Date post: | 30-Dec-2015 |
Category: |
Documents |
Upload: | piers-henderson |
View: | 223 times |
Download: | 0 times |
telling the right storyConfidential © Bloor Research 2013
Why are devices so important? How we got here....
telling the right storyConfidential © Bloor Research 2013
Device proliferation
Sources: IMS Research, Cisco
2020
2012
7.6
7.1
28
9.6
Internet-connected devices World population
Billions
telling the right storyConfidential © Bloor Research 2013
Personal vs corporate devices
Overall, 62% use their personal devices for work, but only 28% claim that their IT department is aware
Government and NFP
Creative
Pharmaceutical and healthcare
Finance and accounting
Legal and professional
71
48
28
11
8
29
52
72
89
92
Do you use your own device for work?
Yes No
Source: Workshare
telling the right storyConfidential © Bloor Research 2013
Need for access on the move
78
35
88
33
Use of file sharing platforms
Use finance Authorised to use finance Use legal Authorised to use legal
81% employees access work documents on the move, 69% use free file sharing platforms overall
Source: Workshare
telling the right storyConfidential © Bloor Research 2013
“Bring your own app”
2008 - 2011 2012 2013
37
83
165
4682
Yearly in billions Cumulative in billions
Source: Portio Research
telling the right storyConfidential © Bloor Research 2013
Emerging technologies useful for work?
Internet-enabled TV
Internet-connected cars
Internet-enabled gaming consoles
Google Glass and wearable technologies such as smart watches
21
38
48
50
How long will this take to happen?16% say immediately, 33% say when costs come down.
Just 8% say such technologies will not become widespread.
Source: Fortinet
telling the right storyConfidential © Bloor Research 2013
Where does this leave us?
In a security mess—sensitive data resides on a mass of devices, many of which lack appropriate security controls.
Blindsided—unable to see all the devices, endpoints, users and applications and resources on the network they are connected to.
Struggling to keep up—productivity declines if access cannot be granted and controlled effectively.
telling the right storyConfidential © Bloor Research 2013
What is needed?
VISIBILITY over:Who the users are—their profile, their role
What devices they are using—and where they are and what apps they are using for context-based access decisions
What network systems are affected
The information security risk in terms of overall operational risk
Policy enforcement