SlideShare una empresa de Scribd logo
1 de 1
Descargar para leer sin conexión
from pain to empowerment

An IDC Infographic, sponsored by Blue Coat

Era Before Security

Era of Pain

Era of Obtrusive Security

Era of Empowerment

2016

1999
Not Much Online Commerce,
Not Much thinking
About Security

Web commerce grows;
hackers take notice,
mischief turns to theft

Cloud, mobile and
consumerization disrupt IT.
Security empowers business.

Enterprises lock-down
infrastructures.
Breaches mount.

Web grows as a top threat source
1999 Worldwide PC shipments

$20 million

1999 Worldwide Security Software

$3.8 Billion

Security submarkets
tracked by IDC 1999
Antiviral, Firewall, Encryption, Security AAA

$371.1 million
2012 Worldwide Security Software

$19.3 Billion

Security submarkets
tracked by IDC 2013
Identity and access management;
Advanced authentication; Web single
sign-on; Enterprise single sign-on; Legacy
authorization; User provisioning; Personal
portable security devices; Software
licensing authentication token; Unified
threat management; Intrusion detection
and prevention; Virtual private network;
Security and vulnerability management;
Security information and event
management; Proactive endpoint risk
management; Forensics and incident
investigation; Security device and systems
management; Vulnerability assessment...

Top security challenges facing large
enterprises over the next 12 months

Worldwide E-Commerce
Spending (B2B & B2C) $B

2012 Worldwide PC shipments

$6,884B

8000
7000
Code Red
costs top
$2B

6000
5000

Slammer Worm
infects an
estimated 150,000
to 200,000 servers
worldwide

EMPLOYEE
USE OF
WEB 2.0

DIFFICULTY
SECURING
WEB APPS

45%
45%
41%

4000

DataLossDB.org incidents
2004-2007
644

2000

774

2007

Complexity of security solutions
Increasing sophistication of attacks
Increasing volume of threats and/or attacks

2008

2009

2010

53%
61%
63%

43

0
2000

2001

2002

2003

2004

Yes

157
2005

55%
2006

2007

No

45%

Does your organization
have a formal documented
security policy?

$67B
$29B
2012

Yes

No
35%

659

65%

2008
Which if any of the following is your
company currently using/likely to purchase
or implement during the next 12 months?

37%

IT-CONTROLLED

BYOD

2011

$357.4B

1000

63%

Worldwide cloud revenue ($B)

Top rated enterprise security challenges
(a five year comparison)

I LOVE YOU
Emerges

3000

64%

60%

How would you describe your
mobile device environment?

Data loss prevention: 62%
Network Admission Control: 57%
Employee Monitoring Solutions: 57%

Any potential security
risks cloud computing
or SaaS introduce are
far outweighed by the
benefits.

2013

2014

2015

SMARTPHONE
SHIPMENTS (M)

45%
33%
22%

AGREE
DISAGREE
NEUTRAL

2016

1,161
63%
23%
14%

Employees using personal
smartphones at work
understand the risks, and
are aware of security proper
security practices.

Más contenido relacionado

La actualidad más candente

Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWebinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWultra
 
Distil Networks Protecting the Telephony Industry
Distil Networks Protecting the Telephony IndustryDistil Networks Protecting the Telephony Industry
Distil Networks Protecting the Telephony IndustryPaul Hobbs
 
What retailers want you to know about data security
What retailers want you to know about data securityWhat retailers want you to know about data security
What retailers want you to know about data securityNational Retail Federation
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in ITAnushka Perera
 
45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutionsRasool Irfan
 
Digital workplace security for gen z
Digital workplace security for gen zDigital workplace security for gen z
Digital workplace security for gen zRasool Irfan
 
Mobile security trends
Mobile security trendsMobile security trends
Mobile security trendsKen Huang
 
12 Top Talks from the 2016 R-CISC Summit
12 Top Talks from the 2016 R-CISC Summit12 Top Talks from the 2016 R-CISC Summit
12 Top Talks from the 2016 R-CISC SummitTripwire
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyAgus Wicaksono
 
Idwg bimonthly security exchange cyber only section
Idwg bimonthly security exchange cyber only sectionIdwg bimonthly security exchange cyber only section
Idwg bimonthly security exchange cyber only sectionErnest Staats
 
Lack of attention to security by social media players cause for concern, Gart...
Lack of attention to security by social media players cause for concern, Gart...Lack of attention to security by social media players cause for concern, Gart...
Lack of attention to security by social media players cause for concern, Gart...Arun Shankar
 
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 minsCyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 minsINKPPT
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloudUlf Mattsson
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsForeScout Technologies
 
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Cristian Garcia G.
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response ConferenceDavid Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response ConferenceStarttech Ventures
 
Palo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPalo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPaloAltoNetworks
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilienceAndrew Bycroft
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 

La actualidad más candente (20)

Webinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking AppsWebinar: Securing Mobile Banking Apps
Webinar: Securing Mobile Banking Apps
 
Distil Networks Protecting the Telephony Industry
Distil Networks Protecting the Telephony IndustryDistil Networks Protecting the Telephony Industry
Distil Networks Protecting the Telephony Industry
 
What retailers want you to know about data security
What retailers want you to know about data securityWhat retailers want you to know about data security
What retailers want you to know about data security
 
Policies and Law in IT
Policies and Law in ITPolicies and Law in IT
Policies and Law in IT
 
45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions
 
Digital workplace security for gen z
Digital workplace security for gen zDigital workplace security for gen z
Digital workplace security for gen z
 
Mobile security trends
Mobile security trendsMobile security trends
Mobile security trends
 
12 Top Talks from the 2016 R-CISC Summit
12 Top Talks from the 2016 R-CISC Summit12 Top Talks from the 2016 R-CISC Summit
12 Top Talks from the 2016 R-CISC Summit
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
Idwg bimonthly security exchange cyber only section
Idwg bimonthly security exchange cyber only sectionIdwg bimonthly security exchange cyber only section
Idwg bimonthly security exchange cyber only section
 
Lack of attention to security by social media players cause for concern, Gart...
Lack of attention to security by social media players cause for concern, Gart...Lack of attention to security by social media players cause for concern, Gart...
Lack of attention to security by social media players cause for concern, Gart...
 
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 minsCyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
 
Emerging application and data protection for multi cloud
Emerging application and data protection for multi cloudEmerging application and data protection for multi cloud
Emerging application and data protection for multi cloud
 
SC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey ResultsSC Magazine & ForeScout Survey Results
SC Magazine & ForeScout Survey Results
 
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response ConferenceDavid Derigiotis, 2nd Cyber Insurance & Incident Response Conference
David Derigiotis, 2nd Cyber Insurance & Incident Response Conference
 
Palo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity PredictionsPalo Alto Networks 2016 Cybersecurity Predictions
Palo Alto Networks 2016 Cybersecurity Predictions
 
Journey to cyber resilience
Journey to cyber resilienceJourney to cyber resilience
Journey to cyber resilience
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 

Similar a Infography "Security: from pain to empowerment"

IDC - Security : From Pain To Empowerment
IDC - Security : From Pain To EmpowermentIDC - Security : From Pain To Empowerment
IDC - Security : From Pain To EmpowermentBee_Ware
 
2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? 2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? XNSPY
 
Key Cybersecurity trends that defined the threat landscape in 2022
Key Cybersecurity trends that defined the threat landscape in 2022Key Cybersecurity trends that defined the threat landscape in 2022
Key Cybersecurity trends that defined the threat landscape in 2022ProcessIT Global
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Javier Gonzalez
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022ManviShukla4
 
The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022Bernard Marr
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2SHOLOVE INTERNATIONAL LLC
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the CloudGGV Capital
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerceSensePost
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
Netop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security VulnerabilitiesSiemplify
 
Protecting Businesses with Top Cybersecurity Companies.pptx
Protecting Businesses with Top Cybersecurity Companies.pptxProtecting Businesses with Top Cybersecurity Companies.pptx
Protecting Businesses with Top Cybersecurity Companies.pptxSonaliG6
 

Similar a Infography "Security: from pain to empowerment" (20)

IDC - Security : From Pain To Empowerment
IDC - Security : From Pain To EmpowermentIDC - Security : From Pain To Empowerment
IDC - Security : From Pain To Empowerment
 
2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year? 2021 Cybersecurity Recap: How Did We Fare Last Year?
2021 Cybersecurity Recap: How Did We Fare Last Year?
 
Key Cybersecurity trends that defined the threat landscape in 2022
Key Cybersecurity trends that defined the threat landscape in 2022Key Cybersecurity trends that defined the threat landscape in 2022
Key Cybersecurity trends that defined the threat landscape in 2022
 
cyber security
cyber securitycyber security
cyber security
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0Mobile malware and enterprise security v 1.2_0
Mobile malware and enterprise security v 1.2_0
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022Top 10 Cybersecurity Trends to Watch Out For in 2022
Top 10 Cybersecurity Trends to Watch Out For in 2022
 
The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022The Five Biggest Cyber Security Trends In 2022
The Five Biggest Cyber Security Trends In 2022
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
Sholove cyren web security - technical datasheet2
Sholove cyren web security  - technical datasheet2Sholove cyren web security  - technical datasheet2
Sholove cyren web security - technical datasheet2
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
 
Netop Remote Control Embedded Devices
Netop Remote Control Embedded DevicesNetop Remote Control Embedded Devices
Netop Remote Control Embedded Devices
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
Protecting Businesses with Top Cybersecurity Companies.pptx
Protecting Businesses with Top Cybersecurity Companies.pptxProtecting Businesses with Top Cybersecurity Companies.pptx
Protecting Businesses with Top Cybersecurity Companies.pptx
 

Más de Cedric Buisson

Mobile Malware report 2014 de Blue Coat
Mobile Malware report 2014 de Blue CoatMobile Malware report 2014 de Blue Coat
Mobile Malware report 2014 de Blue CoatCedric Buisson
 
Good Technology : Inforgraphy of the Mobility Index Report Q4 2013
Good Technology : Inforgraphy of the Mobility Index Report Q4 2013Good Technology : Inforgraphy of the Mobility Index Report Q4 2013
Good Technology : Inforgraphy of the Mobility Index Report Q4 2013Cedric Buisson
 
1ère édition du Baromètre Dashlane sur la protection des données personnelles
1ère édition du Baromètre Dashlane sur la protection des données personnelles1ère édition du Baromètre Dashlane sur la protection des données personnelles
1ère édition du Baromètre Dashlane sur la protection des données personnellesCedric Buisson
 
Infographie étude Dashlane "Achats de Noël : quand commander devient en ligne...
Infographie étude Dashlane "Achats de Noël : quand commander devient en ligne...Infographie étude Dashlane "Achats de Noël : quand commander devient en ligne...
Infographie étude Dashlane "Achats de Noël : quand commander devient en ligne...Cedric Buisson
 
Infographie : la bannière publicitaire classique contre le Native Advertising
Infographie : la bannière publicitaire classique contre le Native AdvertisingInfographie : la bannière publicitaire classique contre le Native Advertising
Infographie : la bannière publicitaire classique contre le Native AdvertisingCedric Buisson
 
Présentation Numbate « Les français et la publicité mobile »
Présentation Numbate « Les français et la publicité mobile »Présentation Numbate « Les français et la publicité mobile »
Présentation Numbate « Les français et la publicité mobile »Cedric Buisson
 
Etude Adyoulike/Ifop "Les français et la publicité en ligne"
Etude Adyoulike/Ifop "Les français et la publicité en ligne"Etude Adyoulike/Ifop "Les français et la publicité en ligne"
Etude Adyoulike/Ifop "Les français et la publicité en ligne"Cedric Buisson
 
Etude Dashlane/Ifop "La vigilance des Français face aux risques du numérique"
Etude Dashlane/Ifop "La vigilance des Français  face aux risques du numérique"Etude Dashlane/Ifop "La vigilance des Français  face aux risques du numérique"
Etude Dashlane/Ifop "La vigilance des Français face aux risques du numérique"Cedric Buisson
 
Etude Surikate / Gfk sur les comportement des utilisateurs d'iPhone au Royaum...
Etude Surikate / Gfk sur les comportement des utilisateurs d'iPhone au Royaum...Etude Surikate / Gfk sur les comportement des utilisateurs d'iPhone au Royaum...
Etude Surikate / Gfk sur les comportement des utilisateurs d'iPhone au Royaum...Cedric Buisson
 
Rapport annuel de Good sur le BYOD
Rapport annuel de Good sur le BYODRapport annuel de Good sur le BYOD
Rapport annuel de Good sur le BYODCedric Buisson
 
Profil des possesseurs d’équipements androïd
Profil des possesseurs d’équipements androïdProfil des possesseurs d’équipements androïd
Profil des possesseurs d’équipements androïdCedric Buisson
 
Etude Surikate/Ifop sur « le comportement des utilisateurs d’Android »
Etude Surikate/Ifop sur « le comportement des utilisateurs d’Android »Etude Surikate/Ifop sur « le comportement des utilisateurs d’Android »
Etude Surikate/Ifop sur « le comportement des utilisateurs d’Android »Cedric Buisson
 
Etude global télécom France 2012
Etude global télécom France 2012Etude global télécom France 2012
Etude global télécom France 2012Cedric Buisson
 
Les Français et la consommation Cross-canal, Etude Ifop pour Generix, septemb...
Les Français et la consommation Cross-canal, Etude Ifop pour Generix, septemb...Les Français et la consommation Cross-canal, Etude Ifop pour Generix, septemb...
Les Français et la consommation Cross-canal, Etude Ifop pour Generix, septemb...Cedric Buisson
 
Good q2 2012_data_report
Good q2 2012_data_reportGood q2 2012_data_report
Good q2 2012_data_reportCedric Buisson
 
Etude Rovi sur le comportement des consommateurs en matière de streaming en F...
Etude Rovi sur le comportement des consommateurs en matière de streaming en F...Etude Rovi sur le comportement des consommateurs en matière de streaming en F...
Etude Rovi sur le comportement des consommateurs en matière de streaming en F...Cedric Buisson
 
Etude Surikate sur iOS juin 2012
Etude Surikate sur iOS juin 2012Etude Surikate sur iOS juin 2012
Etude Surikate sur iOS juin 2012Cedric Buisson
 
Etude Good Technology / Ifop "vie privée et vie professionnelle des cadres"
Etude Good Technology / Ifop "vie privée et vie professionnelle des cadres"Etude Good Technology / Ifop "vie privée et vie professionnelle des cadres"
Etude Good Technology / Ifop "vie privée et vie professionnelle des cadres"Cedric Buisson
 
Rapport Good Technology Q1 2012
Rapport Good Technology Q1 2012Rapport Good Technology Q1 2012
Rapport Good Technology Q1 2012Cedric Buisson
 

Más de Cedric Buisson (20)

Mobile Malware report 2014 de Blue Coat
Mobile Malware report 2014 de Blue CoatMobile Malware report 2014 de Blue Coat
Mobile Malware report 2014 de Blue Coat
 
Good Technology : Inforgraphy of the Mobility Index Report Q4 2013
Good Technology : Inforgraphy of the Mobility Index Report Q4 2013Good Technology : Inforgraphy of the Mobility Index Report Q4 2013
Good Technology : Inforgraphy of the Mobility Index Report Q4 2013
 
1ère édition du Baromètre Dashlane sur la protection des données personnelles
1ère édition du Baromètre Dashlane sur la protection des données personnelles1ère édition du Baromètre Dashlane sur la protection des données personnelles
1ère édition du Baromètre Dashlane sur la protection des données personnelles
 
#RPCES2014
#RPCES2014#RPCES2014
#RPCES2014
 
Infographie étude Dashlane "Achats de Noël : quand commander devient en ligne...
Infographie étude Dashlane "Achats de Noël : quand commander devient en ligne...Infographie étude Dashlane "Achats de Noël : quand commander devient en ligne...
Infographie étude Dashlane "Achats de Noël : quand commander devient en ligne...
 
Infographie : la bannière publicitaire classique contre le Native Advertising
Infographie : la bannière publicitaire classique contre le Native AdvertisingInfographie : la bannière publicitaire classique contre le Native Advertising
Infographie : la bannière publicitaire classique contre le Native Advertising
 
Présentation Numbate « Les français et la publicité mobile »
Présentation Numbate « Les français et la publicité mobile »Présentation Numbate « Les français et la publicité mobile »
Présentation Numbate « Les français et la publicité mobile »
 
Etude Adyoulike/Ifop "Les français et la publicité en ligne"
Etude Adyoulike/Ifop "Les français et la publicité en ligne"Etude Adyoulike/Ifop "Les français et la publicité en ligne"
Etude Adyoulike/Ifop "Les français et la publicité en ligne"
 
Etude Dashlane/Ifop "La vigilance des Français face aux risques du numérique"
Etude Dashlane/Ifop "La vigilance des Français  face aux risques du numérique"Etude Dashlane/Ifop "La vigilance des Français  face aux risques du numérique"
Etude Dashlane/Ifop "La vigilance des Français face aux risques du numérique"
 
Etude Surikate / Gfk sur les comportement des utilisateurs d'iPhone au Royaum...
Etude Surikate / Gfk sur les comportement des utilisateurs d'iPhone au Royaum...Etude Surikate / Gfk sur les comportement des utilisateurs d'iPhone au Royaum...
Etude Surikate / Gfk sur les comportement des utilisateurs d'iPhone au Royaum...
 
Rapport annuel de Good sur le BYOD
Rapport annuel de Good sur le BYODRapport annuel de Good sur le BYOD
Rapport annuel de Good sur le BYOD
 
Profil des possesseurs d’équipements androïd
Profil des possesseurs d’équipements androïdProfil des possesseurs d’équipements androïd
Profil des possesseurs d’équipements androïd
 
Etude Surikate/Ifop sur « le comportement des utilisateurs d’Android »
Etude Surikate/Ifop sur « le comportement des utilisateurs d’Android »Etude Surikate/Ifop sur « le comportement des utilisateurs d’Android »
Etude Surikate/Ifop sur « le comportement des utilisateurs d’Android »
 
Etude global télécom France 2012
Etude global télécom France 2012Etude global télécom France 2012
Etude global télécom France 2012
 
Les Français et la consommation Cross-canal, Etude Ifop pour Generix, septemb...
Les Français et la consommation Cross-canal, Etude Ifop pour Generix, septemb...Les Français et la consommation Cross-canal, Etude Ifop pour Generix, septemb...
Les Français et la consommation Cross-canal, Etude Ifop pour Generix, septemb...
 
Good q2 2012_data_report
Good q2 2012_data_reportGood q2 2012_data_report
Good q2 2012_data_report
 
Etude Rovi sur le comportement des consommateurs en matière de streaming en F...
Etude Rovi sur le comportement des consommateurs en matière de streaming en F...Etude Rovi sur le comportement des consommateurs en matière de streaming en F...
Etude Rovi sur le comportement des consommateurs en matière de streaming en F...
 
Etude Surikate sur iOS juin 2012
Etude Surikate sur iOS juin 2012Etude Surikate sur iOS juin 2012
Etude Surikate sur iOS juin 2012
 
Etude Good Technology / Ifop "vie privée et vie professionnelle des cadres"
Etude Good Technology / Ifop "vie privée et vie professionnelle des cadres"Etude Good Technology / Ifop "vie privée et vie professionnelle des cadres"
Etude Good Technology / Ifop "vie privée et vie professionnelle des cadres"
 
Rapport Good Technology Q1 2012
Rapport Good Technology Q1 2012Rapport Good Technology Q1 2012
Rapport Good Technology Q1 2012
 

Infography "Security: from pain to empowerment"

  • 1. from pain to empowerment An IDC Infographic, sponsored by Blue Coat Era Before Security Era of Pain Era of Obtrusive Security Era of Empowerment 2016 1999 Not Much Online Commerce, Not Much thinking About Security Web commerce grows; hackers take notice, mischief turns to theft Cloud, mobile and consumerization disrupt IT. Security empowers business. Enterprises lock-down infrastructures. Breaches mount. Web grows as a top threat source 1999 Worldwide PC shipments $20 million 1999 Worldwide Security Software $3.8 Billion Security submarkets tracked by IDC 1999 Antiviral, Firewall, Encryption, Security AAA $371.1 million 2012 Worldwide Security Software $19.3 Billion Security submarkets tracked by IDC 2013 Identity and access management; Advanced authentication; Web single sign-on; Enterprise single sign-on; Legacy authorization; User provisioning; Personal portable security devices; Software licensing authentication token; Unified threat management; Intrusion detection and prevention; Virtual private network; Security and vulnerability management; Security information and event management; Proactive endpoint risk management; Forensics and incident investigation; Security device and systems management; Vulnerability assessment... Top security challenges facing large enterprises over the next 12 months Worldwide E-Commerce Spending (B2B & B2C) $B 2012 Worldwide PC shipments $6,884B 8000 7000 Code Red costs top $2B 6000 5000 Slammer Worm infects an estimated 150,000 to 200,000 servers worldwide EMPLOYEE USE OF WEB 2.0 DIFFICULTY SECURING WEB APPS 45% 45% 41% 4000 DataLossDB.org incidents 2004-2007 644 2000 774 2007 Complexity of security solutions Increasing sophistication of attacks Increasing volume of threats and/or attacks 2008 2009 2010 53% 61% 63% 43 0 2000 2001 2002 2003 2004 Yes 157 2005 55% 2006 2007 No 45% Does your organization have a formal documented security policy? $67B $29B 2012 Yes No 35% 659 65% 2008 Which if any of the following is your company currently using/likely to purchase or implement during the next 12 months? 37% IT-CONTROLLED BYOD 2011 $357.4B 1000 63% Worldwide cloud revenue ($B) Top rated enterprise security challenges (a five year comparison) I LOVE YOU Emerges 3000 64% 60% How would you describe your mobile device environment? Data loss prevention: 62% Network Admission Control: 57% Employee Monitoring Solutions: 57% Any potential security risks cloud computing or SaaS introduce are far outweighed by the benefits. 2013 2014 2015 SMARTPHONE SHIPMENTS (M) 45% 33% 22% AGREE DISAGREE NEUTRAL 2016 1,161 63% 23% 14% Employees using personal smartphones at work understand the risks, and are aware of security proper security practices.