{"id":60980,"date":"2016-04-03T10:00:28","date_gmt":"2016-04-03T08:00:28","guid":{"rendered":"http:\/\/e3mag.com\/?p=60980"},"modified":"2024-01-19T14:53:53","modified_gmt":"2024-01-19T13:53:53","slug":"budgets-increase-with-security-awareness","status":"publish","type":"post","link":"https:\/\/e3mag.com\/en\/budgets-increase-with-security-awareness\/","title":{"rendered":"Are budgets increasing along with security awareness?"},"content":{"rendered":"<p>For Dell's latest data security study, the market research company Penn Schoen Berland surveyed over 1,300 IT and business decision-makers from medium-sized companies in the USA, Europe and the Asia-Pacific region at the end of 2015.<\/p>\n<p>One result: C-level executives - i.e. board members and managing directors - are more interested in data security today than in the past. Nevertheless, they still often do not invest enough energy and resources in the topic.<\/p><div id=\"great-30338640\" class=\"great-fullsize-content-en\" style=\"margin-bottom: 20px;\"><a data-no-instant=\"1\" href=\"https:\/\/www.youtube.com\/watch?v=6yfv7eho3Gc\" rel=\"noopener\" class=\"a2t-link\" target=\"_blank\" aria-label=\"Fullsize\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg\" alt=\"Fullsize\"  srcset=\"https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150.jpg 1200w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-400x50.jpg 400w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-768x96.jpg 768w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-100x13.jpg 100w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-480x60.jpg 480w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-640x80.jpg 640w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-720x90.jpg 720w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-960x120.jpg 960w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-1168x146.jpg 1168w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-18x2.jpg 18w, https:\/\/e3mag.com\/wp-content\/uploads\/2026\/03\/banner_26_04_08_1200x150-600x75.jpg 600w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" width=\"1200\" height=\"150\"  style=\" max-width: 100%; height: auto;\" \/><\/a><\/div>\n<p>Almost three quarters stated that data security is a priority for their board members and managing directors, but a quarter believe that these managers are not sufficiently informed about the topic.<\/p>\n<p>Three quarters of the study participants reported that their C-level executives plan to expand current security measures. More than half expect their company to spend more money on data security over the next five years.<\/p>\n<p>When it comes to expanding existing security programs, cost concerns play a major role. 53 percent of respondents cited cost as a reason why they would not introduce additional security features in the future.<\/p>\n<p>Only one in four decision-makers is \"very confident\" that C-level executives will be able to provide a sufficient budget for data security solutions in the next five years.<\/p>\n<p>Everyone is talking about the fact that mobility is on the rise in companies. The Dell study reveals that the reality is somewhat more complicated. The majority of medium-sized companies (65 percent) are postponing plans to mobilize their employees due to security concerns. 67 percent of them are hesitant to implement a bring-your-own-device program for the same reason.<\/p>\n<h3>Data at risk in the public cloud<\/h3>\n<p>Almost four out of five respondents have concerns when sensitive data is uploaded to the public cloud. 58% are even more concerned about this today than they were a year ago. 38% of decision-makers have restricted access to the public cloud in their company for security reasons.<\/p>\n<p><em>\"With modern technologies that use intelligent encryption, data can be protected wherever it happens to be. <\/em><\/p>\n<p><em>This can also prevent employees from setting up uncontrollable shadow IT and circumventing their company's security guidelines in order to be more productive\"<\/em><\/p>\n<p>says Brett Hansen, Executive Director Data Security Solutions at Dell.<\/p>","protected":false},"excerpt":{"rendered":"<p>Although boards and executives are aware of the great importance of data security, they often do not provide the necessary resources. Security concerns also inhibit the use of mobile devices and public cloud services in companies.<\/p>","protected":false},"author":38,"featured_media":60767,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"pmpro_default_level":"","footnotes":""},"categories":[161,2,1605],"tags":[304,5010],"coauthors":[19920],"class_list":["post-60980","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-szene","category-sap-nachrichten","category-mag1604","tag-dell","tag-public-cloud","pmpro-has-access"],"acf":[],"featured_image_urls_v2":{"full":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",1000,387,false],"thumbnail":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016-150x150.jpg",150,150,true],"medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",400,155,false],"medium_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016-768x297.jpg",768,297,true],"large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",1000,387,false],"image-100":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016-100x39.jpg",100,39,true],"image-480":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016-480x186.jpg",480,186,true],"image-640":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016-640x248.jpg",640,248,true],"image-720":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016-720x279.jpg",720,279,true],"image-960":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016-960x372.jpg",960,372,true],"image-1168":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",1000,387,false],"image-1440":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",1000,387,false],"image-1920":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",1000,387,false],"1536x1536":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",1000,387,false],"2048x2048":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",1000,387,false],"trp-custom-language-flag":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",18,7,false],"bricks_large_16x9":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",1000,387,false],"bricks_large":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",1000,387,false],"bricks_large_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",1000,387,false],"bricks_medium":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",600,232,false],"bricks_medium_square":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016.jpg",600,232,false],"profile_24":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016-24x24.jpg",24,24,true],"profile_48":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016-48x48.jpg",48,48,true],"profile_96":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016-96x96.jpg",96,96,true],"profile_150":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016-150x150.jpg",150,150,true],"profile_300":["https:\/\/e3mag.com\/wp-content\/uploads\/2019\/07\/2016-300x300.jpg",300,300,true]},"post_excerpt_stackable_v2":"<p>Obwohl Vorst\u00e4nden und Gesch\u00e4ftsf\u00fchrern die gro\u00dfe Bedeutung der Datensicherheit bewusst ist, stellen sie oft nicht die n\u00f6tigen Ressourcen zur Verf\u00fcgung. Sicherheitsbedenken hemmen au\u00dferdem den Einsatz von Mobilger\u00e4ten und Public-Cloud-Diensten in den Unternehmen.<\/p>\n","category_list_v2":"<a href=\"https:\/\/e3mag.com\/en\/category\/scene\/\" rel=\"category tag\">Szene<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/sap-news\/\" rel=\"category tag\">Community Nachrichten<\/a>, <a href=\"https:\/\/e3mag.com\/en\/category\/mag1604\/\" rel=\"category tag\">MAG 16-04<\/a>","author_info_v2":{"name":"E-3 Magazine","url":"https:\/\/e3mag.com\/en\/author\/e-3-magazin\/"},"comments_num_v2":"0 comments","_links":{"self":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/60980","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/comments?post=60980"}],"version-history":[{"count":1,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/60980\/revisions"}],"predecessor-version":[{"id":138368,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/posts\/60980\/revisions\/138368"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media\/60767"}],"wp:attachment":[{"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/media?parent=60980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/categories?post=60980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/tags?post=60980"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/e3mag.com\/en\/wp-json\/wp\/v2\/coauthors?post=60980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}