Research Dashboard Login

Infographic: Changing Information Security Spending Landscape

The Voice of the Enterprise (VotE): Information Security, Budgets and Outlook survey represents the second in-depth look at security budgeting. A year-by-year comparison and predictive look into the future, shows security budgets increasing but also coming under various forms of stress that are currently shifting spending allocations and portend future changes. These shifts are taking the form of increased spending on software- over hardware-based security solutions, opex over capex and endpoint-based solutions over network-based ones. Interested in learning more about Voice of the Enterprise? Download the full infographic, or click here for more information.
1257 Hits

Consumer Mobile Payment Trends: Another Uptick in Demand for Mobile Payments

Consumer interest in mobile payment apps is increasing for the second consecutive survey. We’re also seeing greater confidence in the security of payment apps, though the issue of security remains a key obstacle to wider adoption by consumers.

The December 12-30 survey of 4,125 primarily North American consumers from 451 Research’s Leading Indicator panel also took a look at payment app preferences and customer satisfaction.

Excerpt of full report:

Consumer Demand for Mobile Payment Apps. Planned use of mobile payment apps has increased for the second survey in a row, reaching its highest level since we began asking this question back in 2014.  A total of 29% of smartphone owners say they’re likely to use mobile payment apps over the next 90 days (15% Very Likely; 14% Somewhat Likely) – a 1 point increase since the previous survey in September and 5 points higher than six months ago.

2.17 vocul 1

Security is Key to Encouraging New Users.  We asked unlikely users what would drive them to adopt mobile payment apps.  Two-thirds (66%) cite Security Against Fraud that is Better Than Traditional Payment Cards as a factor.  A total of 35% say they want to Receive Discounted Offers, while 26% would use them if it helped Avoid Queuing at the Cash Register. 

2.17 vocul 2 apps

Report details also include:

Consumer Demand for Mobile Payment Apps

Competition Among Services

Customer Satisfaction

Most Important Factors Among Consumers

Perceptions of Security

Encouraging Wider Use of Mobile Payment Apps

Corporate Market: Mobile Payment Trends

Learn more about Voice of the Connected User Landscape here. 

1718 Hits

When things attack: Mirai and the Dyn DDoS attack reveal a disturbing future

The October 21 attacks that knocked some of the internet's most-recognized brands offline in the largest recorded distributed denial of service to date reveal how little the world has taken seriously the threat of poorly secured consumer IoT. Will we be ready for what may come next?

The 451 Take

These attacks have only just begun to illustrate the level of exposure the world faces from what so far appears to be largely SMB products made for the Internet of Things. Indeed, this narrow focus says much about the potential scale of risk beyond the cameras and DVRs largely targeted in this case. While virtually everyone weighing in on the discussion agrees that something must be done to head off an even worse scenario, what remedies make the most sense? There are needs at virtually every level of IoT architecture, from the software and functionality built into devices to the networks and platforms that interconnect IoT's many moving parts. The recent attacks illustrate how easily poorly secured IoT can be made a platform for attacking the fundamental underpinnings of the internet that keep the entire digital world functioning. So far, most of the discussion around IoT security has revolved around protecting IoT itself, with considerable investment already having gone into securing industrial IoT, particularly in sectors where safety is a primary concern. The threat that vulnerable IoT poses in and to the larger world has been seriously underserved. The range of solutions proposed – from adopting the analog of building codes for software and hardware to sweeping regulation, and the inevitable arm wrestling each presents – makes it clear that resolving these vulnerabilities will not be easy. What concerns us most is that, as so often happens with security, it will take an incident of serious proportions to bring any real progress to a head. It would be wise for the industry to do what it can to address this before governments take a stab at it.

Read the full analysis by 451 Research analysts here.
1231 Hits

Meet the New Additions to our 100+ Analyst Team!

451 Research is proud to announce 7 key additions to its growing analyst team since the beginning of the year. The longtime philosophy at 451 Research has been to continually reinvest in our business, and 2016 has been no exception. In the first quarter of 2016, we have made a number of significant hires to improve our research, our data, and our management expertise. Below is a list of our recent hires and an overview of their interests and capabilities:
Continue reading
2494 Hits

Critical Security and Compliance Considerations for Hybrid Cloud Deployments

Critical Security and Compliance Considerations for Hybrid Cloud Deployments
For IT organizations struggling with demands to improve operational agility, lower operating costs and drive accelerated service delivery the answer more and more is hybrid cloud. Of course, the answer to what is hybrid cloud in the context of a specific organization varies widely. Generally, however, most organizations understand it to mean a mix of private, public and managed cloud.

And while what is best fit for hybrid cloud architectures would again vary, in a recent 451 Research survey of enterprise IT and information security vendors, close to three-quarters of the respondents have already embarked on a hybrid cloud journey – embracing a mix of private, public and managed clouds.
Inevitably, all organizations on the hybrid cloud adoption spectrum must wrestle with making the most of hybrid cloud architecture while still meeting security policies and compliance mandates for the protection and management of sensitive or proprietary data. These are not insignificant challenges. The two biggest problems are how to maintain control and visibility into security practices across distributed infrastructure, and how can organizations manage risk in an environment where technologies built for static infrastructure only cover partial ground.
Continue reading
3313 Hits

Subscribers

Forgotten password?

Not a Subscriber

Apply for a trial account today to obtain access to insight from 451 Research analysts worldwide and experience our products and services first hand.

Apply → Close

Browse By Sector

Select a sector from the list below.

Close
loading
Sector Browser Loading.