Market research logo; 28 years of Excellence in Market Research since 1988.
Market research logo; 28 years of Excellence in Market Research since 1988.

Need advice? Keen to get the best deal? Call now on +44 (0)1494 771734

GM mSecurity 2011 Survey Report

GM mSecurity 2011 Survey Report

Market Study
Published: April 2012
Pages: 76
Research from: Goode Intelligence
Sector: Mobile

From: GBP 595.00
Buy Now!

The mSecurity Survey 2011 Report is an independent survey covering end-user perception of mobile security and the adoption of policy and technology controls.

Full Product Description

The GI mSecurity 2011 survey report provides a detailed picture of how organisations currently view mobile security (mSecurity) and collates responses from information security professionals and IT managers across the globe regarding key mobile security themes.  Question topics covered in the report include:

  • How  organisations are tackling the security problems posed by smart mobile devices (SMD)
  • The impact of the BYOD trend
  • How  information security professionals rank the security of smartphones
  • How prepared and equipped businesses are to deal with these unique challenges
  • The impact of mobile device management (MDM) solutions with actual adoption rates
  • The mSecurity incidents that have been reported within organisations, including malware, voice interception, data loss and theft with expert and independent analysis to determine if challenges like mobile malware is actually a real threat


The third GI mSecurity survey report is an essential guide to mobile security trends and practices gathered from a wide variety of organisations around the world. Record numbers of participants in this survey ensure an accurate understanding of the current status of mobile security. In addition, the data from the survey provides actionable intelligence for both buyers (end-users) and suppliers of mSecurity products and services.

Report sections include:

  • Policy and Regulation
  • Awareness and Education
  • Procurement and Resources
  • Smartphone and Tablet adoption
  • BYOD/Consumerisation trends and personal vs. company use of phones
  • Security Ranking of major smartphone platforms
  • Smartphones and network connectivity
  • Data Loss Prevention
  • Voice Protection (encryption)
  • Mobile Device Management (MDM)
  • Mobile Malware
  • Anti-Theft solutions
  • Adoption rates for mobile-phone based authentication solutions
  • Evidence of information security incidents, e.g. mobile malware infection and unauthorised access to data stored on a smartphone

Top of Page