|By Marketwired .||
|July 23, 2014 08:17 AM EDT||
SAN JOSE, CA -- (Marketwired) -- 07/23/14 -- The Information Security Community on LinkedIn, an online community of more than 200,000 information security professionals, and Vectra Networks, the leading innovator in real-time detection of in-progress cyber-attacks, today announced the results of the second annual "BYOD & Mobile Security Study" highlighting the state of BYOD and mobile security in 2014.
The study found that nearly half of respondents agreed that users bringing downloaded apps or content with embedded security exploits into their organization, as well as malware infections, are top BYOD security concerns. In addition, 60 percent of respondents said that malware protection is a requirement for mobile security.
The BYOD & Mobile Security Study was independently conducted by the Information Security Community on LinkedIn. This second edition study collected responses from more than 1,100 IT security practitioners to gain a deeper understanding into the practices, usage and security concerns around BYOD.
"Loss of company or client data, followed by unauthorized access to company data and systems are well publicized as security threats around BYOD, and they were respondents' biggest security concerns in our 2014 study," said Holger Schulze, founder of the 200,000+ member Information Security Community on LinkedIn. "But it is very interesting that the study revealed that respondents' next biggest security concerns were users bringing downloaded apps or content with embedded security exploits into their organization (47 percent), followed by malware infections (45 percent)."
A copy of the study can be found at http://vectranetworks.hs-sites.com/byod-and-mobile-security.
Additional key findings of the study include:
- According to respondents, only 21 percent of their organizations have fully implemented BYOD policies, processes and infrastructure. In addition, 24 percent of respondents' organizations have no mobile device policy. Along these same lines, 21 percent of respondents said that privately owned devices are widely in use in their organizations, but are not supported within their organizations.
- While accessing email, calendar and contacts is the most popular usage for BYOD devices (86 percent), other business apps and data are also being routinely accessed by BYOD devices. Study respondents said document access and editing apps are used 45 percent of the time; Sharepoint and Intranet access happens 41 percent of the time; and apps for file sharing and company-built applications are accessed 34 percent of the time.
- When it comes to sensitive data and intellectual property being accessed over BYOD, respondents were most concerned with protecting business data (74 percent), customer/employee data (69 percent), and documents (66 percent).
- According to respondents, the most popular tool to monitor and manage mobile devices was mobile device management (MDM), in use at 43 percent of respondents' organizations, followed by endpoint security tools (39 percent), and Network Access Controls (38 percent). Similarly, the most common risk control measures for mobile devices were password protection (67 percent), followed by remote wiping of data (52 percent), and use of encryption (43 percent).
Significant data in the report is that 21 percent of organizations who acknowledge broad use of privately owned devices, for which no support exists within their organizations. Malware threats are already being carried into the organization on these unmanaged privately owned devices.
"BYOD and mobility create a significant security risk that we have observed in production networks," said Mike Banic, Vectra Networks VP of Marketing. "Traditional perimeter security has no way of stopping this malware vector into organizations' networks, and the Vectra X-Series platform is already meeting this critical need for organizations."
About the LinkedIn Information Security Community
With more than 200,000 members, the Information Security Community on LinkedIn is the largest online network of infosec professionals in the industry. Covered topics include compliance, encryption, anti-virus, malware, cloud security, data protection, hacking, network security, virtualization, and more. For more information, visit: https://www.linkedin.com/groups?gid=38412
About Vectra Networks
Vectra Networks is the leading innovator in real-time detection of in-progress cyber-attacks. Vectra delivers continuous automated cyber-attack detection and reporting that instantly identifies attacks while they are happening and describes what the attacker is doing. Vectra automatically prioritizes attacks that pose the greatest business risk, enabling organizations to quickly make decisions on where to focus their time and resources. Vectra Networks' investors include Khosla Ventures, IA Ventures and AME Cloud Ventures. The company's headquarters are in San Jose, Calif. More information can be found at www.vectranetworks.com.
Vectra Networks is a registered trademark of Vectra Networks in the United States and other countries. All other brands, products, or service names are or may be trademarks or service marks of their respective owners.
Container technology is sending shock waves through the world of cloud computing. Heralded as the 'next big thing,' containers provide software owners a consistent way to package their software and dependencies while infrastructure operators benefit from a standard way to deploy and run them. Containers present new challenges for tracking usage due to their dynamic nature. They can also be deployed to bare metal, virtual machines and various cloud platforms. How do software owners track the usag...
Aug. 5, 2015 07:00 AM EDT Reads: 297
In their session at 17th Cloud Expo, Hal Schwartz, CEO of Secure Infrastructure & Services (SIAS), and Chuck Paolillo, CTO of Secure Infrastructure & Services (SIAS), provide a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. In his role as CEO of Secure Infrastructure & Services (SIAS), Hal Schwartz provides leadership and direction for the company.
Aug. 4, 2015 06:45 PM EDT Reads: 242
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. In his session at 15th Cloud Expo, Michael Meiner, an Engineering Director at Oracle, Corporation, analyzed a range of cloud offerings (IaaS, PaaS, SaaS) and discussed the benefits/challenges of migrating to each offe...
Aug. 4, 2015 06:45 PM EDT Reads: 220
SYS-CON Events announced today that the "Second Containers & Microservices Expo" will take place November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities.
Aug. 4, 2015 05:30 PM EDT Reads: 103
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his session at 17th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Partnerships at Com...
Aug. 4, 2015 05:00 PM EDT Reads: 112
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
Aug. 4, 2015 03:00 PM EDT Reads: 576
Scrum Alliance has announced the release of its 2015 State of Scrum Report. Almost 5,000 individuals and companies worldwide participated in this year's survey. Most organizations in the market today are still leading and managing under an Industrial Age model. Not only is the speed of change growing exponentially, Agile and Scrum frameworks are showing companies how to draw on the full talents and capabilities of those doing the work in order to continue innovating for success.
Aug. 4, 2015 02:45 PM EDT
SYS-CON Events announced today that MobiDev, a software development company, will exhibit at the 17th International Cloud Expo®, which will take place November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software development company with representative offices in Atlanta (US), Sheffield (UK) and Würzburg (Germany); and development centers in Ukraine. Since 2009 it has grown from a small group of passionate engineers and business managers to a full-scale mobi...
Aug. 4, 2015 02:00 PM EDT Reads: 395
Between the compelling mockups and specs produced by your analysts and designers, and the resulting application built by your developers, there is a gulf where projects fail, costs spiral out of control, and applications fall short of requirements. In his session at @DevOpsSummit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, presented a new approach where business and development users collaborate – each using tools appropriate to their goals and expertise – to build mocku...
Aug. 4, 2015 01:30 PM EDT Reads: 105
SYS-CON Events announced today that VividCortex, the monitoring solution for the modern data system, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. The database is the heart of most applications, but it’s also the part that’s hardest to scale, monitor, and optimize even as it’s growing 50% year over year. VividCortex is the first unified suite of database monitoring tools specifically desi...
Aug. 4, 2015 12:00 PM EDT Reads: 117
Graylog, Inc., has added the capability to collect, centralize and analyze application container logs from within Docker. The Graylog logging driver for Docker addresses the challenges of extracting intelligence from within Docker containers, where most workloads are dynamic and log data is not persisted or stored. Using Graylog, DevOps and IT Ops teams can pinpoint the root cause of problems to deliver new applications faster and minimize downtime.
Aug. 4, 2015 11:45 AM EDT
As Marc Andreessen says software is eating the world. Everything is rapidly moving toward being software-defined – from our phones and cars through our washing machines to the datacenter. However, there are larger challenges when implementing software defined on a larger scale - when building software defined infrastructure. In his session at 16th Cloud Expo, Boyan Ivanov, CEO of StorPool, provided some practical insights on what, how and why when implementing "software-defined" in the datacent...
Aug. 4, 2015 11:30 AM EDT Reads: 125
Learn how you can use the CoSN SEND II Decision Tree for Education Technology to make sure that your K–12 technology initiatives create a more engaging learning experience that empowers students, teachers, and administrators alike.
Aug. 4, 2015 09:30 AM EDT Reads: 123
Mobile, social, Big Data, and cloud have fundamentally changed the way we live. “Anytime, anywhere” access to data and information is no longer a luxury; it’s a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver meaningful services to the business and customers.
Aug. 4, 2015 08:45 AM EDT Reads: 265
In a recent research, analyst firm IDC found that the average cost of a critical application failure is $500,000 to $1 million per hour and the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year for Fortune 1000 companies. In addition to the findings on the cost of the downtime, the research also highlighted best practices for development, testing, application support, infrastructure, and operations teams.
Aug. 4, 2015 07:00 AM EDT Reads: 229