Presentation on theme: "1 Fortinet Confidential 1 T I T R E Fortinet 2013 Global Survey."— Presentation transcript:
1 Fortinet Confidential 1 T I T R E Fortinet 2013 Global Survey
2 Fortinet Confidential Methodology Survey company: Vision Critical (Independent third party – UK based) Respondents: Worldwide survey conducted in 20 territories in October ,200+ active employees in full time employment aged 21 to 32 University graduate level individuals Owners of personal smartphones, tablets or laptops
3 BYOD State of Play 1 Bring Your Own Cloud 2 Agenda Emerging Technologies 3 Threat Literacy and Impact 4
4 Status on Corporate BYOD Policy According to survey, over half of organizations have a BYOD policy in place today, with the majority allowing the use of personal devices at work WorldwideUSEMEA Yes, my organization has a policy which prevents the use of personal devices at work 19%17%18% Yes, my organization has a policy that allows the use of personal devices at work 32%29%35% Does your organization have a corporate policy governing the use of personal devices at work?
5 Over half of respondents around the world are ready to contravene company policy banning BYOD If your employer has / had a policy that prohibits the use of personal mobile devices in the work environment or for work purposes, have / would you ever go against this policy? Corporate Policy Contravention
6 If your employer has / had a policy that prohibits the use of personal cloud applications such as Google Docs, Dropbox and Skype in the work environment or for work purposes, have / would you ever go against this policy? Corporate Policy Contravention
7 If your employer has / had a policy that prohibits the use of Emerging Connected Technologies such as Internet enabled cars, gaming consoles and wearable gear such as Google Glass or smart watches in the work environment or for work purposes, have / would you ever go against this policy? Corporate Policy Contravention
8 BYOD State of Play 2 Bring Your Own Cloud 1 Agenda Emerging Technologies 3 Threat Literacy and Impact 4
9 Use of Personal Cloud Services for Work Purposes Which cloud data services do you have your personal account for and ever used for work purposes?
10 Fortinet Confidential Level of Trust in Cloud Services How much do you trust the cloud with storing your personal data? Almost one third of the cloud storage users sampled fully trust the cloud for storing their personal data, with only 6% citing aversion through lack of trust
11 Business Data Evasion What types of work related data/information do you store in your personal cloud services? Only 13% of all respondents who have a personal cloud account(s) do not store business-related information on that (those) account(s)
12 BYOD State of Play 3 Bring Your Own Cloud 1 Agenda Emerging Technologies 2 Threat Literacy and Impact 4
13 Fortinet Confidential Business Use of Connected Technologies Which of the following devices you own or might own in the future do you think will become useful for your work? Strong trend for wearable technologies to enter the workplace with half of total respondents willing to use them at work
14 Adoption of Wearable Technology at Work Broad consensus on the adoption of wearable technology at work with 16% (19% in Italy) expecting immediate adoption When do you think wearable technology will be in widespread use in your workspace?
15 BYOD State of Play 4 Bring Your Own Cloud 1 Agenda Emerging Technologies 3 Threat Literacy and Impact 2
16 I understand each of the following words and phrases: Threat Literacy 3 out 4 respondents do not fully comprehend terms like APTs, DDoS, Botnets and Farming
17 Fortinet Confidential Device Vulnerability To your knowledge, which (if any) of your personal devices have been compromised by third party cyber activity, e.g. computer viruses, malware etc? Globally, 59% of Gen-Y employees computers and 53% of their laptops have been compromised. Globally, 19% of users tables and smartphones have been compromised.
18 Educating on Threat Landscape Do you feel you have any obligation to understand the security risks posed to your organization by the use of your own devices in work, or for work? Almost all respondents agree that they have an obligation to understand the security risks posed by using their own devices