Welcome!

News Feed Item

Second Annual BYOD & Mobile Security Study Reveals Exploits Entering Organizations via Mobile Devices Is a Top BYOD Security Concern in 2014

Independent Research Study Conducted by LinkedIn Information Security Community Finds More Than Half of 1,100 Respondents Identify Malware Protection as a Key Requirement for Mobile Security

SAN JOSE, CA -- (Marketwired) -- 07/23/14 -- The Information Security Community on LinkedIn, an online community of more than 200,000 information security professionals, and Vectra Networks, the leading innovator in real-time detection of in-progress cyber-attacks, today announced the results of the second annual "BYOD & Mobile Security Study" highlighting the state of BYOD and mobile security in 2014.

The study found that nearly half of respondents agreed that users bringing downloaded apps or content with embedded security exploits into their organization, as well as malware infections, are top BYOD security concerns. In addition, 60 percent of respondents said that malware protection is a requirement for mobile security.

The BYOD & Mobile Security Study was independently conducted by the Information Security Community on LinkedIn. This second edition study collected responses from more than 1,100 IT security practitioners to gain a deeper understanding into the practices, usage and security concerns around BYOD.

"Loss of company or client data, followed by unauthorized access to company data and systems are well publicized as security threats around BYOD, and they were respondents' biggest security concerns in our 2014 study," said Holger Schulze, founder of the 200,000+ member Information Security Community on LinkedIn. "But it is very interesting that the study revealed that respondents' next biggest security concerns were users bringing downloaded apps or content with embedded security exploits into their organization (47 percent), followed by malware infections (45 percent)."

A copy of the study can be found at http://vectranetworks.hs-sites.com/byod-and-mobile-security.

Additional key findings of the study include:

  • According to respondents, only 21 percent of their organizations have fully implemented BYOD policies, processes and infrastructure. In addition, 24 percent of respondents' organizations have no mobile device policy. Along these same lines, 21 percent of respondents said that privately owned devices are widely in use in their organizations, but are not supported within their organizations.
  • While accessing email, calendar and contacts is the most popular usage for BYOD devices (86 percent), other business apps and data are also being routinely accessed by BYOD devices. Study respondents said document access and editing apps are used 45 percent of the time; Sharepoint and Intranet access happens 41 percent of the time; and apps for file sharing and company-built applications are accessed 34 percent of the time.
  • When it comes to sensitive data and intellectual property being accessed over BYOD, respondents were most concerned with protecting business data (74 percent), customer/employee data (69 percent), and documents (66 percent).
  • According to respondents, the most popular tool to monitor and manage mobile devices was mobile device management (MDM), in use at 43 percent of respondents' organizations, followed by endpoint security tools (39 percent), and Network Access Controls (38 percent). Similarly, the most common risk control measures for mobile devices were password protection (67 percent), followed by remote wiping of data (52 percent), and use of encryption (43 percent).

Significant data in the report is that 21 percent of organizations who acknowledge broad use of privately owned devices, for which no support exists within their organizations. Malware threats are already being carried into the organization on these unmanaged privately owned devices.

"BYOD and mobility create a significant security risk that we have observed in production networks," said Mike Banic, Vectra Networks VP of Marketing. "Traditional perimeter security has no way of stopping this malware vector into organizations' networks, and the Vectra X-Series platform is already meeting this critical need for organizations."

About the LinkedIn Information Security Community
With more than 200,000 members, the Information Security Community on LinkedIn is the largest online network of infosec professionals in the industry. Covered topics include compliance, encryption, anti-virus, malware, cloud security, data protection, hacking, network security, virtualization, and more. For more information, visit: https://www.linkedin.com/groups?gid=38412

About Vectra Networks
Vectra Networks is the leading innovator in real-time detection of in-progress cyber-attacks. Vectra delivers continuous automated cyber-attack detection and reporting that instantly identifies attacks while they are happening and describes what the attacker is doing. Vectra automatically prioritizes attacks that pose the greatest business risk, enabling organizations to quickly make decisions on where to focus their time and resources. Vectra Networks' investors include Khosla Ventures, IA Ventures and AME Cloud Ventures. The company's headquarters are in San Jose, Calif. More information can be found at www.vectranetworks.com.

Vectra Networks is a registered trademark of Vectra Networks in the United States and other countries. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.

Contact:
Dan Spalding
Email Contact
(408) 960-9297

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Automation is enabling enterprises to design, deploy, and manage more complex, hybrid cloud environments. Yet the people who manage these environments must be trained in and understanding these environments better than ever before. A new era of analytics and cognitive computing is adding intelligence, but also more complexity, to these cloud environments. How smart is your cloud? How smart should it be? In this power panel at 20th Cloud Expo, moderated by Conference Chair Roger Strukhoff, paneli...
SYS-CON Events announced today that NetApp has been named “Bronze Sponsor” of SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. NetApp is the data authority for hybrid cloud. NetApp provides a full range of hybrid cloud data services that simplify management of applications and data across cloud and on-premises environments to accelerate digital transformation. Together with their partners, NetApp em...
Most of the time there is a lot of work involved to move to the cloud, and most of that isn't really related to AWS or Azure or Google Cloud. Before we talk about public cloud vendors and DevOps tools, there are usually several technical and non-technical challenges that are connected to it and that every company needs to solve to move to the cloud. In his session at 21st Cloud Expo, Stefano Bellasio, CEO and founder of Cloud Academy Inc., will discuss what the tools, disciplines, and cultural...
What is the best strategy for selecting the right offshore company for your business? In his session at 21st Cloud Expo, Alan Winters, U.S. Head of Business Development at MobiDev, will discuss the things to look for - positive and negative - in evaluating your options. He will also discuss how to maximize productivity with your offshore developers. Before you start your search, clearly understand your business needs and how that impacts software choices.
SYS-CON Events announced today that Interface Corporation will exhibit at the Japan External Trade Organization (JETRO) Pavilion at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Interface Corporation is a company developing, manufacturing and marketing high quality and wide variety of industrial computers and interface modules such as PCIs and PCI express. For more information, visit http://www.i...
SYS-CON Events announced today that Keisoku Research Consultant Co. will exhibit at the Japan External Trade Organization (JETRO) Pavilion at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Keisoku Research Consultant, Co. offers research and consulting in a wide range of civil engineering-related fields from information construction to preservation of cultural properties. For more information, vi...
SYS-CON Events announced today that MIRAI Inc. will exhibit at the Japan External Trade Organization (JETRO) Pavilion at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. MIRAI Inc. are IT consultants from the public sector whose mission is to solve social issues by technology and innovation and to create a meaningful future for people.
SYS-CON Events announced today that Fusic will exhibit at the Japan External Trade Organization (JETRO) Pavilion at SYS-CON's 21st International Cloud Expo®, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. Fusic Co. provides mocks as virtual IoT devices. You can customize mocks, and get any amount of data at any time in your test. For more information, visit https://fusic.co.jp/english/.
SYS-CON Events announced today that N3N will exhibit at SYS-CON's @ThingsExpo, which will take place on Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. N3N’s solutions increase the effectiveness of operations and control centers, increase the value of IoT investments, and facilitate real-time operational decision making. N3N enables operations teams with a four dimensional digital “big board” that consolidates real-time live video feeds alongside IoT sensor data a...
Mobile device usage has increased exponentially during the past several years, as consumers rely on handhelds for everything from news and weather to banking and purchases. What can we expect in the next few years? The way in which we interact with our devices will fundamentally change, as businesses leverage Artificial Intelligence. We already see this taking shape as businesses leverage AI for cost savings and customer responsiveness. This trend will continue, as AI is used for more sophistica...
Today most companies are adopting or evaluating container technology - Docker in particular - to speed up application deployment, drive down cost, ease management and make application delivery more flexible overall. As with most new architectures, this dream takes significant work to become a reality. Even when you do get your application componentized enough and packaged properly, there are still challenges for DevOps teams to making the shift to continuous delivery and achieving that reducti...
Real IoT production deployments running at scale are collecting sensor data from hundreds / thousands / millions of devices. The goal is to take business-critical actions on the real-time data and find insights from stored datasets. In his session at @ThingsExpo, John Walicki, Watson IoT Developer Advocate at IBM Cloud, will provide a fast-paced developer journey that follows the IoT sensor data from generation, to edge gateway, to edge analytics, to encryption, to the IBM Bluemix cloud, to Wa...
Enterprises are moving to the cloud faster than most of us in security expected. CIOs are going from 0 to 100 in cloud adoption and leaving security teams in the dust. Once cloud is part of an enterprise stack, it’s unclear who has responsibility for the protection of applications, services, and data. When cloud breaches occur, whether active compromise or a publicly accessible database, the blame must fall on both service providers and users. In his session at 21st Cloud Expo, Ben Johnson, C...
SYS-CON Events announced today that Massive Networks, that helps your business operate seamlessly with fast, reliable, and secure internet and network solutions, has been named "Exhibitor" of SYS-CON's 21st International Cloud Expo ®, which will take place on Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. As a premier telecommunications provider, Massive Networks is headquartered out of Louisville, Colorado. With years of experience under their belt, their team of...
21st International Cloud Expo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Me...