The December 12-30 survey of 4,125 primarily North American consumers from 451 Research’s Leading Indicator panel also took a look at payment app preferences and customer satisfaction.
Excerpt of full report:
Consumer Demand for Mobile Payment Apps. Planned use of mobile payment apps has increased for the second survey in a row, reaching its highest level since we began asking this question back in 2014. A total of 29% of smartphone owners say they’re likely to use mobile payment apps over the next 90 days (15% Very Likely; 14% Somewhat Likely) – a 1 point increase since the previous survey in September and 5 points higher than six months ago.
We asked unlikely users what would drive them to adopt mobile payment apps. Two-thirds (66%) cite as a factor. A total of 35% say they want to , while 26% would use them if it helped
Report details also include:
• Consumer Demand for Mobile Payment Apps
• Competition Among Services
• Customer Satisfaction
• Most Important Factors Among Consumers
• Perceptions of Security
• Encouraging Wider Use of Mobile Payment Apps
• Corporate Market: Mobile Payment Trends
Learn more about Voice of the Connected User Landscape here.
The 451 Take
These attacks have only just begun to illustrate the level of exposure the world faces from what so far appears to be largely SMB products made for the Internet of Things. Indeed, this narrow focus says much about the potential scale of risk beyond the cameras and DVRs largely targeted in this case. While virtually everyone weighing in on the discussion agrees that something must be done to head off an even worse scenario, what remedies make the most sense? There are needs at virtually every level of IoT architecture, from the software and functionality built into devices to the networks and platforms that interconnect IoT's many moving parts. The recent attacks illustrate how easily poorly secured IoT can be made a platform for attacking the fundamental underpinnings of the internet that keep the entire digital world functioning. So far, most of the discussion around IoT security has revolved around protecting IoT itself, with considerable investment already having gone into securing industrial IoT, particularly in sectors where safety is a primary concern. The threat that vulnerable IoT poses in and to the larger world has been seriously underserved. The range of solutions proposed – from adopting the analog of building codes for software and hardware to sweeping regulation, and the inevitable arm wrestling each presents – makes it clear that resolving these vulnerabilities will not be easy. What concerns us most is that, as so often happens with security, it will take an incident of serious proportions to bring any real progress to a head. It would be wise for the industry to do what it can to address this before governments take a stab at it.
Read the full analysis by 451 Research analysts here.
And while what is best fit for hybrid cloud architectures would again vary, in a recent 451 Research survey of enterprise IT and information security vendors, close to three-quarters of the respondents have already embarked on a hybrid cloud journey – embracing a mix of private, public and managed clouds.
Inevitably, all organizations on the hybrid cloud adoption spectrum must wrestle with making the most of hybrid cloud architecture while still meeting security policies and compliance mandates for the protection and management of sensitive or proprietary data. These are not insignificant challenges. The two biggest problems are how to maintain control and visibility into security practices across distributed infrastructure, and how can organizations manage risk in an environment where technologies built for static infrastructure only cover partial ground.