GI mSecurity 2011 Survey Report

Report Summary

The mSecurity Survey 2011 Report is an independent survey covering end-user perception of mobile security and the adoption of policy and technology controls.

Author: Alan Goode
Publication Date: 19th April 2012
Number of Pages: 78
Enquire before you buy, email us on


Add to Basket

The product has been added to your basket

Your Basket

Full Product Description

The GI mSecurity 2011 survey report provides a detailed picture of how organisations currently view mobile security (mSecurity) and collates responses from information security professionals and IT managers across the globe regarding key mobile security themes.  Question topics covered in the report include:

  • How  organisations are tackling the security problems posed by smart mobile devices (SMD)
  • The impact of the BYOD trend
  • How  information security professionals rank the security of smartphones
  • How prepared and equipped businesses are to deal with these unique challenges
  • The impact of mobile device management (MDM) solutions with actual adoption rates
  • The mSecurity incidents that have been reported within organisations, including malware, voice interception, data loss and theft with expert and independent analysis to determine if challenges like mobile malware is actually a real threat




The third GI mSecurity survey report is an essential guide to mobile security trends and practices gathered from a wide variety of organisations around the world. Record numbers of participants in this survey ensure an accurate understanding of the current status of mobile security. In addition, the data from the survey provides actionable intelligence for both buyers (end-users) and suppliers of mSecurity products and services.

Report sections include:

  • Policy and Regulation
  • Awareness and Education
  • Procurement and Resources
  • Smartphone and Tablet adoption
  • BYOD/Consumerisation trends and personal vs. company use of phones
  • Security Ranking of major smartphone platforms
  • Smartphones and network connectivity
  • Data Loss Prevention
  • Voice Protection (encryption)
  • Mobile Device Management (MDM)
  • Mobile Malware
  • Anti-Theft solutions
  • Adoption rates for mobile-phone based authentication solutions
  • Evidence of information security incidents, e.g. mobile malware infection and unauthorised access to data stored on a smartphone



Website Design by Selesti