|By Marketwired .||
|July 19, 2016 11:00 AM EDT|
NEW YORK, NEW YORK -- (Marketwired) -- 07/19/16 -- BLACKBERRY SECURITY SUMMIT - A new global research initiative conducted by BlackBerry Limited (NASDAQ:BBRY)(TSX:BB), a global leader in secure mobile communications, finds that despite extensive resources dedicated to mobile security, many IT decision-makers remain concerned about the level of vulnerabilities that persist. The study surveyed 1,000 executives from seven countries across a wide range of vertical industries, including financial services, government and healthcare.
The survey reveals that 73 percent of organizations have a mobile security strategy in place, but only three percent say they have implemented the highest levels of security possible. This is in part because of user attitudes - 82 percent of the executives admit mobile security precautions cause at least some frustration among employees, and potentially hinder productivity. Overall, 44 percent fear that too much mobile security will prevent employees from doing their job.
This fear of implementing a stronger mobile environment led to a startling majority, 86 percent, of executives who said they are worried about the level of protection for their organization with half saying they will experience more security breaches through mobile devices. Part of the reason organizations are opening themselves up to these risks is because of the growing trend of BYOD - where despite the popularity, almost half believe that supporting a BYOD policy is a risk. A critical element to a successful BYOD or COPE (corporate owned, personally enabled) mobile environment is ensuring the isolation and separation of personal and business mobile data, also known as containerization. However, nearly 45 percent have no containerization technology in place.
"The frequency and severity of malicious attacks have made mobile security the center of attention for CEOs and boards of directors, but doing enough to mitigate risk is still a persistent problem that needs to be solved. This is especially true as the constant adoption of new technologies regularly brings the potential for new vulnerabilities, which can offset the benefits," said David Kleidermacher, Chief Security Officer at BlackBerry. "We have also heard many of our customers say that security policies can be perceived as a hindrance. However, senior executives in every function, and even in the boardroom, need to forcefully communicate that effective mobile security enhances productivity instead of obstructing it."
The research also uncovered that nearly half of organizations do not have a Security Incident Response Team (SIRT) in place, despite the fact that SIRT is an industry best practice to reduce the cost of data breaches. IT decision-makers also want and seek outside help when it comes to securing their mobile environments. Of those surveyed, 59 percent report that external expertise is the best option for reviewing mobile practices.
The numbers are just as pronounced and even more so when analyzing specific industries:
-- Only around four in ten respondents' organizations have a mobile device management strategy in place. Of these respondents, many felt their organization's mobile device security strategy is not good enough, specifically: -- Financial services: 44 percent -- Government: 52 percent -- Healthcare: 37 percent -- Legal: 54 percent -- Overall, 47 percent believe that popular BYOD policies leave the company vulnerable to too many risks, and those concerns are reflected in different sectors: -- Financial services: 55 percent -- Healthcare: 50 percent -- Government: 43 percent -- Legal: 53 percent -- Seventy-three percent see mobile security controls as either an "obstruction" or a "complete obstruction," and the problems are even worse in some industries: -- Financial services: 78 percent -- Healthcare: 78 percent -- Government: 85 percent -- Legal: 94 percent
However, there is general agreement that a strong mobile security posture can offer great benefits:
-- 67 percent say their data is more secure -- 64 percent see increased mobility for employees -- 51 percent have experienced fewer security breaches -- 50 percent find it easier to comply with regulations -- Enhanced compliance is a benefit for financial services (55 percent), healthcare (54 percent) and IT/computer services (65 percent)
"All mobile security policies must be consistently evaluated and tweaked, but also regularly overhauled," added Kleidermacher. "BlackBerry recognizes that security is a dynamic field, and even the best defensive strategies and technologies today may be inadequate tomorrow. Therefore, the optimal strategy is one that secures the mobile enterprise while boosting convenience and productivity, and can then be adapted to combat new vulnerabilities as they arise. BlackBerry continues to integrate key capabilities into its enterprise software portfolio to provide organizations the flexibility they need as they use mobility to empower IT decision makers and employees."
BlackBerry was the first mobile technology company to develop a comprehensive SIRT program and is now offering incident response management services and best practices assessment to help businesses implement important risk management functions rapidly and cost effectively. For information about BlackBerry's professional security services go to http://us.blackberry.com/enterprise/professional-services.html.
For more information on BlackBerry's enterprise software portfolio, visit www.blackberry.com/enterprise.
To follow the news at the annual BlackBerry Security Summit today, use #BBSecurity and read more at www.InsideBlackBerry.com.
The survey was conducted in April and May of 2016 by Vanson Bourne and commissioned by BlackBerry. It interviewed 1,000 IT decision makers across the United States, United Kingdom, France, Germany, India, Singapore and Australia. Industries analyzed in this survey include financial services, legal, healthcare government, IT/computer services, manufacturing and more. All organizations have between 100 and 1,000 employees.
BlackBerry is securing a connected world, delivering innovative solutions across the entire mobile ecosystem and beyond. We secure the world's most sensitive data across all end points - from cars to smartphones - making the mobile-first enterprise vision a reality. Founded in 1984 and based in Waterloo, Ontario, BlackBerry operates offices in North America, Europe, Middle East and Africa, Asia Pacific and Latin America. The Company trades under the ticker symbols "BB" on the Toronto Stock Exchange and "BBRY" on the NASDAQ. For more information, visit www.BlackBerry.com.
BlackBerry and related trademarks, names and logos are the property of BlackBerry Limited and are registered and/or used in the U.S. and countries around the world. All other marks are the property of their respective owners. BlackBerry is not responsible for any third-party products or services.
Join IBM November 2 at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA, and learn how to go beyond multi-speed it to bring agility to traditional enterprise applications. Technology innovation is the driving force behind modern business and enterprises must respond by increasing the speed and efficiency of software delivery. The challenge is that existing enterprise applications are expensive to develop and difficult to modernize. This often results in what Gartner calls ...
Apr. 25, 2017 04:30 AM EDT Reads: 2,943
SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in compute, storage and networking technologies, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology, is a premier provider of advanced server Building Block Solutions® for Data Center, Cloud Computing, Enterprise IT, Hadoop/...
Apr. 25, 2017 04:30 AM EDT Reads: 1,961
Amazon has gradually rolled out parts of its IoT offerings in the last year, but these are just the tip of the iceberg. In addition to optimizing their back-end AWS offerings, Amazon is laying the ground work to be a major force in IoT – especially in the connected home and office. Amazon is extending its reach by building on its dominant Cloud IoT platform, its Dash Button strategy, recently announced Replenishment Services, the Echo/Alexa voice recognition control platform, the 6-7 strategic...
Apr. 25, 2017 04:15 AM EDT Reads: 4,964
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
Apr. 25, 2017 04:15 AM EDT
@GonzalezCarmen has been ranked the Number One Influencer and @ThingsExpo has been named the Number One Brand in the “M2M 2016: Top 100 Influencers and Brands” by Analytic. Onalytica analyzed tweets over the last 6 months mentioning the keywords M2M OR “Machine to Machine.” They then identified the top 100 most influential brands and individuals leading the discussion on Twitter.
Apr. 25, 2017 03:45 AM EDT Reads: 743
With billions of sensors deployed worldwide, the amount of machine-generated data will soon exceed what our networks can handle. But consumers and businesses will expect seamless experiences and real-time responsiveness. What does this mean for IoT devices and the infrastructure that supports them? More of the data will need to be handled at - or closer to - the devices themselves.
Apr. 25, 2017 03:45 AM EDT Reads: 107
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists will examine how DevOps helps to meet th...
Apr. 25, 2017 03:45 AM EDT Reads: 873
Building a cross-cloud operational model can be a daunting task. Per-cloud silos are not the answer, but neither is a fully generic abstraction plane that strips out capabilities unique to a particular provider. In his session at 20th Cloud Expo, Chris Wolf, VP & Chief Technology Officer, Global Field & Industry at VMware, will discuss how successful organizations approach cloud operations and management, with insights into where operations should be centralized and when it’s best to decentraliz...
Apr. 25, 2017 03:30 AM EDT Reads: 125
Judith Hurwitz is president and CEO of Hurwitz & Associates, a Needham, Mass., research and consulting firm focused on emerging technology, including big data, cognitive computing and governance. She is co-author of the book Cognitive Computing and Big Data Analytics, published in 2015. Her Cloud Expo session, "What Is the Business Imperative for Cognitive Computing?" is scheduled for Wednesday, June 8, at 8:40 a.m. In it, she puts cognitive computing into perspective with its value to the busin...
Apr. 25, 2017 03:30 AM EDT Reads: 3,549
Five years ago development was seen as a dead-end career, now it’s anything but – with an explosion in mobile and IoT initiatives increasing the demand for skilled engineers. But apart from having a ready supply of great coders, what constitutes true ‘DevOps Royalty’? It’ll be the ability to craft resilient architectures, supportability, security everywhere across the software lifecycle. In his keynote at @DevOpsSummit at 20th Cloud Expo, Jeffrey Scheaffer, GM and SVP, Continuous Delivery Busine...
Apr. 25, 2017 03:15 AM EDT Reads: 487
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor – all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
Apr. 25, 2017 03:15 AM EDT Reads: 8,786
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Apr. 25, 2017 03:00 AM EDT Reads: 5,809
SYS-CON Events announced today that Juniper Networks (NYSE: JNPR), an industry leader in automated, scalable and secure networks, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Juniper Networks challenges the status quo with products, solutions and services that transform the economics of networking. The company co-innovates with customers and partners to deliver automated, scalable and secure network...
Apr. 25, 2017 02:15 AM EDT Reads: 863
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
Apr. 25, 2017 02:15 AM EDT Reads: 9,005
Everyone wants to use containers, but monitoring containers is hard. New ephemeral architecture introduces new challenges in how monitoring tools need to monitor and visualize containers, so your team can make sense of everything. In his session at @DevOpsSummit, David Gildeh, co-founder and CEO of Outlyer, will go through the challenges and show there is light at the end of the tunnel if you use the right tools and understand what you need to be monitoring to successfully use containers in your...
Apr. 25, 2017 01:30 AM EDT Reads: 1,846