD trend in the enterprise.

    E S S E N T I A L G U I D A N C E

    Vendors of security products targeting mobile enterprises must have a clear

    understanding of the mobility profile of their target customers and tailor the feature

    sets, go-to-market strategy, and integration efforts around these solutions to match

    customer needs. One-size-fits-all approaches will fall short of enterprises'

    expectations and require customers to piece together solutions that work for their

    mobile security needs. This is especially true for security product vendors with

    mobile-targeted offerings, such as MDM/MAM or containerization platforms.

    Service providers and MSPs must increase awareness of their mobile security

    offerings among enterprises while differentiating and emphasizing the benefits ofservices on top of product-based solutions. From the data, organizations do not see

    services as a primary protection technology for their mobile workforces; however,

    among organizations that have been breached or have high concerns about mobile

    data and device loss/compromise, mobile security services particularly those from

    wireless carrier are seen as a strategic backup solution for augmenting mobile

    security infrastructure. Security SaaS solutions providers with mobile-focused

    products must also emphasize advantages of a non-hardware/software and, in

    particular, an agentless approach to mobile security, particularly among BYOD-

    focused enterprises, which are the majority of customers.

    L E A R N M O R E

    R e l a t e d R e s e a r c h

    Worldwide Mobile Enterprise Security Software 20132017 Forecast and

    Analysis (IDC #240014, March 2013)

    Worldwide Security 2013 Top 10 Predictions (IDC #239424, February 2013)

  • 8/10/2019 US Mobile Security Survey

    16/16

    14 #240598 2013 IDC

    Worldwide IT Security Products 20122016 Forecast and 2011 Vendor Shares:

    Comprehensive Security Product Review(IDC #237934, November 2012)

    S y n o p s i s

    This IDC study discusses the findings from the U.S. Mobile Security Surveyregarding

    threats posed by mobile devices and apps among BYOD and IT-controlled firms.

    "Mobile devices and apps pose a great security risk in the eyes of most enterprise IT

    security professionals," says Phil Hochmuth, program manager for IDC's Security

    Products Research group. "At the same time, there is a general acceptance, or a

    sense of inevitability, among IT professionals that mobile devices are here to stay

    and that ultimately, end users will come to understand the risks involved with mixing

    personal devices with corporate application and data resources."

    C o p y r i g h t N o t i c e

    This IDC research document was published as part of an IDC continuous intelligence

    service, providing written research, analyst interactions, telebriefings, and

    conferences. Visit www.idc.com to learn more about IDC subscription and consulting

    services. To view a list of IDC offices worldwide, visit www.idc.com/offices. Please

    contact the IDC Hotline at 800.343.4952, ext. 7988 (or +1.508.988.7988) or

    [email protected] for information on applying the price of this document toward the

    purchase of an IDC service or for information on additional copies or Web rights.

    Copyright 2013 IDC. Reproduction is forbidden unless authorized. All rights reserved.